{"id":1483,"date":"2025-12-29T00:49:34","date_gmt":"2025-12-29T06:49:34","guid":{"rendered":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/?p=1483"},"modified":"2025-12-29T00:54:35","modified_gmt":"2025-12-29T06:54:35","slug":"how-managed-it-services-improve-compliance-and-reduce-risk","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/how-managed-it-services-improve-compliance-and-reduce-risk\/","title":{"rendered":"How Managed IT Services Improve Compliance and Reduce Risk"},"content":{"rendered":"<h2><b>Introduction: Compliance and Risk in the Digital Era<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In an increasingly complex digital world, compliance and cybersecurity are no longer optional they\u2019re essential for business survival. From data privacy laws like GDPR to industry-specific standards such as HIPAA and PCI DSS, small and midsize businesses (SMBs) face growing pressure to meet strict regulatory demands.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, compliance can be overwhelming for organizations without dedicated IT departments. That\u2019s where Managed IT Services come in. By partnering with a Managed Service Provider (MSP), businesses gain access to the tools, expertise, and monitoring systems needed to maintain compliance and reduce risk proactively.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/compliance-without-the-chaos-automating-it-governance-for-birmingham-businesses\/\"> <i><span style=\"font-weight: 400\">Compliance Without the Chaos<\/span><\/i><\/a><span style=\"font-weight: 400\"> explains, automation and expert oversight simplify even the most complex compliance frameworks, freeing business owners to focus on growth instead of regulations.<\/span><\/p>\n<h2><b>Understanding IT Compliance and Why It Matters<\/b><\/h2>\n<p><span style=\"font-weight: 400\">IT compliance ensures that a company\u2019s technology systems meet all applicable <\/span>legal, regulatory, and security requirements<span style=\"font-weight: 400\">. Whether protecting customer data, financial transactions, or intellectual property, compliance demonstrates accountability and trustworthiness.<\/span><\/p>\n<h3><b>Key reasons compliance matters:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Avoids costly fines and penalties. Regulatory violations can result in six-figure losses.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Protects business reputation. Customers trust companies that safeguard their data.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Prevents data breaches. Compliance frameworks enforce strong cybersecurity hygiene.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Supports business continuity. Regular audits and monitoring prevent major disruptions.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As noted in<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/the-rise-of-zero-trust-why-perimeter-security-is-dead\/\"> <i><span style=\"font-weight: 400\">The Rise of Zero Trust<\/span><\/i><\/a><span style=\"font-weight: 400\">, maintaining compliance starts with layered security and constant verification both of which Managed IT Services are designed to provide.<\/span><\/p>\n<h2><b>How Managed IT Simplifies Compliance Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For many SMBs, tracking every regulation, security standard, and update is nearly impossible. Managed IT Services handle the heavy lifting through automated governance tools, audit support, and real-time reporting.<\/span><\/p>\n<h3><b>Key ways Managed IT simplifies compliance:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous monitoring of system configurations and user activity.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated software updates and patch management.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized documentation and audit reports.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Standardized policies for data access, encryption, and retention.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular vulnerability assessments and compliance scans.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">In<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/compliance-audits-are-getting-smarter-so-should-your-systems\/\"> <i><span style=\"font-weight: 400\">Compliance Audits Are Getting Smarter<\/span><\/i><\/a><span style=\"font-weight: 400\">, CMIT Solutions highlights that smart automation can turn compliance from a once-a-year headache into a seamless, ongoing process.<\/span><\/p>\n<h2><b>Proactive Risk Mitigation: The Core of Managed IT<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Compliance and risk go hand-in-hand. Managed IT Services take a <\/span>proactive approach<span style=\"font-weight: 400\"> to identifying vulnerabilities, detecting anomalies, and neutralizing threats before they escalate.<\/span><\/p>\n<h3><b>Proactive risk reduction through Managed IT:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\">24\/7 monitoring: Continuous visibility into network and endpoint behavior.<\/li>\n<li style=\"font-weight: 400\">Threat intelligence: Real-time data on emerging attack trends.<\/li>\n<li style=\"font-weight: 400\">Automated patching: Closes security gaps instantly.<\/li>\n<li style=\"font-weight: 400\">Backup and disaster recovery: Minimizes downtime and data loss.<\/li>\n<li style=\"font-weight: 400\">Incident response planning: Ensures quick containment and recovery.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/from-downtime-to-uptime-modern-data-backup-strategies-that-actually-work\/\"> <i><span style=\"font-weight: 400\">From Downtime to Uptime<\/span><\/i><\/a><span style=\"font-weight: 400\"> illustrates, proactive IT management transforms risk mitigation from reaction to prevention saving time, money, and reputation.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-1485\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/38-1-1024x535.png\" alt=\"\" width=\"896\" height=\"468\" srcset=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/38-1-1024x535.png 1024w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/38-1-300x157.png 300w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/38-1-768x401.png 768w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/38-1.png 1200w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/><\/p>\n<h2><b>The Role of Cybersecurity in Compliance<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most compliance standards are built on one foundational goal: <\/span>protecting sensitive information<span style=\"font-weight: 400\">. Managed IT Services integrate cybersecurity directly into compliance workflows, ensuring that security controls meet or exceed required standards.<\/span><\/p>\n<h3><b>Cybersecurity measures supporting compliance:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-factor authentication (MFA) for identity verification.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Next-gen firewall and endpoint protection.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encryption for data in transit and at rest.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access control and privilege management.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Phishing prevention and employee training.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">In<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/the-real-cost-of-clicks-how-cybercriminals-monetize-phishing-at-scale\/\"> <i><span style=\"font-weight: 400\">The Real Cost of Clicks<\/span><\/i><\/a><span style=\"font-weight: 400\">, CMIT Solutions reminds businesses that human error remains the top cause of breaches making security awareness and control automation key compliance strategies.<\/span><\/p>\n<h2><b>Data Governance and Privacy Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Effective compliance depends on <\/span>data governance<span style=\"font-weight: 400\"> knowing where data resides, who can access it, and how it\u2019s protected. Managed IT Services provide tools that classify, track, and safeguard data across cloud, hybrid, and on-prem environments.<\/span><\/p>\n<h3><b>How Managed IT supports data governance:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated data discovery and classification.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access control policies to prevent unauthorized use.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure cloud migration and backup.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time alerts for abnormal data activity.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Retention policies aligned with legal requirements.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As shown in<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/hybrid-work-hybrid-cloud-crafting-a-scalable-cloud-strategy-for-birmingham-smbs\/\"> <i><span style=\"font-weight: 400\">Hybrid Work, Hybrid Cloud<\/span><\/i><\/a><span style=\"font-weight: 400\">, businesses need consistent governance across distributed systems\u2014something Managed IT enables through centralized visibility and control.<\/span><\/p>\n<h2><b>Reducing Human Error Through Training and Automation<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the biggest compliance risks isn\u2019t a hacker, it&#8217;s human error. Managed IT providers combine <\/span>employee training programs<span style=\"font-weight: 400\"> with automation to minimize mistakes that lead to violations or breaches.<\/span><\/p>\n<h3><b>Human error prevention strategies:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular security awareness training.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated access provisioning and de-provisioning.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Role-based permissions to prevent overexposure of data.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Email filtering and phishing detection tools.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous education on evolving cyber threats.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">In<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/ai-in-your-inbox-how-smart-productivity-tools-are-supercharging-smb-efficiency\/\"> <i><span style=\"font-weight: 400\">AI in Your Inbox<\/span><\/i><\/a><span style=\"font-weight: 400\">, CMIT Solutions notes that automation and AI-driven tools enhance productivity <\/span><i><span style=\"font-weight: 400\">and<\/span><\/i><span style=\"font-weight: 400\"> compliance keeping human risk low while maintaining efficiency.<\/span><\/p>\n<h2><b>Building Business Resilience Through Backup and Recovery<\/b><\/h2>\n<p><span style=\"font-weight: 400\">No compliance framework is complete without a solid <\/span>data backup and disaster recovery strategy<span style=\"font-weight: 400\">. Managed IT ensures your business remains operational even after a cyberattack, system failure, or natural disaster.<\/span><\/p>\n<h3><b>Backup and recovery essentials:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated, encrypted backups for critical data.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Offsite and cloud replication for redundancy.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Periodic recovery testing to ensure reliability.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear recovery time objectives (RTOs) and recovery point objectives (RPOs).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/disaster-recovery-planning-in-birmingham-dont-wait-for-the-storm\/\"> <i><span style=\"font-weight: 400\">Disaster Recovery Planning<\/span><\/i><\/a><span style=\"font-weight: 400\"> highlights, the cost of downtime far exceeds the investment in preparedness. Managed IT transforms resilience into a business advantage.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/12\/39-1024x535.png\" width=\"986\" height=\"515\" \/><\/p>\n<h2><b>Cloud Compliance: Securing Data Everywhere<\/b><\/h2>\n<p><span style=\"font-weight: 400\">With most SMBs relying on cloud platforms, ensuring compliance across multi-cloud environments is now critical. Managed IT providers monitor and manage cloud security configurations to prevent misconfigurations, the leading cause of cloud breaches.<\/span><\/p>\n<h3><b>Cloud compliance best practices:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enforcing identity-based access controls.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encrypting all cloud-stored data.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conducting regular cloud compliance audits.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Using secure APIs for integrations.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ensuring vendor compliance alignment.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">In<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/cloud-services-without-cloud-strategy-thats-a-problem\/\"> <i><span style=\"font-weight: 400\">Cloud Services Without Cloud Strategy<\/span><\/i><\/a><span style=\"font-weight: 400\">, CMIT emphasizes that adopting the cloud without a compliance roadmap leads to unnecessary risk Managed IT ensures cloud adoption remains safe and compliant.<\/span><\/p>\n<h2><b>Supporting Audits with Documentation and Reporting<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Audits can be stressful, but with Managed IT, they don\u2019t have to be. MSPs maintain detailed records of security controls, network activity, and incident responses making it easier to demonstrate compliance during inspections.<\/span><\/p>\n<h3><b>How Managed IT simplifies audit readiness:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized logs and audit trails.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated compliance reporting.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customizable dashboards for management visibility.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous documentation for regulatory agencies.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/tech-strategy-for-growth-the-role-of-it-consulting-in-birminghams-smb-success\/\"> <i><span style=\"font-weight: 400\">Tech Strategy for Growth<\/span><\/i><\/a><span style=\"font-weight: 400\"> explains, having structured documentation not only helps pass audits it strengthens overall IT maturity and risk posture.<\/span><\/p>\n<h2><b>Continuous Improvement: Staying Ahead of Changing Regulations<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Compliance isn\u2019t static regulations evolve constantly. Managed IT Services provide continuous updates, ensuring your systems always meet the latest security and legal standards.<\/span><\/p>\n<h3><b>Continuous compliance improvement strategies:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular policy reviews and framework updates.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing risk assessments and penetration testing.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Collaboration with auditors for early compliance mapping.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adoption of AI for predictive compliance insights.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/from-it-chaos-to-clarity-why-visibility-is-the-new-superpower-for-smbs\/\"> <i><span style=\"font-weight: 400\">From IT Chaos to Clarity<\/span><\/i><\/a><span style=\"font-weight: 400\"> points out, real-time insight enables adaptability helping businesses keep pace with regulatory changes effortlessly.<\/span><\/p>\n<h2><b>Conclusion: Compliance Confidence Through Partnership<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In a world where compliance failures can destroy reputations and drain resources, Managed IT Services act as both shield and guide. They integrate automation, visibility, and expert strategy to simplify compliance while strengthening your cybersecurity posture. <\/span><span style=\"font-weight: 400\">Partnering with an MSP like CMIT Solutions of Birmingham South means transforming compliance from a burden into a business advantage. You gain the confidence that your systems are not only secure and monitored but also aligned with every regulatory standard that matters.\u00a0 <\/span><span style=\"font-weight: 400\">As<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/compliance-without-the-chaos-automating-it-governance-for-birmingham-businesses\/\"> <i><span style=\"font-weight: 400\">Compliance Without the Chaos<\/span><\/i><\/a><span style=\"font-weight: 400\"> concludes, true compliance isn\u2019t just about checking boxes it\u2019s about building trust, resilience, and readiness in a rapidly changing world.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter wp-image-621\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"1020\" height=\"255\" srcset=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: Compliance and Risk in the Digital Era In an increasingly complex&#8230;<\/p>\n","protected":false},"author":1047,"featured_media":1484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[30,39,40,19,22,58,20,34,17,26,29,47,56,51,73],"class_list":["post-1483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-it-support-birmingham","tag-ai-for-small-businesses","tag-ai-workflow-automation","tag-birmingham-businesses","tag-birmingham-cybersecurity","tag-birmingham-it-communication-solutions","tag-birmingham-it-support","tag-business-it-support","tag-managed-it-services","tag-next-gen-cybersecurity","tag-ransomware-protection","tag-remote-work-cloud-tools","tag-smb-compliance-solutions","tag-tech-support-birmingham","tag-windows-10-upgrade"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts\/1483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/users\/1047"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/comments?post=1483"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts\/1483\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/media\/1484"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/media?parent=1483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/categories?post=1483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/tags?post=1483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}