{"id":3790,"date":"2026-04-20T03:50:35","date_gmt":"2026-04-20T08:50:35","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1020\/?p=3790"},"modified":"2026-04-06T05:07:17","modified_gmt":"2026-04-06T10:07:17","slug":"eliminate-shadow-it-with-an-approved-app-catalogue","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/eliminate-shadow-it-with-an-approved-app-catalogue\/","title":{"rendered":"Eliminate Shadow IT with an Approved App Catalogue"},"content":{"rendered":"<p><span style=\"font-weight: 400\">At some point, every operations team notices the same pattern.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Someone signs up for a new app to \u201cmove faster.\u201d<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> Another team shares files through a tool no one else uses.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"> A free trial turns into a business-critical system without IT knowing it exists.<\/span><\/p>\n<p><span style=\"font-weight: 400\">None of this comes from bad intent. It comes from people trying to get work done.<\/span><\/p>\n<p><span style=\"font-weight: 400\">That\u2019s what makes shadow IT so tricky. It doesn\u2019t feel like a problem until something breaks, data leaks, or an audit asks questions no one can answer.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The solution isn\u2019t locking everything down. It\u2019s giving teams <\/span><b>clear, supported choices<\/b><span style=\"font-weight: 400\"> that make the right path the easiest one.<\/span><\/p>\n<h2><b>Why Shadow IT Shows Up in Well-Run Organizations<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT usually appears when:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Approved tools don\u2019t meet a specific need<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Getting access feels slow or unclear<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Teams don\u2019t know what\u2019s already available<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">People assume \u201cfree\u201d means low risk<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">When there\u2019s no obvious list of approved apps, employees fill the gap themselves. Over time, this creates:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unknown data flows<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent security controls<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Duplicate tools and costs<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Confusion about ownership and support<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The risk isn\u2019t experimentation. The risk is <\/span><b>uncontrolled adoption<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>The Real Problem Isn\u2019t Apps\u00a0 It\u2019s Visibility<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most businesses don\u2019t actually know:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Which apps are being used<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Who signed up for them<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">What data they access<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Where that data is stored<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Without visibility, IT and operations can\u2019t protect what they don\u2019t know exists. Regulators and clients don\u2019t accept \u201cwe weren\u2019t aware\u201d as an answer.<\/span><\/p>\n<p><span style=\"font-weight: 400\">An approved app catalogue brings those unknowns into the open without stopping innovation.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3792\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-11-1024x535.png\" alt=\"\" width=\"790\" height=\"413\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-11-1024x535.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-11-300x157.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-11-768x401.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-11.png 1200w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><\/p>\n<h2><b>What an Approved App Catalogue Actually Is<\/b><\/h2>\n<p><span style=\"font-weight: 400\">An approved app catalogue isn\u2019t a long, restrictive policy document.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s a clear, accessible list that answers one simple question:<\/span><\/p>\n<h2><b>\u201cWhich tools can I safely use to do my job?\u201d<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A strong catalogue includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Approved business applications<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear descriptions of what each app is for<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Who can use them<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to request access<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Supported alternatives for common needs<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">When people know where to look, they stop guessing.<\/span><\/p>\n<h2><b>Standardization Without Slowing Teams Down<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Operations teams care about speed and reliability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">An approved app catalogue supports both by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reducing tool sprawl<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limiting duplicate platforms<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Making onboarding faster<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Simplifying support and troubleshooting<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Instead of ten tools doing the same thing poorly, teams use a few tools well and know where to get help when something goes wrong.<\/span><\/p>\n<h2><b>Enforcing SSO and MFA Without Adding Friction<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the biggest shadow IT risks is weak authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Apps signed up with personal emails and reused passwords create blind spots that security tools can\u2019t see.<\/span><\/p>\n<p><strong>Enforcing:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Single sign-on (SSO)<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-factor authentication (MFA)<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><strong>ensures:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access is tied to company identities<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Login activity is visible and logged<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access can be removed immediately when needed<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security policies are applied consistently<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">From an operations perspective, this also means fewer password resets and less confusion.<\/span><\/p>\n<h2><b>Supported Alternatives Keep Productivity Moving<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Banning apps without offering alternatives doesn\u2019t work.<\/span><\/p>\n<p><span style=\"font-weight: 400\">People will always choose the fastest path to get work done. If approved tools don\u2019t meet their needs, they\u2019ll find something that does.<\/span><\/p>\n<p><span style=\"font-weight: 400\">That\u2019s why effective app catalogues:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Include supported alternatives for common tasks<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Explain why certain tools are approved<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Offer a clear process to request new tools<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Respond quickly to legitimate needs<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This turns IT from a gatekeeper into an enabler.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3796\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-10-2-1024x535.png\" alt=\"\" width=\"785\" height=\"410\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-10-2-1024x535.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-10-2-300x157.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-10-2-768x401.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2026\/04\/Copy-of-Copy-of-cmit-boise-featured-image-10-2.png 1200w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/><\/p>\n<h2><b>Reducing Data Leakage Without Micromanagement<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT increases the risk of:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Files being stored outside secure platforms<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sensitive data shared without controls<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Information retained longer than necessary<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">An approved app catalogue reduces these risks by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Keeping data inside known environments<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Applying consistent retention and security policies<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limiting uncontrolled sharing<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Making audits and reviews simpler<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The goal isn\u2019t surveillance. It\u2019s <\/span><b>predictability<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>What Eliminating Shadow IT Looks Like Day to Day<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When shadow IT is under control:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Teams know which tools to use<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access requests are straightforward<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security incidents decrease<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Audits become easier<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Support requests are faster to resolve<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Most importantly, people stop wasting time working around systems and start trusting them instead.<\/span><\/p>\n<h2><b>How Managed IT Services Help Control Shadow IT<\/b><\/h2>\n<p><span style=\"font-weight: 400\">This is where <\/span><b>CMIT Solutions of Boston, Newton &amp; Waltham<\/b><span style=\"font-weight: 400\"> provides ongoing value.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Maintaining an approved app catalogue and enforcing controls takes consistent effort\u2014not a one-time setup.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A managed IT services provider helps by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Identifying shadow IT usage<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Building and maintaining an approved app list<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enforcing SSO and MFA across platforms<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Evaluating new apps for security and compliance<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Providing secure, supported alternatives<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitoring usage and access over time<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This keeps productivity high without increasing risk.<\/span><\/p>\n<h2><b>Conclusion: Control Without Friction Is the Goal<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT isn\u2019t a people problem. It\u2019s a systems problem.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When employees have clear, secure options, they use them. When they don\u2019t, shadow IT fills the gap.<\/span><\/p>\n<p><span style=\"font-weight: 400\">An approved app catalogue gives teams freedom within guardrails so work moves fast without exposing the business to unnecessary risk.<\/span><\/p>\n<p><b>Ready to Bring Shadow IT Under Control?<\/b><\/p>\n<p><span style=\"font-weight: 400\">If your organization isn\u2019t fully confident which apps are in use or where company data is flowing it\u2019s worth addressing now.<\/span><\/p>\n<p><b>CMIT Solutions of Boston, Newton &amp; Waltham<\/b><span style=\"font-weight: 400\"> helps organizations eliminate shadow IT with practical controls that support operations instead of slowing them down.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/contact-us\/\"><b>Schedule a discovery call<\/b><\/a><span style=\"font-weight: 400\"> to identify hidden risks, streamline app usage, and give your teams secure tools they can actually rely on.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because the safest systems are the ones people actually use.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-749\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1024x341.png\" alt=\"\" width=\"1024\" height=\"341\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1024x341.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-300x100.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-768x256.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1536x512.png 1536w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3.png 1575w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At some point, every operations team notices the same pattern. Someone signs&#8230;<\/p>\n","protected":false},"author":331,"featured_media":3791,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[56,22,48,105,23,103,106,42,81,95,96,101,98,97,104,102,99,100],"class_list":["post-3790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-boston-it-support","tag-cmit-boston","tag-cmit-boston-newton-waltham","tag-it-managed-service-provider","tag-it-managed-services","tag-it-managed-services-boston-ma","tag-it-managed-services-for-small-business","tag-it-support-services","tag-managed-it-service-for-small-business","tag-managed-it-services-boston","tag-managed-it-services-boston-ma","tag-managed-it-services-for-small-business-boston","tag-managed-it-services-near-me-boston","tag-managed-it-support-boston","tag-managed-it-support-company-boston","tag-managed-network-services-boston","tag-managed-service-providers-boston","tag-msp-companies-boston"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts\/3790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/comments?post=3790"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts\/3790\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/media\/3791"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/media?parent=3790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/categories?post=3790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/tags?post=3790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}