{"id":2455,"date":"2025-04-20T00:57:46","date_gmt":"2025-04-20T05:57:46","guid":{"rendered":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/?p=2455"},"modified":"2025-04-28T00:59:01","modified_gmt":"2025-04-28T05:59:01","slug":"cloud-malware-threats-is-your-business-data-secure","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/cloud-malware-threats-is-your-business-data-secure\/","title":{"rendered":"Cloud Malware Threats: Is Your Business Data Secure?"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Few threats are as terrifying or financially damaging as malware. You spend hours training your team on cybersecurity best practices. They know not to open suspicious emails or visit risky websites. But what about the <\/span><b>cloud<\/b><span style=\"font-weight: 400\">? While many businesses take extensive precautions to protect <\/span><b>on-premise infrastructure<\/b><span style=\"font-weight: 400\">, cloud security is often overlooked.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Relying solely on your cloud service provider\u2019s security measures <\/span><b>isn\u2019t enough<\/b><span style=\"font-weight: 400\">. Businesses must implement their own <\/span><b>cloud security strategies<\/b><span style=\"font-weight: 400\"> to protect against <\/span><b>malware threats<\/b><span style=\"font-weight: 400\">. After all, if cloud malware infiltrates your systems, <\/span><b>it\u2019s your business that pays the price<\/b><span style=\"font-weight: 400\">\u2014not the cloud provider.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This article explores <\/span><b>the rising threat of cloud malware<\/b><span style=\"font-weight: 400\">, how attacks happen, and <\/span><b>best practices to secure business data in the cloud<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>What is Cloud Malware?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Malware\u2014whether targeting a physical server or a cloud environment\u2014operates with the same goal: <\/span><b>infiltrate systems, corrupt data, and hold assets hostage<\/b><span style=\"font-weight: 400\">. The difference? Cloud malware specifically <\/span><b>targets cloud-based infrastructure, SaaS applications, and stored data<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Once inside, <\/span><b>malware spreads rapidly, encrypting files, exfiltrating sensitive data, and shutting down operations<\/b><span style=\"font-weight: 400\">. Businesses often face <\/span><b>ransom demands<\/b><span style=\"font-weight: 400\"> to regain access, forcing them to either pay cybercriminals or risk <\/span><b>permanent data loss<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Malware is a growing concern for <\/span><b>businesses of all sizes<\/b><span style=\"font-weight: 400\">. According to the FBI, malware-related damages cost companies <\/span><b>$59.6 million in 2023<\/b><span style=\"font-weight: 400\"> alone. Beyond financial loss, malware attacks can:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Corrupt or delete business-critical data<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Disrupt operations, leading to extended downtime<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Expose customer and employee information<\/b><span style=\"font-weight: 400\">, resulting in regulatory fines.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Damage brand reputation<\/b><span style=\"font-weight: 400\">, eroding customer trust.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Understanding these risks is <\/span><b>the first step<\/b><span style=\"font-weight: 400\"> toward building a <\/span><b>comprehensive cloud security strategy<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Preventing Cloud Malware Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400\">With <\/span><b>malware attacks increasing<\/b><span style=\"font-weight: 400\">, businesses <\/span><b>cannot afford to be complacent<\/b><span style=\"font-weight: 400\">. Even the best cybersecurity systems require <\/span><b>continuous updates, proactive monitoring, and strong defenses<\/b><span style=\"font-weight: 400\">. Here\u2019s how businesses can <\/span><b>fortify their cloud environments<\/b><span style=\"font-weight: 400\"> against malware.<\/span><\/p>\n<h3><b>1. Strengthen Backup and Disaster Recovery Plans<\/b><\/h3>\n<p><span style=\"font-weight: 400\">A <\/span><b>solid backup and disaster recovery (BDR) plan<\/b><span style=\"font-weight: 400\"> is essential for protecting business data. If malware attacks your cloud environment, <\/span><b>having recent backups can mean the difference between recovery and total loss<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h4><b>Key Backup Strategies:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><b>Automate data backups<\/b><span style=\"font-weight: 400\"> to ensure critical files are saved multiple times per day.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Store backups <\/span><b>in multiple locations<\/b><span style=\"font-weight: 400\">, including <\/span><b>offsite and offline<\/b><span style=\"font-weight: 400\"> storage.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conduct <\/span><b>regular disaster recovery drills<\/b><span style=\"font-weight: 400\"> so employees know how to respond.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use <\/span><b>immutable backups<\/b><span style=\"font-weight: 400\"> to prevent ransomware from modifying stored data.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A strong<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/top-10-best-practices-for-data-protection\/\"> <b>cloud backup in Charleston<\/b><\/a><span style=\"font-weight: 400\"> solution ensures <\/span><b>business continuity<\/b><span style=\"font-weight: 400\"> even in the worst-case scenario.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-2457\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Copy-of-cmit-boise-featured-image-74-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Copy-of-cmit-boise-featured-image-74-1024x535.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Copy-of-cmit-boise-featured-image-74-300x157.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Copy-of-cmit-boise-featured-image-74-768x401.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Copy-of-cmit-boise-featured-image-74.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3><b>2. Implement Multi-Factor Authentication (MFA)<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Relying <\/span><b>only on passwords is a major security risk<\/b><span style=\"font-weight: 400\">. Even with strong passwords, cybercriminals can <\/span><b>steal credentials through phishing, social engineering, or brute-force attacks<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h4><b>Why MFA Matters:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Microsoft reports that <\/span><b>99.2% of cloud malware attacks<\/b><span style=\"font-weight: 400\"> can be <\/span><b>prevented with MFA<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adds an <\/span><b>extra security layer<\/b><span style=\"font-weight: 400\"> by requiring an additional verification step.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Prevents <\/span><b>unauthorized access<\/b><span style=\"font-weight: 400\">, even if a password is compromised.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">By enforcing<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/protect-your-employees-from-these-social-engineering-scams\/\"> <b>Charleston IT security<\/b><\/a><span style=\"font-weight: 400\"> policies, businesses can ensure that all <\/span><b>remote access, admin accounts, and cloud logins require MFA<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h3><b>3. 24\/7 Cloud Security Monitoring<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Malware often lurks in systems <\/span><b>for months before detection<\/b><span style=\"font-weight: 400\">. According to research, <\/span><b>the average time to detect a breach is 204 days<\/b><span style=\"font-weight: 400\">\u2014by then, the damage is already done.<\/span><\/p>\n<h4><b>How to Improve Monitoring:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Deploy <\/span><b>automated security tools<\/b><span style=\"font-weight: 400\"> that continuously scan for malware.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Partner with a<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/maximizing-efficiency-with-managed-services-a-case-study-approach\/\"> <b>managed IT support provider in Charleston<\/b><\/a><span style=\"font-weight: 400\"> for 24\/7 monitoring.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use <\/span><b>Security Information and Event Management (SIEM)<\/b><span style=\"font-weight: 400\"> systems to detect threats in real time.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Set up <\/span><b>instant alerts for suspicious activity<\/b><span style=\"font-weight: 400\"> to respond before malware spreads.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A combination of <\/span><b>human oversight and AI-powered detection<\/b><span style=\"font-weight: 400\"> ensures businesses can <\/span><b>respond swiftly to cyber threats<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h3><b>4. Encrypt Your Cloud Data<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Even if cybercriminals infiltrate your system, <\/span><b>encrypted data remains unreadable without the decryption key<\/b><span style=\"font-weight: 400\">. <\/span><b>Encryption is a crucial defense mechanism<\/b><span style=\"font-weight: 400\"> for preventing data breaches.<\/span><\/p>\n<h4><b>Encryption Best Practices:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encrypt data <\/span><b>both in transit (while being transmitted) and at rest (while stored)<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regularly <\/span><b>rotate encryption keys<\/b><span style=\"font-weight: 400\"> to prevent unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use <\/span><b>end-to-end encryption<\/b><span style=\"font-weight: 400\"> for highly sensitive files and communications.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Partner with a <\/span><b>cloud provider that offers built-in encryption<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Companies implementing<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/strengthening-cyber-defenses-with-managed-cybersecurity-solutions\/\"> <b>cybersecurity services in Charleston<\/b><\/a><span style=\"font-weight: 400\"> should ensure that <\/span><b>all cloud storage and SaaS applications include encryption<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-2456\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Orange-Modern-How-To-Generate-More-YouTube-Viewers-Youtube-Thumbnail-19-1024x576.png\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Orange-Modern-How-To-Generate-More-YouTube-Viewers-Youtube-Thumbnail-19-1024x576.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Orange-Modern-How-To-Generate-More-YouTube-Viewers-Youtube-Thumbnail-19-300x169.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Orange-Modern-How-To-Generate-More-YouTube-Viewers-Youtube-Thumbnail-19-768x432.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/04\/Orange-Modern-How-To-Generate-More-YouTube-Viewers-Youtube-Thumbnail-19.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3><b>5. Ongoing Employee Cybersecurity Training<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Even with the <\/span><b>best security tools<\/b><span style=\"font-weight: 400\">, <\/span><b>human error remains the top cause of security breaches<\/b><span style=\"font-weight: 400\">. Employees may unknowingly:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Click on <\/span><b>malicious links in phishing emails<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Download <\/span><b>infected attachments<\/b><span style=\"font-weight: 400\"> disguised as legitimate files.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use <\/span><b>weak passwords<\/b><span style=\"font-weight: 400\"> or <\/span><b>reuse credentials across multiple accounts<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<\/ul>\n<h4><b>How to Strengthen Employee Training:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conduct <\/span><b>phishing simulations<\/b><span style=\"font-weight: 400\"> to test employee awareness.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implement <\/span><b>mandatory security awareness training<\/b><span style=\"font-weight: 400\"> for all staff.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Provide <\/span><b>clear guidelines on reporting suspicious emails or activity<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Develop <\/span><b>incident response plans<\/b><span style=\"font-weight: 400\"> so employees know how to react to cyber threats.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Businesses can <\/span><b>minimize human-related security risks<\/b><span style=\"font-weight: 400\"> with consistent<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/navigating-it-compliance-a-comprehensive-guide-for-businesses\/\"> <b>Charleston IT compliance<\/b><\/a><span style=\"font-weight: 400\"> policies.<\/span><\/p>\n<h3><b>6. Leverage AI and Machine Learning for Threat Detection<\/b><\/h3>\n<p><span style=\"font-weight: 400\">AI-powered security solutions <\/span><b>analyze vast amounts of data<\/b><span style=\"font-weight: 400\"> to detect unusual behavior <\/span><b>before a full-scale attack occurs<\/b><span style=\"font-weight: 400\">. <\/span><b>Machine learning enhances cybersecurity<\/b><span style=\"font-weight: 400\"> by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Identifying <\/span><b>anomalies in login attempts and cloud activity<\/b><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Detecting <\/span><b>ransomware patterns<\/b><span style=\"font-weight: 400\"> before files are encrypted.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automating <\/span><b>threat response<\/b><span style=\"font-weight: 400\">, such as isolating compromised systems.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">However, businesses should <\/span><b>not rely solely on AI<\/b><span style=\"font-weight: 400\">. Human <\/span><b>oversight and cybersecurity expertise<\/b><span style=\"font-weight: 400\"> remain essential for <\/span><b>effective threat management<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Final Thoughts: Is Your Business Cloud Security Ready?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cloud malware threats <\/span><b>aren\u2019t slowing down<\/b><span style=\"font-weight: 400\">\u2014in fact, they\u2019re evolving rapidly. Businesses must <\/span><b>take proactive steps<\/b><span style=\"font-weight: 400\"> to secure their cloud environments before an attack occurs. By implementing:<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><b>Automated cloud backups<\/b><span style=\"font-weight: 400\"> to protect business data.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <b>Multi-Factor Authentication (MFA)<\/b><span style=\"font-weight: 400\"> to block unauthorized access.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <b>24\/7 cloud security monitoring<\/b><span style=\"font-weight: 400\"> for early malware detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <b>End-to-end encryption<\/b><span style=\"font-weight: 400\"> to safeguard sensitive information.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <b>Employee security training<\/b><span style=\"font-weight: 400\"> to minimize human error risks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <b>AI-driven threat detection<\/b><span style=\"font-weight: 400\"> for real-time malware analysis.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Companies that invest in <\/span><b>comprehensive cloud security strategies<\/b><span style=\"font-weight: 400\"> can <\/span><b>reduce cyber risks, avoid costly data breaches, and protect their business reputation<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For organizations looking to <\/span><b>enhance their cloud security<\/b><span style=\"font-weight: 400\">, <\/span><b>CMIT Solutions of Charleston<\/b><span style=\"font-weight: 400\"> offers <\/span><b>expert cybersecurity and cloud protection services<\/b><span style=\"font-weight: 400\">. Contact us today to <\/span><b>secure your business data and prevent cloud malware threats<\/b><span style=\"font-weight: 400\"> before they strike.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-1747\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2024\/06\/Banner-1024x341.png\" alt=\"\" width=\"1024\" height=\"341\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2024\/06\/Banner-1024x341.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2024\/06\/Banner-300x100.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2024\/06\/Banner-768x256.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2024\/06\/Banner.png 1050w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Few threats are as terrifying or financially damaging as malware. You spend&#8230;<\/p>\n","protected":false},"author":316,"featured_media":2451,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[31,22,157,30,97,17,21,25,141,16,48],"class_list":["post-2455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-achievement","tag-amy-justis","tag-buisness-security","tag-business-community","tag-business-solutions","tag-charleston","tag-charleston-regional-business-journal","tag-client-satisfaction","tag-cmit-charleston","tag-cmit-solutions","tag-compliance"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/2455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/comments?post=2455"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/2455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media\/2451"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media?parent=2455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/categories?post=2455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/tags?post=2455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}