{"id":88,"date":"2023-12-09T18:05:59","date_gmt":"2023-12-09T18:05:59","guid":{"rendered":"https:\/\/internetsecops.com\/?p=88"},"modified":"2023-12-10T13:41:05","modified_gmt":"2023-12-10T13:41:05","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/internetsecops.com\/?p=88","title":{"rendered":"CyberSecurity"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group alignfull\" style=\"margin-top:0;margin-bottom:0\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-cover alignfull has-parallax\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--superbspacing-xxlarge);padding-right:var(--wp--preset--spacing--superbspacing-medium);padding-bottom:var(--wp--preset--spacing--superbspacing-xxlarge);padding-left:var(--wp--preset--spacing--superbspacing-medium);min-height:287px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div role=\"img\" class=\"wp-block-cover__image-background wp-image-95 has-parallax\" style=\"background-position:50% 50%;background-image:url(https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/fill-image4.jpg)\"><\/div><div class=\"wp-block-cover__inner-container is-layout-constrained wp-container-core-cover-is-layout-b299b26f wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-group is-content-justification-left\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-6228af1a wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-7cfb3101 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-left has-contrast-light-color has-text-color has-superbfont-small-font-size\">CyberSecurity<\/p>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group alignfull\" style=\"padding-top:var(--wp--preset--spacing--superbspacing-xxlarge);padding-right:var(--wp--preset--spacing--superbspacing-small);padding-bottom:var(--wp--preset--spacing--superbspacing-xxlarge);padding-left:var(--wp--preset--spacing--superbspacing-small)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-94cf4cd9 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-ad306d4b wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-left has-primary-color has-text-color has-superbfont-xxsmall-font-size\" style=\"font-style:normal;font-weight:700;letter-spacing:5px;text-transform:uppercase\"><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-superbfont-large-font-size\">What is Cybersecurity?<\/h3>\n\n\n\n<p>The term &#8220;Cyber&#8221; involves information technology related to computers and computer networks. Cybersecurity is the practice of protecting information from various threats within computers and computer networks.<\/p>\n\n\n\n<p>As the world increasingly focuses on digitization across various fields, it introduces numerous technologies. All fields require a digitized platform for storing and analyzing data in the form of information. Therefore, information security or cybersecurity is a critical term today.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-full is-resized has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg\" alt=\"\" class=\"wp-image-9\" style=\"border-radius:20px;width:451px;height:auto\" srcset=\"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg 1024w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF-300x300.jpg 300w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF-150x150.jpg 150w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF-768x768.jpg 768w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF-88x88.jpg 88w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF-900x900.jpg 900w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group alignfull has-background-secondary-background-color has-background\" style=\"margin-top:var(--wp--preset--spacing--superbspacing-xxsmall);margin-bottom:var(--wp--preset--spacing--superbspacing-xxsmall);padding-top:var(--wp--preset--spacing--superbspacing-xxlarge);padding-right:var(--wp--preset--spacing--superbspacing-small);padding-bottom:var(--wp--preset--spacing--superbspacing-xxlarge);padding-left:var(--wp--preset--spacing--superbspacing-small)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-eb030033 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-5f87d255 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-primary-color has-text-color has-superbfont-xxsmall-font-size\" style=\"font-style:normal;font-weight:700;letter-spacing:5px;text-transform:uppercase\">Cybersecurity Elements<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-contrast-color has-text-color has-superbfont-xlarge-font-size\"><\/h2>\n\n\n\n<p class=\"has-text-align-center has-secondary-color has-text-color has-superbfont-small-font-size\">The cybersecurity elements illustrate the following image.<\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n<div class=\"wp-block-image wp-duotone-unset-1\">\n<figure class=\"aligncenter size-large has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"778\" src=\"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-1024x778.png\" alt=\"\" class=\"wp-image-105\" style=\"border-radius:16px\" srcset=\"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-1024x778.png 1024w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-300x228.png 300w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-768x584.png 768w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-1536x1168.png 1536w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1-850x646.png 850w, https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/CyberSecurity-Elements-1.png 1760w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Cybersecurity? The term &#8220;Cyber&#8221; involves information technology related to computers and computer networks. Cybersecurity is the practice of protecting information from various threats within computers and computer networks. As the world increasingly focuses on digitization across various fields, it introduces numerous technologies. All fields require a digitized platform for storing and analyzing data&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyberSecurity - InternetSecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetsecops.com\/?p=88\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberSecurity - InternetSecOps\" \/>\n<meta property=\"og:description\" content=\"What is Cybersecurity? The term &#8220;Cyber&#8221; involves information technology related to computers and computer networks. Cybersecurity is the practice of protecting information from various threats within computers and computer networks. As the world increasingly focuses on digitization across various fields, it introduces numerous technologies. All fields require a digitized platform for storing and analyzing data...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetsecops.com\/?p=88\" \/>\n<meta property=\"og:site_name\" content=\"InternetSecOps\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-09T18:05:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-10T13:41:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/#\\\/schema\\\/person\\\/c074ffefe3f4bfb882a7262a3be17950\"},\"headline\":\"CyberSecurity\",\"datePublished\":\"2023-12-09T18:05:59+00:00\",\"dateModified\":\"2023-12-10T13:41:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88\"},\"wordCount\":81,\"image\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/internetsecops.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/OIG.1YlHJnovEI3nHRPhANPF.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88\",\"url\":\"https:\\\/\\\/internetsecops.com\\\/?p=88\",\"name\":\"CyberSecurity - InternetSecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/internetsecops.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/OIG.1YlHJnovEI3nHRPhANPF.jpg\",\"datePublished\":\"2023-12-09T18:05:59+00:00\",\"dateModified\":\"2023-12-10T13:41:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/#\\\/schema\\\/person\\\/c074ffefe3f4bfb882a7262a3be17950\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/internetsecops.com\\\/?p=88\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#primaryimage\",\"url\":\"https:\\\/\\\/internetsecops.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/OIG.1YlHJnovEI3nHRPhANPF.jpg\",\"contentUrl\":\"https:\\\/\\\/internetsecops.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/OIG.1YlHJnovEI3nHRPhANPF.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/?p=88#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/internetsecops.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberSecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/#website\",\"url\":\"https:\\\/\\\/internetsecops.com\\\/\",\"name\":\"InternetSecOps\",\"description\":\"Insightful articles and tips on cybersecurity operations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/internetsecops.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/internetsecops.com\\\/#\\\/schema\\\/person\\\/c074ffefe3f4bfb882a7262a3be17950\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/internetsecops.com\"],\"url\":\"https:\\\/\\\/internetsecops.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberSecurity - InternetSecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetsecops.com\/?p=88","og_locale":"en_US","og_type":"article","og_title":"CyberSecurity - InternetSecOps","og_description":"What is Cybersecurity? The term &#8220;Cyber&#8221; involves information technology related to computers and computer networks. Cybersecurity is the practice of protecting information from various threats within computers and computer networks. As the world increasingly focuses on digitization across various fields, it introduces numerous technologies. All fields require a digitized platform for storing and analyzing data...","og_url":"https:\/\/internetsecops.com\/?p=88","og_site_name":"InternetSecOps","article_published_time":"2023-12-09T18:05:59+00:00","article_modified_time":"2023-12-10T13:41:05+00:00","og_image":[{"url":"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/internetsecops.com\/?p=88#article","isPartOf":{"@id":"https:\/\/internetsecops.com\/?p=88"},"author":{"name":"admin","@id":"https:\/\/internetsecops.com\/#\/schema\/person\/c074ffefe3f4bfb882a7262a3be17950"},"headline":"CyberSecurity","datePublished":"2023-12-09T18:05:59+00:00","dateModified":"2023-12-10T13:41:05+00:00","mainEntityOfPage":{"@id":"https:\/\/internetsecops.com\/?p=88"},"wordCount":81,"image":{"@id":"https:\/\/internetsecops.com\/?p=88#primaryimage"},"thumbnailUrl":"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/internetsecops.com\/?p=88","url":"https:\/\/internetsecops.com\/?p=88","name":"CyberSecurity - InternetSecOps","isPartOf":{"@id":"https:\/\/internetsecops.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/internetsecops.com\/?p=88#primaryimage"},"image":{"@id":"https:\/\/internetsecops.com\/?p=88#primaryimage"},"thumbnailUrl":"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg","datePublished":"2023-12-09T18:05:59+00:00","dateModified":"2023-12-10T13:41:05+00:00","author":{"@id":"https:\/\/internetsecops.com\/#\/schema\/person\/c074ffefe3f4bfb882a7262a3be17950"},"breadcrumb":{"@id":"https:\/\/internetsecops.com\/?p=88#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetsecops.com\/?p=88"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/internetsecops.com\/?p=88#primaryimage","url":"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg","contentUrl":"https:\/\/internetsecops.com\/wp-content\/uploads\/2023\/12\/OIG.1YlHJnovEI3nHRPhANPF.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/internetsecops.com\/?p=88#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/internetsecops.com\/"},{"@type":"ListItem","position":2,"name":"CyberSecurity"}]},{"@type":"WebSite","@id":"https:\/\/internetsecops.com\/#website","url":"https:\/\/internetsecops.com\/","name":"InternetSecOps","description":"Insightful articles and tips on cybersecurity operations","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetsecops.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/internetsecops.com\/#\/schema\/person\/c074ffefe3f4bfb882a7262a3be17950","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7529cfde317cac90a5d4f1181165fdef213d006b317dc6368404f0300a6c3db6?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/internetsecops.com"],"url":"https:\/\/internetsecops.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetsecops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=88"}],"version-history":[{"count":10,"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/posts\/88\/revisions"}],"predecessor-version":[{"id":108,"href":"https:\/\/internetsecops.com\/index.php?rest_route=\/wp\/v2\/posts\/88\/revisions\/108"}],"wp:attachment":[{"href":"https:\/\/internetsecops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetsecops.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetsecops.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}