{"id":46976,"date":"2021-04-12T04:48:56","date_gmt":"2021-04-12T04:48:56","guid":{"rendered":"https:\/\/www.techwebspace.com\/?p=46976"},"modified":"2021-05-03T13:39:56","modified_gmt":"2021-05-03T13:39:56","slug":"how-web-hosting-affects-security","status":"publish","type":"post","link":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/","title":{"rendered":"How Web Hosting Affects Security"},"content":{"rendered":"\n<p>Website security is an often discussed topic, but not one that seems to be of especial concern for the owners of smaller sites. This is a problem since malicious actors today target everything from high-value websites to personal blogs.<\/p>\n\n\n\n<p>There are many moving parts in website operations &#8211; each of which can be hardened to improve on security. However, one segment sometimes overlooked is web hosting. From the measures taken by the host to the hosting plan chosen, each can have profound security implications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hosting Plan Type Matters<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"877\" height=\"462\" src=\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/botnet.jpg\" alt=\"Hacked accounts can be turned into parts of a botnet, implicating other sites on shared hosting.\" class=\"wp-image-46977\" srcset=\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/botnet.jpg 877w, https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/botnet-300x158.jpg 300w, https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/botnet-768x405.jpg 768w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><figcaption><em>Hacked accounts can be turned into parts of a botnet, implicating other sites on shared hosting. (source: Cloudflare)<\/em><\/figcaption><\/figure>\n\n\n\n<p>Web hosting comes in a few core categories. The most accessible, easiest to manage, and cheapest are shared hosting plans. However, opting for shared hosting does have security implications for your website.<\/p>\n\n\n\n<p>Shared hosting plans often result in hundreds of user accounts crammed onto each physical server. Even if your site is all right security-wise, what happens to other accounts on the same server may implicate yours.<\/p>\n\n\n\n<p>For example, if a site gets hacked and taken control of, the attacker may use it as a point of attack towards other websites. Since shared hosting accounts typically also share IP addresses, your website IP may end up getting blocked or blacklisted as well.<\/p>\n\n\n\n<p>Although shared hosting is a good launching point for new website owners it generally isn\u2019t suitable for extended use. Once you\u2019ve become more familiar with websites and web hosting, consider moving towards a Virtual Private Server (VPS) plan instead.<\/p>\n\n\n\n<p>VPS plans come in siloed environments and will have dedicated resources &#8211; including your own IP address.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Secure Socket Layer Certificate Availability<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"927\" height=\"504\" src=\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/AutoSSL.jpg\" alt=\"\" class=\"wp-image-46978\" srcset=\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/AutoSSL.jpg 927w, https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/AutoSSL-300x163.jpg 300w, https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/AutoSSL-768x418.jpg 768w\" sizes=\"(max-width: 927px) 100vw, 927px\" \/><figcaption><em>cPanel has AutoSSL for easy SSL management, but not all hosts will enable this feature.<\/em><\/figcaption><\/figure>\n\n\n\n<p>One way of protecting your website and its visitors at the same time is by using a <a href=\"https:\/\/www.techwebspace.com\/how-does-ssl-certificate-work\/\">Secure Sockets Layer (SSL) certificate<\/a>. If you don\u2019t want to buy one, some service providers like Let\u2019s Encrypt offer them for free.<\/p>\n\n\n\n<p>Most web hosting providers today are very understanding of the need for SSL and will offer related supporting services. For example, they may include an easy SSL installation utility on your web hosting control panel.<\/p>\n\n\n\n<p>However, not all are so kind. While it may not be deliberate, some SSL providers seem to make the process to install free SSL certificates as difficult as possible. Likely, these are the ones who hope to force you to purchase a commercial SSL certificate from them.<\/p>\n\n\n\n<p>Before signing up with a web host, check on their SSL procedures to see if they offer installation and maintenance features.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Email Affects Your Security Too<\/h2>\n\n\n\n<p>Almost all web hostings allow you to manage emails with your hosting plans. This is great since you won\u2019t need to fork out extra for email hosting. However, not all hosts extend the same level of security where email is concerned.<\/p>\n\n\n\n<p>Pay special attention to whether or not the hosting provider includes features for <a href=\"https:\/\/www.scalahosting.com\/blog\/hosted-spam-filtering\" target=\"_blank\" rel=\"noreferrer noopener\">spam filtering<\/a>. These powerful but often neglected tools can help by monitoring all emails passing through your mail server.<\/p>\n\n\n\n<p>In extreme cases, attackers have been known to exploit loopholes in mail server applications as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrated Content Delivery Network Features<\/h2>\n\n\n\n<p>Aside from letting you manage larger visitor volumes, Content Delivery Networks (CDNs) can mitigate some web attacks as well. For example, CDNs can not only prevent bot floods, but they also work to reduce the impact of Distributed Denial of Service (DDoS) attacks.<\/p>\n\n\n\n<p>While you can certainly sign up for and use any CDN you want, some web hosting companies help by having partnerships with CDN providers.<\/p>\n\n\n\n<p>In cases like these, you will find it much easier to use them compared to set everything up on your own. There are hosts that even go as far as to integrate CDN support on their web hosting control panels, giving you a single point of management for your site.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Firewalls Also Help<\/h2>\n\n\n\n<p>Firewalls help increase website security, and they can be found in many areas. You can have multiple firewalls working together to provide more comprehensive protection. Yet few users actually pay attention to firewall capabilities on their web hosting server.<\/p>\n\n\n\n<p>Note what types of firewalls your potential web host has in place and ensure that they protect their infrastructure at multiple stages. Some web hosting service providers will even work with ace cybersecurity companies like Sucuri for better security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ensure Disaster Recovery is at Hand<\/h2>\n\n\n\n<p>The best plans of mice and men can sometimes come to naught. This is the reason why you need a solid backup and restore system in place even with top security measures taken. While you can do this on your own, web hosting providers will often have some mechanism in place as well.<\/p>\n\n\n\n<p>The differentiating factor here lies in how comprehensive that system is. Some web shots may simply state that they carry out periodic backups. However, you need to ask yourself a couple of other things too. For example:<\/p>\n\n\n\n<ul><li>How often are the backups carried out?<\/li><li>How long are backup cycles retained?<\/li><li>Are offsite backups available?<\/li><li>How easy is it to do a site or account restoration from those backups?<\/li><\/ul>\n\n\n\n<p>In case you\u2019re wondering if this is necessary, entire data centers have been <a href=\"https:\/\/www.datacenterdynamics.com\/en\/news\/fire-destroys-ovhclouds-sbg2-data-center-strasbourg\/\" target=\"_blank\" rel=\"noreferrer noopener\">known to burn down before<\/a>. Do you really want to see your website permanently reduced to ashes?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>As you can see, there are many areas where the features and choices offered by web hosting providers can directly influence your website security. While it isn\u2019t uncommon or strange to be concerned about the prices of web hosting, consider also the effect a security breach can have.<\/p>\n\n\n\n<p>For personal websites, things can be as simple as re-building the site if anything happens. Yet even that will take time and effort &#8211; which also costs money. If you\u2019re running a commercial site, a cybersecurity incident will not just cause monetary loss, but potentially result in devastating brand damage.<\/p>\n\n\n\n<p>Make sure you look towards your web hosting service provider to help prevent website security problems. SImply hardening your website alone isn\u2019t going to cut it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Website security is an often discussed topic, but not one that seems to be of especial concern for the owners of smaller sites. This is a problem since malicious actors today target everything from high-value websites to personal blogs. There are many&#8230;<\/p>\n","protected":false},"author":3233,"featured_media":39666,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1794,2357,2258,450,519],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Web Hosting Affects Security | Tech Web Space<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Web Hosting Affects Security | Tech Web Space\" \/>\n<meta property=\"og:description\" content=\"Website security is an often discussed topic, but not one that seems to be of especial concern for the owners of smaller sites. This is a problem since malicious actors today target everything from high-value websites to personal blogs. There are many...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Web Space\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/atechwebspace\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-12T04:48:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T13:39:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2020\/12\/Converged-Server-Infrastructure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"901\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Chow\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JasonCPF\" \/>\n<meta name=\"twitter:site\" content=\"@techwebspace\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Chow\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\"},\"author\":{\"name\":\"Jason Chow\",\"@id\":\"https:\/\/www.techwebspace.com\/#\/schema\/person\/80e4d12f1059fd33bb8e98e356db099d\"},\"headline\":\"How Web Hosting Affects Security\",\"datePublished\":\"2021-04-12T04:48:56+00:00\",\"dateModified\":\"2021-05-03T13:39:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/www.techwebspace.com\/#organization\"},\"articleSection\":[\"How to\",\"Internet\",\"Managed Services\",\"Online Business\",\"Tips &amp; Tricks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\",\"url\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\",\"name\":\"How Web Hosting Affects Security | Tech Web Space\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwebspace.com\/#website\"},\"datePublished\":\"2021-04-12T04:48:56+00:00\",\"dateModified\":\"2021-05-03T13:39:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwebspace.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Web Hosting Affects Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwebspace.com\/#website\",\"url\":\"https:\/\/www.techwebspace.com\/\",\"name\":\"Tech Web Space\",\"description\":\"Let\u2019s Make Things Better\",\"publisher\":{\"@id\":\"https:\/\/www.techwebspace.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwebspace.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techwebspace.com\/#organization\",\"name\":\"Tech Web Space\",\"url\":\"https:\/\/www.techwebspace.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwebspace.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/cropped-techwebspace-logo3.png\",\"contentUrl\":\"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/cropped-techwebspace-logo3.png\",\"width\":414,\"height\":155,\"caption\":\"Tech Web Space\"},\"image\":{\"@id\":\"https:\/\/www.techwebspace.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/atechwebspace\/\",\"https:\/\/twitter.com\/techwebspace\",\"https:\/\/www.instagram.com\/techwebspace\/\",\"https:\/\/www.pinterest.com\/atechwebspace\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwebspace.com\/#\/schema\/person\/80e4d12f1059fd33bb8e98e356db099d\",\"name\":\"Jason Chow\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwebspace.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dba90071950e1d8dcd36d9c2813ae2c?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dba90071950e1d8dcd36d9c2813ae2c?s=96&r=g\",\"caption\":\"Jason Chow\"},\"description\":\"Jason is a WordPress fan and marketer from webrevene.io. He manages a few websites at the same time. He blogs about topics related to WordPress, social media, WordPress and others. Feel free to connect with him on Twitter.\",\"sameAs\":[\"https:\/\/twitter.com\/JasonCPF\"],\"url\":\"https:\/\/www.techwebspace.com\/author\/jason-chow\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Web Hosting Affects Security | Tech Web Space","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/","og_locale":"en_US","og_type":"article","og_title":"How Web Hosting Affects Security | Tech Web Space","og_description":"Website security is an often discussed topic, but not one that seems to be of especial concern for the owners of smaller sites. This is a problem since malicious actors today target everything from high-value websites to personal blogs. There are many...","og_url":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/","og_site_name":"Tech Web Space","article_publisher":"https:\/\/www.facebook.com\/atechwebspace\/","article_published_time":"2021-04-12T04:48:56+00:00","article_modified_time":"2021-05-03T13:39:56+00:00","og_image":[{"width":1500,"height":901,"url":"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2020\/12\/Converged-Server-Infrastructure.jpg","type":"image\/jpeg"}],"author":"Jason Chow","twitter_card":"summary_large_image","twitter_creator":"@JasonCPF","twitter_site":"@techwebspace","twitter_misc":{"Written by":"Jason Chow","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#article","isPartOf":{"@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/"},"author":{"name":"Jason Chow","@id":"https:\/\/www.techwebspace.com\/#\/schema\/person\/80e4d12f1059fd33bb8e98e356db099d"},"headline":"How Web Hosting Affects Security","datePublished":"2021-04-12T04:48:56+00:00","dateModified":"2021-05-03T13:39:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/www.techwebspace.com\/#organization"},"articleSection":["How to","Internet","Managed Services","Online Business","Tips &amp; Tricks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/","url":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/","name":"How Web Hosting Affects Security | Tech Web Space","isPartOf":{"@id":"https:\/\/www.techwebspace.com\/#website"},"datePublished":"2021-04-12T04:48:56+00:00","dateModified":"2021-05-03T13:39:56+00:00","breadcrumb":{"@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwebspace.com\/how-web-hosting-affects-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwebspace.com\/"},{"@type":"ListItem","position":2,"name":"How Web Hosting Affects Security"}]},{"@type":"WebSite","@id":"https:\/\/www.techwebspace.com\/#website","url":"https:\/\/www.techwebspace.com\/","name":"Tech Web Space","description":"Let\u2019s Make Things Better","publisher":{"@id":"https:\/\/www.techwebspace.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwebspace.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techwebspace.com\/#organization","name":"Tech Web Space","url":"https:\/\/www.techwebspace.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwebspace.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/cropped-techwebspace-logo3.png","contentUrl":"https:\/\/www.techwebspace.com\/wp-content\/uploads\/2021\/04\/cropped-techwebspace-logo3.png","width":414,"height":155,"caption":"Tech Web Space"},"image":{"@id":"https:\/\/www.techwebspace.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/atechwebspace\/","https:\/\/twitter.com\/techwebspace","https:\/\/www.instagram.com\/techwebspace\/","https:\/\/www.pinterest.com\/atechwebspace\/"]},{"@type":"Person","@id":"https:\/\/www.techwebspace.com\/#\/schema\/person\/80e4d12f1059fd33bb8e98e356db099d","name":"Jason Chow","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwebspace.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6dba90071950e1d8dcd36d9c2813ae2c?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dba90071950e1d8dcd36d9c2813ae2c?s=96&r=g","caption":"Jason Chow"},"description":"Jason is a WordPress fan and marketer from webrevene.io. He manages a few websites at the same time. He blogs about topics related to WordPress, social media, WordPress and others. Feel free to connect with him on Twitter.","sameAs":["https:\/\/twitter.com\/JasonCPF"],"url":"https:\/\/www.techwebspace.com\/author\/jason-chow\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/posts\/46976"}],"collection":[{"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/users\/3233"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/comments?post=46976"}],"version-history":[{"count":6,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/posts\/46976\/revisions"}],"predecessor-version":[{"id":47115,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/posts\/46976\/revisions\/47115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/media\/39666"}],"wp:attachment":[{"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/media?parent=46976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/categories?post=46976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwebspace.com\/wp-json\/wp\/v2\/tags?post=46976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}