{"id":1480,"date":"2023-06-26T07:08:30","date_gmt":"2023-06-26T11:08:30","guid":{"rendered":"https:\/\/verito.com\/blog\/?p=1480"},"modified":"2026-05-02T04:46:58","modified_gmt":"2026-05-02T08:46:58","slug":"cybersecurity-metrics","status":"publish","type":"post","link":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/","title":{"rendered":"5 Cybersecurity Metrics You Should Never Ignore"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the current era, technology has woven its intricate web into every facet of our lives. As businesses embrace the boundless opportunities interconnected systems bring, they also unwittingly expose themselves to a hidden nemesis &#8211; cyber threats. Indeed, vulnerabilities lurk around every corner, so ensuring robust cybersecurity measures has become imperative.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With cyber-attacks growing in frequency, sophistication, and impact, organizations and individuals must fortify their defenses. The stakes are higher than ever, as a single breach can compromise sensitive data, cripple operations, and tarnish reputations. The first step toward combating the possible consequences is to arm yourself with the right knowledge and adopt a proactive approach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To truly understand the effectiveness of our defenses, you must go beyond the basics. This is where cybersecurity metrics enable us to gauge our preparedness, identify vulnerabilities, and measure our progress.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s find out more about these metrics in detail.<\/span><\/p>\n<h2 id=\"what-are-cybersecurity-metrics\"><b>What are Cybersecurity Metrics?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity metrics are quantitative and qualitative measures used to assess various aspects of an organization&#8217;s cybersecurity posture. These metrics provide insights into the effectiveness of security controls and the overall risk management plan. Tracking and analyzing these metrics, you can identify weaknesses, measure progress, and make data-driven decisions to enhance defenses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These metrics can encompass many areas within your organization&#8217;s security framework. Some common categories of cybersecurity metrics include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident Response Metrics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerability Management Metrics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">User Awareness Metrics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance Metrics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk Management Metrics<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It&#8217;s important to note that selecting cybersecurity metrics should align with your organization&#8217;s specific goals, industry requirements, and risk tolerance. By regularly monitoring and analyzing these metrics, you can gain valuable insights into their security posture.<\/span><\/p>\n<p><strong>Recommended Read: <a href=\"https:\/\/verito.com\/blog\/all-about-dark-web\/\" target=\"_blank\" rel=\"dofollow\" >What is the Dark Web and How Should You Look at It?<\/a><\/strong><\/p>\n<h2 id=\"why-do-cybersecurity-metrics-matter\"><b>Why Do Cybersecurity Metrics Matter?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Statistics never lie. Particularly when it is about cybersecurity, they offer a stark reality check. The average <\/span><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">cost of a data breach<\/span><\/a><span style=\"font-weight: 400;\"> in 2022 reached a staggering US$4.35 million. That&#8217;s not a number to be taken lightly.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity metrics matter for several important reasons, including the following:<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"assessment-of-the-security-posture\"><b>Assessment of the security posture<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cybersecurity metrics provide a way to accurately assess your organization&#8217;s security posture. They help measure the effectiveness of security controls, incident response capabilities, and vulnerability management practices. By tracking these metrics over time, you can gauge their progress in addressing security risks and vulnerabilities.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"identification-of-weaknesses\"><b>Identification of weaknesses<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Various metrics enable organizations to identify areas of vulnerability in their cybersecurity defenses. They help pinpoint specific security gaps in incident detection and response, <\/span>patch management<b>, <\/b><span style=\"font-weight: 400;\">user awareness, or compliance. This allows organizations to prioritize and allocate resources effectively to strengthen those areas.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"data-driven-decision-making\"><b>Data-driven decision making<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cybersecurity metrics also provide tangible data that supports informed decision-making. Instead of relying solely on subjective assessments or gut feelings, you can base the security strategies on quantifiable metrics. These metrics offer insights into the effectiveness of security initiatives and allow for more targeted and effective investments.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"benchmarking-and-comparison\"><b>Benchmarking and comparison<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">They also help benchmark security performance against industry standards, best practices, and peers. By comparing their metrics to similar organizations or industry benchmarks, you can identify areas where you may need to catch up or improve.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"roi-demonstration\"><b>ROI demonstration<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cybersecurity metrics can help your organization justify the investment in security initiatives and demonstrate the ROI. By tracking and presenting metrics that show improvements in incident response times or reduced vulnerabilities, you can showcase the value and impact of their cybersecurity efforts to the stakeholders.<\/span><\/p>\n<p><strong>Recommended Read: <a href=\"https:\/\/verito.com\/blog\/top-cybersecurity-stats-for-2026-a-must-read\/\" target=\"_blank\" rel=\"dofollow noopener\">Top Cybersecurity Stats for 2026 You Must Know<\/a><\/strong><\/p>\n<h2 id=\"list-of-cybersecurity-metrics-you-must-know-about\"><b>List of Cybersecurity Metrics You Must Know About<\/b><\/h2>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"number-of-security-incidents\"><b>Number of security incidents<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The number of security incidents is a fundamental metric that tracks an organization&#8217;s total count of security incidents over a specific period. It quantitatively measures the frequency and volume of security events or breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This metric is crucial because it highlights the prevalence of security incidents. You can gain insight into your organization&#8217;s security controls by tracking the number of security incidents. If the number of security incidents decreases or remains low, your organization&#8217;s incident detection and response capabilities effectively mitigate threats.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"mean-time-to-detect-mttd\"><b>Mean Time to Detect (MTTD)\u00a0<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">MTTD, as a cybersecurity metric, measures the average time it takes to detect a security incident from the moment it occurs. It quantifies the efficiency of your organization&#8217;s incident detection capabilities and provides insights into the speed at which security events are identified.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is considered one of the most essential cybersecurity metrics as it helps organizations understand how quickly they can recognize and respond to security incidents. It is a key indicator of incident response efficiency. A lower MTTD suggests that security incidents are detected promptly, enabling faster response and mitigation efforts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember that the longer it takes to detect a security incident, the more time attackers have to infiltrate systems, move laterally, and potentially cause damage or exfiltrate sensitive data.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"mean-time-to-respond-mttr\"><b>Mean Time to Respond (MTTR)\u00a0<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Mean Time to Respond measures the average time it takes to respond to and resolve a security incident once it has been detected. It provides insights into the effectiveness and efficiency of your organization&#8217;s incident response process from when an incident is identified until it is fully mitigated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MTTR is a critical metric that helps businesses understand how quickly they can contain and remediate security incidents. A lower MTTR suggests that incidents are addressed promptly and efficiently, reducing the impact and minimizing the potential for further damage. It indicates that your organization has well-defined incident response procedures in place.<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"patching-cadence\"><b>Patching cadence<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Patching cadence measures the frequency and timeliness with which your organization applies patches and updates to its software, systems, and applications. It provides insights into the ability to address known vulnerabilities and protect against potential exploits. Timely patching is critical for maintaining systems&#8217; security and integrity, which makes this metric quite significant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another reason why patching cadence is important is that software vulnerabilities are discovered regularly, and vendors release patches and updates to address these vulnerabilities. A proactive and frequent patching rhythm ensures that known vulnerabilities are mitigated promptly.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3 id=\"vulnerability-remediation-rate\"><b>Vulnerability remediation rate<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The vulnerability remediation rate measures the speed and effectiveness of your organization&#8217;s efforts to address identified vulnerabilities in the systems and applications. It quantifies the rate at which vulnerabilities are remediated or resolved within a given timeframe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What makes it one of the most crucial cybersecurity metrics is its insights into how efficiently you can manage and mitigate vulnerabilities. For example, a high vulnerability remediation rate indicates that vulnerabilities are addressed promptly. It also measures an organization&#8217;s ability to actively reduce its attack surface by eliminating known weaknesses.<\/span><\/p>\n<p><strong>Also Read: <a href=\"https:\/\/verito.com\/blog\/the-changing-face-of-cybersecurity-for-tax-and-accounting-professionals\/\" target=\"_blank\" rel=\"dofollow\" >The Changing Face of Cybersecurity for Tax and Accounting Professionals<\/a><\/strong><\/p>\n<h2 id=\"leverage-veritos-managed-it-services-for-effective-threat-remediation\"><b>Leverage Verito\u2019s Managed IT Services for Effective Threat Remediation<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Maintaining a strong cybersecurity posture and effectively managing cybersecurity metrics is complex and challenging for any organization. However, you can partner with Verito Technologies, and we will address these challenges for you while maximizing the effectiveness of cybersecurity efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We specialize in providing <\/span><a href=\"https:\/\/verito.com\/managed-it-services\" target=\"_blank\" rel=\"dofollow noopener\"><span style=\"font-weight: 400;\">comprehensive managed IT services<\/span><\/a><span style=\"font-weight: 400;\">, including cybersecurity management. To discuss your business-specific requirements, contact us at 1855-583-7486.<\/span><\/p>\n<p><strong>Recommended Read:<\/strong> <a href=\"https:\/\/verito.com\/blog\/why-hire-managed-it-support-service-provider\/\" target=\"_blank\" rel=\"dofollow noopener\">Should You Hire a Managed IT Support Service Provider?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"In the current era, technology has woven its intricate web into every facet of our lives. As businesses&hellip;\n","protected":false},"author":12,"featured_media":1481,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[104],"tags":[],"class_list":{"0":"post-1480","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-managed-it-services"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Cybersecurity Metrics You Should Never Ignore<\/title>\n<meta name=\"description\" content=\"Cybersecurity metrics are quantitative and qualitative measures used to assess various aspects of an organization&#039;s cybersecurity posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verito.com\/blog\/cybersecurity-metrics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Cybersecurity Metrics You Should Never Ignore\" \/>\n<meta property=\"og:description\" content=\"In the current era, technology has woven its intricate web into every facet of our lives. As businesses embrace the boundless opportunities interconnected\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verito.com\/blog\/cybersecurity-metrics\/\" \/>\n<meta property=\"og:site_name\" content=\"Verito Technologies | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-26T11:08:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T08:46:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Camren Majors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camren Majors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Cybersecurity Metrics You Should Never Ignore","description":"Cybersecurity metrics are quantitative and qualitative measures used to assess various aspects of an organization's cybersecurity posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/","og_locale":"en_US","og_type":"article","og_title":"5 Cybersecurity Metrics You Should Never Ignore","og_description":"In the current era, technology has woven its intricate web into every facet of our lives. As businesses embrace the boundless opportunities interconnected","og_url":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/","og_site_name":"Verito Technologies | Blog","article_published_time":"2023-06-26T11:08:30+00:00","article_modified_time":"2026-05-02T08:46:58+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png","type":"image\/png"}],"author":"Camren Majors","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camren Majors","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#article","isPartOf":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/"},"author":{"name":"Camren Majors","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e"},"headline":"5 Cybersecurity Metrics You Should Never Ignore","datePublished":"2023-06-26T11:08:30+00:00","dateModified":"2026-05-02T08:46:58+00:00","mainEntityOfPage":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/"},"wordCount":1194,"publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"image":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png","articleSection":["Managed IT Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/","url":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/","name":"5 Cybersecurity Metrics You Should Never Ignore","isPartOf":{"@id":"https:\/\/verito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#primaryimage"},"image":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png","datePublished":"2023-06-26T11:08:30+00:00","dateModified":"2026-05-02T08:46:58+00:00","description":"Cybersecurity metrics are quantitative and qualitative measures used to assess various aspects of an organization's cybersecurity posture.","breadcrumb":{"@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verito.com\/blog\/cybersecurity-metrics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#primaryimage","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2023\/06\/Cybersecurity-Metrics-You-Should-Never-Ignore.png","width":1000,"height":500,"caption":"Cybersecurity Metrics"},{"@type":"BreadcrumbList","@id":"https:\/\/verito.com\/blog\/cybersecurity-metrics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Managed IT Services","item":"https:\/\/verito.com\/blog\/category\/managed-it-services\/"},{"@type":"ListItem","position":3,"name":"5 Cybersecurity Metrics You Should Never Ignore"}]},{"@type":"WebSite","@id":"https:\/\/verito.com\/blog\/#website","url":"https:\/\/verito.com\/blog\/","name":"Verito Technologies | Blog","description":"Verito Technologies Blog","publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verito.com\/blog\/#organization","name":"Verito Technologies","url":"https:\/\/verito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","width":625,"height":208,"caption":"Verito Technologies"},"image":{"@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/865ad0905f2ef35c7587605a88ab6c1e","name":"Camren Majors","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77bfceda618286bd3464259eedc244dda94e71f2d7782a878cb75fd25c966426?s=96&d=mm&r=g","caption":"Camren Majors"},"description":"Camren Majors is co-founder and Chief Revenue Officer of Verito Technologies, a cloud hosting and managed IT company built exclusively for tax and accounting firms. He is the co-author of Beyond Best Practices: Modernizing the Successful Accounting Firm (2026). His work has been featured in NATP TAXPRO Magazine and he has presented for NATP, NAEA, and NSA."}]}},"_links":{"self":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/comments?post=1480"}],"version-history":[{"count":6,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions"}],"predecessor-version":[{"id":2766,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions\/2766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media\/1481"}],"wp:attachment":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media?parent=1480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/categories?post=1480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/tags?post=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}