{"id":246287,"date":"2023-01-16T14:22:05","date_gmt":"2023-01-16T13:22:05","guid":{"rendered":"https:\/\/4itsolutions.com\/?p=246287"},"modified":"2023-03-22T10:59:19","modified_gmt":"2023-03-22T09:59:19","slug":"cyber-recovery-how-it-works-and-how-to-apply-it","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/","title":{"rendered":"Cyber Recovery: how it works and how to apply it"},"content":{"rendered":"<h2><strong>NIST framework: how to measure cybersecurity for companies<\/strong><\/h2>\n<p>The NIST Framework, through the use of a common language and effective best practices, indicates the roadmap to follow for understanding and managing cybersecurity in the company, identifying and prioritizing different corrective activities that can minimize risks related to vulnerabilities or critical issues.<\/p>\n<p>The Framework consists of 5 steps: identification, protection, detection, response, and recovery, the parts that constitute the complete vision for risk management in cybersecurity.<\/p>\n<p><em>Identification<\/em>: understanding the business context and crucial data is critical in order to focus budgets and resources in a consistent way.<\/p>\n<p><em>Protection<\/em>: highlights the most appropriate protections to ensure continuity of service, limiting or containing the impact of a possible cyber attack.<\/p>\n<p><em>Detection<\/em>: Enables the development of all those key activities to identify different events in IT in a timely manner.<\/p>\n<p><em>Response<\/em>: includes activities to undertake in the event of a cyber attack, enabling the company to limit the impact it could have on the company.<\/p>\n<p><em>Recovery<\/em>: Enables timely recovery of compromised assets or services to reduce the damage caused by a cybersecurity incident.<\/p>\n<h2><strong>How to implement a Cyber Recovery strategy in the company?<\/strong><\/h2>\n<p>When we talk about a vault, we are not talking about an entire additional data center, but an on-premise or, even better, public cloud environment.<\/p>\n<p>The vault works through 4 basic steps:<\/p>\n<p>1) Data identified in the first phase as critical are synchronized across the air gap, unblocked by the management server, and replicated to the target storage. The air gap is then closed again once the operation is completed.<\/p>\n<p>2) Through a copy of the data it is possible to choose the configuration that best reflects business needs. The majority choose to keep copies of the data for about a month.<\/p>\n<p>3) Data in the vault are frozen, as additional protection from accidental or intentional deletion.<\/p>\n<p>4) The last step, which is not mandatory for the proper functioning of the vault, analyzes the data to see whether what is being transferred is intact or already corrupted.<\/p>\n<p>In a landscape where cyber attacks are commonplace, every company is forced to struggle <a href=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/\">to build the ideal solution for its cyber resilience<\/a> so that operations can resume quickly. Thus, we can conclude by saying that the stability and continuity of any business relies primarily on its ability to isolate its critical data to ensure its availability and quick recovery after a cyber attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The steady increase in digitization and the related shift to the cloud due to diverse development opportunities, increased flexibility and business agility has also indirectly caused an increase in cyber attacks in the public and private sector worldwide.<br \/>\nEstimating that about every 39 seconds a cyber attack occurs, one would think that it is no longer a matter of &#8220;if&#8221; but rather &#8220;when&#8221; it will be one&#8217;s turn to face an attack on one&#8217;s company. Therefore, it becomes critical to identify critical data and applications that, in the event of an attack, enable normal business operations to be resumed quickly.<\/p>\n","protected":false},"author":4,"featured_media":246280,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[37,48],"tags":[],"class_list":["post-246287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-manageddataprotection-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Recovery: how it works and how to apply it - 4IT Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Recovery: how it works and how to apply it - 4IT Solutions\" \/>\n<meta property=\"og:description\" content=\"The steady increase in digitization and the related shift to the cloud due to diverse development opportunities, increased flexibility and business agility has also indirectly caused an increase in cyber attacks in the public and private sector worldwide. Estimating that about every 39 seconds a cyber attack occurs, one would think that it is no longer a matter of &quot;if&quot; but rather &quot;when&quot; it will be one&#039;s turn to face an attack on one&#039;s company. Therefore, it becomes critical to identify critical data and applications that, in the event of an attack, enable normal business operations to be resumed quickly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-16T13:22:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T09:59:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"393\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefano Papaleo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefano Papaleo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/\"},\"author\":{\"name\":\"Stefano Papaleo\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\"},\"headline\":\"Cyber Recovery: how it works and how to apply it\",\"datePublished\":\"2023-01-16T13:22:05+00:00\",\"dateModified\":\"2023-03-22T09:59:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/\"},\"wordCount\":404,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-2.jpg\",\"articleSection\":[\"IT Security\",\"Managed Data Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/\",\"name\":\"Cyber Recovery: how it works and how to apply it - 4IT Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-2.jpg\",\"datePublished\":\"2023-01-16T13:22:05+00:00\",\"dateModified\":\"2023-03-22T09:59:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-2.jpg\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-2.jpg\",\"width\":750,\"height\":393,\"caption\":\"Cyber Recovery, come funziona?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-how-it-works-and-how-to-apply-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/it-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Recovery: how it works and how to apply it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\",\"name\":\"Stefano Papaleo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"caption\":\"Stefano Papaleo\"},\"description\":\"CTO - Chief Technology Officer\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/stefano_papaleo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Recovery: how it works and how to apply it - 4IT Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Recovery: how it works and how to apply it - 4IT Solutions","og_description":"The steady increase in digitization and the related shift to the cloud due to diverse development opportunities, increased flexibility and business agility has also indirectly caused an increase in cyber attacks in the public and private sector worldwide. Estimating that about every 39 seconds a cyber attack occurs, one would think that it is no longer a matter of \"if\" but rather \"when\" it will be one's turn to face an attack on one's company. Therefore, it becomes critical to identify critical data and applications that, in the event of an attack, enable normal business operations to be resumed quickly.","og_url":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2023-01-16T13:22:05+00:00","article_modified_time":"2023-03-22T09:59:19+00:00","og_image":[{"width":750,"height":393,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg","type":"image\/jpeg"}],"author":"Stefano Papaleo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefano Papaleo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/"},"author":{"name":"Stefano Papaleo","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74"},"headline":"Cyber Recovery: how it works and how to apply it","datePublished":"2023-01-16T13:22:05+00:00","dateModified":"2023-03-22T09:59:19+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/"},"wordCount":404,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg","articleSection":["IT Security","Managed Data Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/","url":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/","name":"Cyber Recovery: how it works and how to apply it - 4IT Solutions","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg","datePublished":"2023-01-16T13:22:05+00:00","dateModified":"2023-03-22T09:59:19+00:00","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-2.jpg","width":750,"height":393,"caption":"Cyber Recovery, come funziona?"},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/"},{"@type":"ListItem","position":3,"name":"IT Security","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/it-security\/"},{"@type":"ListItem","position":4,"name":"Cyber Recovery: how it works and how to apply it"}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74","name":"Stefano Papaleo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","caption":"Stefano Papaleo"},"description":"CTO - Chief Technology Officer","url":"https:\/\/4itsolutions.com\/en\/author\/stefano_papaleo\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=246287"}],"version-history":[{"count":2,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246287\/revisions"}],"predecessor-version":[{"id":246558,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246287\/revisions\/246558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/246280"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=246287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=246287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=246287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}