{"id":4705,"date":"2023-04-15T20:05:51","date_gmt":"2023-04-15T18:05:51","guid":{"rendered":"https:\/\/irg-net.com\/?p=4705"},"modified":"2023-04-15T22:05:51","modified_gmt":"2023-04-15T20:05:51","slug":"re-re-imagining-ransomware-protection-with","status":"publish","type":"post","link":"https:\/\/irg-net.com\/index.php\/re-re-imagining-ransomware-protection-with\/","title":{"rendered":"RE: Re-Imagining Ransomware Protection with&#8230;"},"content":{"rendered":"<p>RE: Re-Imagining Ransomware Protection with VMware Ransomware Recovery<\/p>\n<p><a href='https:\/\/dy.si\/9fcqV' target='_blank' rel=\"noopener\"><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320'><\/a><\/p>\n<h4><a href='https:\/\/dy.si\/9fcqV' style='text-decoration: none;' target='_blank' rel=\"noopener\">RE: Re-Imagining Ransomware Protection with&#8230;<\/a><\/h4>\n<p>Duncan Epping | Last week a blog post was published on VMware\u2019s Virtual Blocks blog on the topic of Ransomware Recovery. Some of the numbers shared were astonishing and hard to contextualize even. Global damages caused by ransomware for instance are estimated to exceed 42 billion dollars in 2024 [\u2026]<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank' rel=\"noopener\">VMware Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RE: Re-Imagining Ransomware Protection with VMware Ransomware Recovery RE: Re-Imagining Ransomware Protection with&#8230; Duncan Epping | Last week a blog post was published on VMware\u2019s Virtual Blocks blog on the topic of Ransomware Recovery. Some of the numbers shared were astonishing and hard to contextualize even. Global damages caused by ransomware for instance are estimated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4705","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RE: Re-Imagining Ransomware Protection with... - irgNET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RE: Re-Imagining Ransomware Protection with... - irgNET\" \/>\n<meta property=\"og:description\" content=\"RE: Re-Imagining Ransomware Protection with VMware Ransomware Recovery RE: Re-Imagining Ransomware Protection with&#8230; Duncan Epping | Last week a blog post was published on VMware\u2019s Virtual Blocks blog on the topic of Ransomware Recovery. Some of the numbers shared were astonishing and hard to contextualize even. Global damages caused by ransomware for instance are estimated [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/\" \/>\n<meta property=\"og:site_name\" content=\"irgNET\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-15T18:05:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-15T20:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320\" \/>\n<meta name=\"author\" content=\"H. Cemre G\u00fcnay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@irg_net\" \/>\n<meta name=\"twitter:site\" content=\"@irg_net\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"H. Cemre G\u00fcnay\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/\"},\"author\":{\"name\":\"H. Cemre G\u00fcnay\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/71b46e79e8c12bdc8e610214a6621a66\"},\"headline\":\"RE: Re-Imagining Ransomware Protection with&#8230;\",\"datePublished\":\"2023-04-15T18:05:51+00:00\",\"dateModified\":\"2023-04-15T20:05:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/\"},\"wordCount\":69,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/58a77734-ce00-4b35-ad87-e4473eda0171\\\/?size=Box320\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/\",\"name\":\"RE: Re-Imagining Ransomware Protection with... - irgNET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/58a77734-ce00-4b35-ad87-e4473eda0171\\\/?size=Box320\",\"datePublished\":\"2023-04-15T18:05:51+00:00\",\"dateModified\":\"2023-04-15T20:05:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/58a77734-ce00-4b35-ad87-e4473eda0171\\\/?size=Box320\",\"contentUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/58a77734-ce00-4b35-ad87-e4473eda0171\\\/?size=Box320\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/re-re-imagining-ransomware-protection-with\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RE: Re-Imagining Ransomware Protection with&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"name\":\"irgNET\",\"description\":\"a virtual Knowledge Base\",\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\",\"name\":\"irg-NET\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"width\":2048,\"height\":2048,\"caption\":\"irg-NET\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/irg_net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/h-cemre-g\u00fcnay-2b61601b4\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC8GknhO5YMAkAoVxppu6aaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/71b46e79e8c12bdc8e610214a6621a66\",\"name\":\"H. Cemre G\u00fcnay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g\",\"caption\":\"H. Cemre G\u00fcnay\"},\"sameAs\":[\"http:\\\/\\\/192.168.34.155\\\/wordpress\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RE: Re-Imagining Ransomware Protection with... - irgNET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/","og_locale":"en_US","og_type":"article","og_title":"RE: Re-Imagining Ransomware Protection with... - irgNET","og_description":"RE: Re-Imagining Ransomware Protection with VMware Ransomware Recovery RE: Re-Imagining Ransomware Protection with&#8230; Duncan Epping | Last week a blog post was published on VMware\u2019s Virtual Blocks blog on the topic of Ransomware Recovery. Some of the numbers shared were astonishing and hard to contextualize even. Global damages caused by ransomware for instance are estimated [&hellip;]","og_url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/","og_site_name":"irgNET","article_published_time":"2023-04-15T18:05:51+00:00","article_modified_time":"2023-04-15T20:05:51+00:00","og_image":[{"url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320","type":"","width":"","height":""}],"author":"H. Cemre G\u00fcnay","twitter_card":"summary_large_image","twitter_creator":"@irg_net","twitter_site":"@irg_net","twitter_misc":{"Written by":"H. Cemre G\u00fcnay"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#article","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/"},"author":{"name":"H. Cemre G\u00fcnay","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/71b46e79e8c12bdc8e610214a6621a66"},"headline":"RE: Re-Imagining Ransomware Protection with&#8230;","datePublished":"2023-04-15T18:05:51+00:00","dateModified":"2023-04-15T20:05:51+00:00","mainEntityOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/"},"wordCount":69,"commentCount":0,"publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320","articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/","name":"RE: Re-Imagining Ransomware Protection with... - irgNET","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#primaryimage"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320","datePublished":"2023-04-15T18:05:51+00:00","dateModified":"2023-04-15T20:05:51+00:00","breadcrumb":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#primaryimage","url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320","contentUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/58a77734-ce00-4b35-ad87-e4473eda0171\/?size=Box320"},{"@type":"BreadcrumbList","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/re-re-imagining-ransomware-protection-with\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/"},{"@type":"ListItem","position":2,"name":"RE: Re-Imagining Ransomware Protection with&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","name":"irgNET","description":"a virtual Knowledge Base","publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization","name":"irg-NET","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","contentUrl":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","width":2048,"height":2048,"caption":"irg-NET"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/irg_net","https:\/\/www.linkedin.com\/in\/h-cemre-g\u00fcnay-2b61601b4\/","https:\/\/www.youtube.com\/channel\/UC8GknhO5YMAkAoVxppu6aaQ"]},{"@type":"Person","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/71b46e79e8c12bdc8e610214a6621a66","name":"H. Cemre G\u00fcnay","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f5d90a0ec651cb5003605e56e8ba104f93bc11230562284db56c845df9d54d?s=96&r=g","caption":"H. Cemre G\u00fcnay"},"sameAs":["http:\/\/192.168.34.155\/wordpress"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/4705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/comments?post=4705"}],"version-history":[{"count":1,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/4705\/revisions"}],"predecessor-version":[{"id":4706,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/4705\/revisions\/4706"}],"wp:attachment":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/media?parent=4705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/categories?post=4705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/tags?post=4705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}