{"id":8494,"date":"2025-10-14T10:09:37","date_gmt":"2025-10-14T03:09:37","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=8494"},"modified":"2025-10-14T10:09:37","modified_gmt":"2025-10-14T03:09:37","slug":"cyber-insurance-perlindungan-penting-di-era-digital-yang-sering-diabaikan-di-indonesia","status":"publish","type":"post","link":"http:\/\/ligaasuransi.com\/en\/cyber-insurance-perlindungan-penting-di-era-digital-yang-sering-diabaikan-di-indonesia\/","title":{"rendered":"Cyber \u200b\u200bInsurance: A Critical Protection in the Digital Age That&#8217;s Often Overlooked in Indonesia"},"content":{"rendered":"<p><\/p>\n<h3><span style=\"font-weight: 400;\">The Digital World, Limitless Risk, and the Role of Insurance Brokers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Modern life today is almost inseparable from digital technology. All business activities\u2014from financial transactions and internal communications to customer data storage\u2014rely on digital systems and internet networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, behind this convenience, there is a big risk that is often ignored by many companies in Indonesia: cyber attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data from the National Cyber \u200b\u200band Crypto Agency (BSSN) recorded that throughout 2023, there were more than 400 million anomalous cyberattack traffic incidents in Indonesia, a sharp increase compared to the previous year. Data breaches, ransomware, phishing, and distributed denial-of-service (DDoS) attacks are becoming increasingly common, affecting large corporations, government agencies, and even MSMEs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, awareness of the importance of financial protection through cyber insurance remains very low. Many business owners assume this risk only affects large corporations or financial institutions. However, the facts show that small businesses are actually more vulnerable to attacks due to their less robust security systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where the role of an insurance broker becomes very important.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Insurance brokers are independent professional advisors who help companies understand, manage, and transfer business risks to insurance companies. In the context of cyber risk, brokers not only sell policies but also help:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify and measure potential cyber risks,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing collateral that suits business needs,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop protection and mitigation strategies,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accompanying the claims process if an incident occurs.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">One of the professional insurance brokers in Indonesia that actively educates the market about the importance of cyber insurance is PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As an experienced broker specializing in corporate, engineering, heavy equipment, cargo, and now cyber risk insurance, L&amp;G Insurance Broker has helped many companies in Indonesia understand and mitigate modern risks, including the ever-increasing cyber threats.<\/span><\/p>\n<hr \/>\n<blockquote><p><b>Contact L&amp;G Insurance Broker now at<\/b> <b>Phone number<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"> <b>08118507773<\/b><\/a><b>for a free consultation before the risks haunt your business.<\/b><\/p><\/blockquote>\n<hr \/>\n<h3><span style=\"font-weight: 400;\">The Harsh Reality: Indonesia Becomes a Target of Cyber \u200b\u200bAttacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Some real-life examples show how serious this threat is:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The National Data Center (PDN) data leak in 2024 caused disruption to public services and data leakage of millions of residents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tokopedia data leak (2020) involving more than 90 million user accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A ransomware attack on Bank Syariah Indonesia (BSI) in 2023, which paralyzed banking services for several days.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attacks on Harapan Kita Hospital and Dharmais Hospital (2021) which disrupted the system service health amidst the pandemic.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">These cases demonstrate that no institution, whether private or government, is completely secure. The digital world has blurred geographical boundaries \u2014 hackers can attack from anywhere, at any time.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">The Financial and Reputational Impact of Cyber \u200b\u200bAttacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">For a business, a cyberattack isn&#8217;t just about data loss. The impact can be far more significant and complex:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Operational downtime \u2013 A crippled system means business stops running.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Loss of customer data \u2013 Including personal information, bank accounts, and transaction records.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Direct financial losses \u2013 Including recovery costs, ransomware ransoms, and digital forensic investigations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reputation damage \u2013 Once a customer loses trust, it is difficult to restore it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal risks \u2013 Violations of the Personal Data Protection Law (Law No. 27\/2022) can result in large fines and lawsuits.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">For example, a company experiencing a customer data breach could be sued for negligence in protecting personal information. These costs can reach hundreds of millions to billions of rupiah\u2014and without insurance coverage, the business must bear the full cost.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">What Is Cyber \u200b\u200bInsurance and Why Is It Important?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance is an insurance product that provides financial protection against losses arising from cyber attacks, data breaches, or IT system failures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This policy not only covers direct losses, but also helps companies with recovery, digital forensics, and legal costs after an incident occurs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Main benefits:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Suffering direct financial losses due to cyber attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cover legal costs and third party compensation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides access to a team of IT forensic experts for data recovery.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Covering the costs of reputation restoration through PR (public relations) services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect employees and customers from potential misuse of personal data.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In other words, cyber insurance helps companies survive financially and operationally when attacked by hackers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Insurance Brokers Are So Necessary<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Purchasing a cyber insurance policy isn&#8217;t something to be taken lightly. Each company has a different digital risk profile, depending on:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Type of industry,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Volume and type of data managed,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT infrastructure,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Number of employees and access systems,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">and the level of internal security policy readiness.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">For this reason, companies need professional insurance brokers to ensure that the policies purchased actually cover the actual risks faced.<\/span><\/p>\n<p><b>The main functions of the broker:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analyze cyber risks and evaluate data security readiness.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Plan appropriate guarantees, including determination of limits and exclusions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compare insurance products from various companies to get the most competitive premiums.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explain the policy wording in detail, to avoid misunderstandings in the future.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accompanying the claims process, ensuring that the insured&#8217;s rights are paid optimally.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker has extensive experience in managing various types of business risks and is now actively developing its Cyber \u200b\u200bRisk &amp; Technology Insurance line to help companies face increasingly complex digital threats.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Types of Insurance in Police Cyber \u200b\u200bInsurance<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance policies typically cover two broad groups of coverage:<\/span><\/p>\n<ol>\n<li><b> First Party Coverage (Protection for the Insured)<\/b><\/li>\n<\/ol>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data Restoration Costs: the cost of recovering or replacing lost data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business Interruption: losses due to the cessation of business activities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber \u200b\u200bExtortion: costs related to ransomware or digital threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forensic Investigation: costs of investigating the cause of the attack.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reputational Damage \/ Crisis Management: public relations and PR costs for image restoration.<\/span><\/li>\n<\/ol>\n<ol>\n<li><b> Third Party Coverage (Third Party Liability)<\/b><\/li>\n<\/ol>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data Breach Liability: legal liability resulting from customer data breaches.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Privacy Liability: claims from third parties due to privacy violations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regulatory Fines and Penalties: fines resulting from violations of personal data regulations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Media Liability: lawsuits resulting from digital content that violates copyright or harms another party.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Information Needed to Purchase Cyber \u200b\u200bInsurance<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Before issuing a policy, the insurance company will conduct underwriting and require fairly detailed data. Typically, a broker will assist with completing a Cyber \u200b\u200bRisk Questionnaire, which includes:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Company profile (type of business, number of employees, location).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT systems and network infrastructure used.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Amount and type of data managed (customer, financial, business secrets).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security measures already implemented (firewall, antivirus, data back-up).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">History of previous cyber incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use of cloud, ERP systems, or remote access.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The better the data provided, the more accurate the risk assessment and premium offered.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bInsurance Claim Process<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When a cyberattack occurs, quick and effective action is crucial. Typically, the claims process involves the following steps:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report immediately to the broker and insurance within 24\u201348 hours.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A digital forensics team will be appointed to investigate the cause and impact.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Documentation of losses must be complete: IT reports, evidence of attacks, loss values.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal liability analysis (if third party data is involved).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Claim payments are made according to the verification results and policy guarantee limits.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Common challenges in claims:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Delay in reporting incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of adequate evidence of attack.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mismatch between attack type and policy wording.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of support from the company&#8217;s internal IT.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This is where L&amp;G Insurance Broker plays a vital role in overseeing the claims process so that it runs quickly, accurately, and produces optimal results.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Cyber \u200b\u200bInsurance Should Be Considered Now<\/span><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The trend of digitalization is growing rapidly \u2014 but so is the threat of cybercrime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Companies that delay protection will only become more vulnerable.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Some reasons why now is a great time to have cyber insurance:<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybercrime is becoming increasingly sophisticated and organized.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personal data protection regulations are becoming stricter.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The cost of recovering from cyber incidents continues to rise.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business reputation is difficult to restore without financial support.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance not only protects companies from financial losses, but also helps restore operations and public trust quickly.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion: It&#8217;s Time to Act Before It&#8217;s Too Late<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200brisk is a real threat in the modern business world. No system is completely immune to cyberattacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, you can managethe riskswith strategic steps: building a strong digital security system and having the right cyber insurance protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Together with PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker), companies can obtain:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comprehensive cyber risk analysis,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Design a policy that suits your needs,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Negotiate the best premiums, and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Professional assistance during the claims process.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Because in the digital world, the question is no longer \u201cwill we be attacked?\u201d, but \u201cwhen will the attack happen?\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And when that happens, only companies that are prepared with cyber insurance and supported by experienced brokers will be able to survive and recover faster.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Want to know if your business has enough protection against cyber attacks?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consult for free with PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) \u2014 a specialist in corporate insurance, technology, and cyber risk in Indonesia.<\/span><\/p>\n<hr \/>\n<p><b>DON&#8217;T WASTE YOUR TIME AND SECURE YOUR FINANCES AND BUSINESS WITH THE RIGHT INSURANCE.<\/b><\/p>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"> <b>0811-8507-773<\/b><\/a> <b>(PHONE \u2013 WHATSAPP \u2013 SMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Website: lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email: halo@lngrisk.co.id<\/span><\/p>\n<hr \/>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>The Digital World, Limitless Risk, and the Role of Insurance Brokers Modern life today is almost inseparable from digital technology. All business activities\u2014from financial transactions and internal communications to customer data storage\u2014rely on digital systems and internet networks. However, behind this convenience, there is a big risk that is often ignored by many companies in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[799],"tags":[1327,357],"class_list":{"0":"post-8494","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-risk-insurance","8":"tag-asuranci-cyber","9":"tag-cyber-insurance"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=8494"}],"version-history":[{"count":1,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8494\/revisions"}],"predecessor-version":[{"id":8497,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8494\/revisions\/8497"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/8496"}],"wp:attachment":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=8494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=8494"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=8494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}