{"id":9253,"date":"2025-11-28T12:45:00","date_gmt":"2025-11-28T05:45:00","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=9253"},"modified":"2025-11-28T12:45:00","modified_gmt":"2025-11-28T05:45:00","slug":"serangan-siber-global-microsoft-2025-peringatan-keras-bagi-perusahaan-untuk-memiliki-asuransi-cyber","status":"publish","type":"post","link":"http:\/\/ligaasuransi.com\/en\/serangan-siber-global-microsoft-2025-peringatan-keras-bagi-perusahaan-untuk-memiliki-asuransi-cyber\/","title":{"rendered":"Microsoft&#8217;s Global Cyberattack 2025: A Dire Warning for Companies to Have Cyber \u200b\u200bInsurance"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The beginning of 2025 was a moment that shook the digital world. A massive cyberattack successfully exploited a zero-day vulnerability in the Microsoft SharePoint system, widely used by companies and government agencies worldwide. As a result, thousands of entities in the United States, Canada, Australia, and Europe experienced data breaches, system disruptions, and even potential financial losses amounting to millions of dollars.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This case serves as a stark reminder that no system is completely secure in the digital age. Even tech giants like Microsoft are not immune to the threat of increasingly sophisticated and systematic hacking. For businesses, this incident underscores one crucial point: cyber risk is no longer just an IT issue, but a real threat to business continuity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine if a similar attack hit a company&#8217;s internal systems in Indonesia\u2014from customer data theft, production system disruptions, to brand reputation damage due to loss of public trust. Such losses would not only cost money to recover from the breach but could also lead to lawsuits from third parties due to the leak of personal information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, amidst the increasingly unpredictable wave of global cyber threats, having cyber insurance is no longer an option, but a strategic necessity. This insurance serves as a financial shield that protects companies from the risks of data loss, operational disruptions, and legal liability resulting from cyber incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To understand and obtain the best cyber protection solutions for your business, trust L&amp;G Insurance Broker. With extensive experience across various industry sectors, L&amp;G is ready to help you assess digital risks, customize coverage, and obtain competitive premiums from leading insurance companies.<\/span><\/p>\n<h3><b>Microsoft Cyberattack Case 2025: What Happened?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In mid-2025, the world was shocked by official reports from various international cybersecurity agencies regarding a major attack targeting Microsoft SharePoint, one of the world&#8217;s most popular business collaboration platforms. A security flaw, or zero-day vulnerability, in the system was successfully exploited by a high-level hacker group, believed to be from a global network with advanced capabilities and vast resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This attack exploited a vulnerability that Microsoft hadn&#8217;t patched yet\u2014hence the term zero-day, as no security patch was available at the time of the attack. Once successfully executed, the hackers gained unauthorized access to the internal networks of organizations using SharePoint, including sensitive data, project documents, and even user credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The governments of the United States, Canada, and Australia were among the primary victims. Public institutions had to shut down some of their systems to prevent further spread. Furthermore, several large companies in the financial, energy, and manufacturing sectors were also affected. Some reported days of operational disruption and millions of dollars in recovery costs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Interestingly, this attack wasn&#8217;t just an attack on Microsoft systems, but rather demonstrated how the global digital supply chain can be a vulnerable area. Many companies around the world that don&#8217;t directly use SharePoint were still impacted because their business partners&#8217; systems were infected first.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This incident has led to one major lesson: no business is truly secure simply because it has a robust security system. Cyber \u200b\u200brisks are interconnected\u2014meaning that even a small vulnerability in a third-party network can open the door to massive losses.<\/span><\/p>\n<h3><b>The Impact of Global Cyber \u200b\u200bAttacks on the Business World<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This global attack on Microsoft SharePoint is more than just a technical incident\u2014it&#8217;s a stark reminder to businesses across the globe that cyber risks now directly impact operational continuity and corporate reputations. On a global scale, this attack demonstrates the fragility of the digital infrastructure that has long been the backbone of modern business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to reports by The Washington Post and Reuters, thousands of public and private entities experienced data breaches and internal system disruptions, including financial data, project planning, and personal information of employees and customers. Some agencies even had to shut down all digital activities during the investigation\u2014resulting in significant lost productivity and additional operational costs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The financial losses from cyberattacks like these can reach unimaginable levels. According to Cybersecurity Ventures (2025), total losses from cybercrime worldwide are estimated to exceed USD 10.5 trillion annually, nearly doubling from the previous five years. This figure even exceeds the combined value of drug trafficking and other organized crime, making cybercrime the largest &#8220;illegal industry&#8221; in the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Beyond the immediate losses, reputational damage is often more difficult to recover from. Companies whose data is compromised often lose the trust of customers and business partners. In today&#8217;s transparent digital world, a single security breach can spread rapidly within hours\u2014leading to decreased sales, contract terminations, and even a drop in stock market value.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, this phenomenon has also opened the eyes of many companies to the importance of integrated cyber risk management, beyond just the use of antivirus or firewalls. Financial protection through Cyber \u200b\u200bInsurance is now considered an integral part of a global company&#8217;s corporate resilience plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance provides a layer of financial defense in the event of an attack\u2014covering the costs of forensic investigations, IT system recovery, crisis communications, and even third-party lawsuits resulting from personal data breaches. In other words, a cyber insurance policy is not only financial protection but also part of a modern business continuity strategy.<\/span><\/p>\n<h3><b>Why Cyber \u200b\u200bInsurance Is Now a Primary Need<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the past, many businesses considered cyber threats solely the purview of the IT department. But now, the reality has changed dramatically. Cyberattacks are no longer just a technical issue\u2014they are strategic threats that can shake the entire foundation of a business, from operations and finances to brand reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We live in an era where nearly every business activity relies on data and connectivity. From customer transactions and payment systems to inter-branch coordination\u2014everything is digital. This means that even a single system flaw or a small employee error could open the door for hackers to steal critical company data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And when it does happen, the costs are significant. According to the IBM Cost of a Data Breach Report 2025, the average loss from a data breach reaches USD 4.88 million per incident, a 15% increase compared to the previous year. The sectors at highest risk are healthcare, financial services, and energy\u2014but this trend is starting to spread to other industries like manufacturing, construction, and even logistics, which are becoming increasingly digital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where Cyber \u200b\u200bInsurance plays a crucial role. This product not only protects companies from losses due to hacking, but also includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System and data recovery costs \u2013 include data restoration, forensic investigation, and replacement of damaged infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third party legal liability \u2013 if a data breach results in legal claims from customers, partners or regulators.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Crisis communications &amp; reputation costs \u2013 including PR services and customer notification to manage public trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business Interruption \u2013 covers financial losses resulting from the interruption of operations due to a cyber attack.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Furthermore, several global insurance companies now offer additional benefits such as cybersecurity awareness training for employees and cyber emergency response team (CERT) assistance in the event of an incident. This means that cyber insurance is not just a &#8220;financial product&#8221; but part of a comprehensive digital protection ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the increasing frequency of attacks and the complexity of threats, having cyber insurance is no longer a luxury, but a necessity. Companies that delay this protection are essentially opening themselves up to a crisis that could destroy their business overnight.<\/span><\/p>\n<h3><b>The Impact of Microsoft SharePoint Zero-Day Attacks on the Business World<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A cyberattack exploiting a zero-day vulnerability in Microsoft SharePoint servers not only rocked government institutions in the US, Canada, and Australia\u2014it also created a ripple effect across businesses worldwide. Why? Because SharePoint is one of the most widely used collaboration and data storage systems for medium- to large-sized companies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When these systems are attacked, the risks include not only temporary operational disruption, but also:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sensitive data leak such as contracts, internal documents, and employee information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Direct financial loss, both due to downtime and system recovery costs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Potential lawsuits from third parties due to customer data leakage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The company&#8217;s reputation is damaged, which is difficult to recover even if the system has been repaired.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This case demonstrates that no system is completely secure, not even those belonging to tech giants. With the increasing frequency and sophistication of attacks, the need for protection through cyber insurance is becoming increasingly urgent\u2014not just as a response, but as a strategic step in risk management.<\/span><\/p>\n<h3><b>Important Lessons from the Microsoft SharePoint Zero-Day Case<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">From this major case, there are several important lessons that companies in Indonesia can learn:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cyber \u200b\u200battacks are cross-border<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">It doesn&#8217;t matter which country you operate in \u2014 cloud systems, servers, and digital platforms are often globally interconnected. If the security chain is weak at one point, the entire network can be impacted.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IT security is no longer just a technical matter<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Cyber \u200b\u200battacks are now included in the category <\/span><i><span style=\"font-weight: 400;\">enterprise risk<\/span><\/i><span style=\"font-weight: 400;\">, on par with financial and reputational risks. Company directors need to place cybersecurity on the strategic agenda.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Recovery preparedness is as important as prevention<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">No system is 100% secure. Therefore, a company&#8217;s ability to recover (resilience) after an attack is a determining factor in business continuity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cyber \u200b\u200binsurance is becoming a vital financial safeguard<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">This insurance can cover the costs of investigation, data recovery, notification to customers, and even lawsuits due to information leaks.<\/span><\/li>\n<\/ol>\n<h3><b>Why This Attack Is a Critical Momentum for the Growth of Cyber \u200b\u200bInsurance in Indonesia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The zero-day attacks on Microsoft SharePoint servers in the United States, Canada, and Australia have served as a global wake-up call\u2014that even the most secure corporate systems can be compromised. And in Indonesia, this is a crucial moment for companies to reassess their preparedness for cyber risks.<\/span><\/p>\n<h4><b>1. Digitalization is moving faster than security readiness<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Since the pandemic, many Indonesian companies have accelerated their digital transformations\u2014from cloud systems and HR applications to e-procurement. However, not all have been accompanied by adequate investment in security. As a result, a &#8220;security gap&#8221; has emerged between technological advancements and corporate cyber resilience.<\/span><\/p>\n<h4><b>2. Personal data protection regulations are getting stricter<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">With the enactment of the Personal Data Protection Law (PDP Law), companies now have greater legal liability in the event of a data breach. Violations can result in administrative sanctions, substantial fines, and reputational damage\u2014all of which can be covered by cyber insurance.<\/span><\/p>\n<h4><b>3. Market need for financial protection after an incident<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">When a cyberattack causes downtime or data loss, the impact is immediately felt on financial statements. Cyber \u200b\u200binsurance has become a crucial financial instrument for maintaining cash flow and business continuity after an attack.<\/span><\/p>\n<h4><b>4. Increased awareness of directors and top management<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200brisk was once considered the responsibility of IT teams. Now, more and more directors and board members recognize that cyberattacks can pose an existential threat to their businesses\u2014as serious as a natural disaster or a partner&#8217;s bankruptcy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Why Cyber \u200b\u200bInsurance Is an Investment, Not an Expense<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Many companies still view cyber insurance as an additional burden. However, in today&#8217;s digital age, this policy is actually an investment in reputational and financial protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance not only covers losses due to hacker attacks, but also includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital forensic investigation to trace the source of the attack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recovery of affected data and systems costs of notification to customers and credit monitoring services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal costs and potential third party damages<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reputation crisis management and public communications<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With tailored coverage, companies can choose the protection most relevant to their operational systems \u2014 from e-commerce and digital banking to IoT-based manufacturing.<\/span><\/p>\n<h3><b>The Role of Insurance Brokers in Getting the Right Cyber \u200b\u200bProtection<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In an increasingly complex cyber risk landscape, choosing the right cyber insurance policy is no easy task. Many companies feel protected by having robust IT security and firewalls in place\u2014but in reality, financial and legal protection isn&#8217;t guaranteed without the right insurance policy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where the role of an insurance broker becomes crucial. Brokers act as trusted advisors, connecting a company&#8217;s specific needs with the best insurance products on the market.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the important roles of brokers in helping companies get optimal cyber protection:<\/span><\/p>\n<h4><b>1. Specific Risk and Exposure Analysis<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Every company has different systems, data, and potential risks. An experienced broker will conduct in-depth risk mapping\u2014assessing security vulnerabilities from operations, IT systems, to personal data regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The aim is for the policy coverage scope to match the company&#8217;s actual risk profile, not just a standard policy of a general nature.<\/span><\/p>\n<h4><b>2. Comparison and Negotiation of Premiums with Various Insurance Companies<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Through a wide network with many local and international insurance companies, brokers can get more competitive premium rates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brokers can also negotiate extended coverage (such as business interruption loss, cyber extortion, or social engineering fraud) without significant premium increases.<\/span><\/p>\n<h4><b>3. Assistance When a Claim Occurs<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">When a cyberattack occurs, a broker is not just an administrative intermediary \u2014 but a strategic partner who helps the claims process run quickly, transparently, and optimally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From document preparation, coordination with the forensic team, to communication with the insurer \u2014 everything is handled to ensure the company can return to operations as soon as possible.<\/span><\/p>\n<h4><b>4. Education and Prevention Strategies<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Brokers also act as risk consultants by providing best practice recommendations in cyber risk management, internal team training, and incident response simulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this way, companies not only \u201creact\u201d when an attack occurs, but are also more prepared and resilient in prevention.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Amidst a wave of increasingly sophisticated global cyberattacks, protection is no longer an option\u2014it&#8217;s a pressing business necessity. Don&#8217;t let data breaches, ransomware, or employee negligence damage your company&#8217;s reputation and finances.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker, as an experienced insurance broker in the field of corporate risk and technology, is ready to help you:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analyze cyber risk exposure comprehensively<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Planning tailored coverage according to your business needs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides premium comparisons from various well-known insurance companies<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Full assistance in the claims process until completion<\/span><\/li>\n<\/ul>\n<h2><b>Conclusion &amp; Closing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The global cyberattack exploiting a Microsoft SharePoint zero-day is stark proof that no company is completely safe from digital threats\u2014whether in the Americas, Europe, Australia, or Indonesia. Cyber \u200b\u200brisks are no longer just technical disruptions, but strategic threats that can halt operations, drain finances, damage reputations, and trigger costly lawsuits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this interconnected digital era, business resilience is determined not only by technology but also by strong financial protection. Cyber \u200b\u200binsurance acts as a last line of defense when IT defenses fail\u2014protecting companies from recovery costs, forensic investigations, business losses, and third-party claims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the ever-increasing complexity of threats, working with a professional insurance broker like L&amp;G Insurance Broker not only provides peace of mind, but ensures your company receives the most appropriate, relevant, and effective protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an era of unpredictable cyber risks, unpreparedness is no longer an option.<\/span><\/p>\n<h4><b>DON&#8217;T WASTE YOUR TIME. SECURE YOUR FINANCES AND BUSINESS WITH THE RIGHT CYBER INSURANCE.<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Get a FREE risk analysis and protection solution tailored to your company.<\/span><\/p>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b> <a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"><span style=\"font-weight: 400;\">0811-8507-773<\/span><\/a> <i><span style=\"font-weight: 400;\">(Call \u2022 WhatsApp \u2022 SMS)<\/span><\/i><\/p>\n<p><b>Website:<\/b> <a href=\"http:\/\/lngrisk.co.id\"><span style=\"font-weight: 400;\">lngrisk.co.id<\/span><\/a> <span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Email:<\/b> <a href=\"mailto:halo@lngrisk.co.id\"><span style=\"font-weight: 400;\">halo@lngrisk.co.id<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>The beginning of 2025 was a moment that shook the digital world. A massive cyberattack successfully exploited a zero-day vulnerability in the Microsoft SharePoint system, widely used by companies and government agencies worldwide. As a result, thousands of entities in the United States, Canada, Australia, and Europe experienced data breaches, system disruptions, and even potential [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[799],"tags":[1298,1475],"class_list":{"0":"post-9253","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-risk-insurance","8":"tag-asuransi-cyber-liability","9":"tag-serangan-siber-microsoft"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/9253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=9253"}],"version-history":[{"count":1,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/9253\/revisions"}],"predecessor-version":[{"id":9255,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/9253\/revisions\/9255"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/9254"}],"wp:attachment":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=9253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=9253"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=9253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}