{"id":8693,"date":"2025-10-23T09:20:36","date_gmt":"2025-10-23T02:20:36","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=8693"},"modified":"2025-10-23T09:20:36","modified_gmt":"2025-10-23T02:20:36","slug":"peran-broker-asuransi-dalam-mengelola-risiko-siber-dan-keamanan-data-perusahaan","status":"publish","type":"post","link":"https:\/\/ligaasuransi.com\/en\/peran-broker-asuransi-dalam-mengelola-risiko-siber-dan-keamanan-data-perusahaan\/","title":{"rendered":"The Role of Insurance Brokers in Managing Cyber \u200b\u200bRisk and Corporate Data Security"},"content":{"rendered":"<p><\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bRisk Is No Longer an Option, But a Necessity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In the digital age, data is a company&#8217;s most valuable asset. Unfortunately, precisely because of this value, data is a prime target for cyberattacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Indonesia, cases of hacking and data leaks have increased sharply \u2014 from the banking sector, logistics, to government agencies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The National Data Center (PDN) was hacked, paralyzing thousands of public services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bank Syariah Indonesia (BSI) experienced ransomware which resulted in operational disruptions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Local startups and e-commerce companies often fall victim to phishing, data breaches, and ransomware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The financial and reputational impact of these incidents is enormous. More worryingly, many companies lack a comprehensive cyber risk management strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) comes in \u2014 not just as a policy broker, but as a strategic partner in cyber risk management and data protection.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Cyber \u200b\u200bRisk: A Major Challenge for Modern Business<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200brisks are not only about data loss, but also business disruption and financial loss.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the most common risks include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data Breach \u2013 theft or leakage of customer, employee, or business partner data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ransomware \u2013 an attack that locks a company&#8217;s systems and demands a ransom.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business Interruption \u2013 company operations come to a complete halt due to a system attack.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social Engineering Fraud \u2013 psychological manipulation to steal funds or system access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reputational Damage \u2013 loss of public and customer trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regulatory Penalties \u2013 fines for violations of the Personal Data Protection Act (PDP Act).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">These attacks can affect anyone \u2014 large companies, startups, and public institutions.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Therefore, cyber risk management must be both preventive and protective.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Cyber \u200b\u200bRisk Management Can&#8217;t Be Done Alone<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Many companies think that having an IT Security team is enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, cyber risk is multidisciplinary \u2014 involving technological, legal, financial, and reputational aspects.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some common weaknesses:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The IT team only focuses on system security, not the financial impact.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal departments often do not understand the implications of insurance policy wording.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The finance department has no backup strategy in case of cyber loss.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Without integration between these functions, the protection strategy becomes fragile.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Therefore, companies need professional insurance brokers such as L&amp;G Insurance Broker to bridge all these aspects into one integrated protection system.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">The Role of Insurance Brokers in Cyber \u200b\u200bRisk Management<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Insurance brokers have a role that goes far beyond simply \u201cpolicy sellers.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the context of cyber risk, the broker&#8217;s function is as a strategic partner in digital risk management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are four key roles L&amp;G plays in helping companies address cyber threats:<\/span><\/p>\n<ol>\n<li><b> Risk Assessment dan Mapping<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G helps clients conduct comprehensive assessments of digital risks, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT infrastructure and cloud usage,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data access policy,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Backup and recovery system,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vendor or third party involvement,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">and exposure to customer data.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The results are used to determine the appropriate type of insurance coverage and coverage limits.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Cyber \u200b\u200bInsurance Program Design<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Every company has a unique risk profile.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G ensures that the policies prepared are truly tailored to business needs, taking into account:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coverage: data breach, ransomware, fraud, lost revenue, regulatory fines, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proportional limits and deductibles.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Additional clauses (endorsements) according to industry needs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realistic incident response mechanisms.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With this approach, companies do not purchase policies that are excessive or conversely \u2014 too narrow.<\/span><\/p>\n<ol start=\"3\">\n<li><b>3<\/b><b>. Regulatory Compliance Assistance<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Law No. 27 of 2022 concerning Personal Data Protection (PDP) requires every data controller to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report data leak incidents within a maximum of 3&#215;24 hours,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have a security system and data protection documentation,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Responsible for the loss of data subjects.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">L&amp;G helps clients prepare a compliance framework to avoid fines and legal claims.<\/span><\/p>\n<ol start=\"4\">\n<li><b> Claims and Recovery Assistance<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the event of a cyber attack, the claims process is usually complicated:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Requires forensic audit,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Involving regulators and legal parties,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It takes time and precise documentation.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">L&amp;G acts as a claims advocate, ensuring the insurer pays as agreed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brokers also coordinate with IT forensics vendors, legal consultants, and crisis PR firms to help restore a company&#8217;s reputation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Case Study: Effective Broker-Company Collaboration<\/span><\/h3>\n<p><b>\ud83d\udca1<\/b><b>Case 1 \u2013 Ransomware Attack on a Logistics Company<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A logistics company in Jakarta experienced a ransomware attack that crippled its operational servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With broker assistance:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incidents are reported to the insurer within 24 hours,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital forensics was done in 3 days,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Claims worth Rp 8.7 billion were approved and paid within 60 days.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Without a broker, claims reports can be delayed due to lack of documentation and procedures.<\/span><\/p>\n<p><b>\ud83d\udca1<\/b><b>Case 2 \u2013 Patient Data Leak at Hospital<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A private hospital experienced a data leak of 15,000 patients.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brokers help prepare public communications, reports to regulators, and claims filings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Rp 5.2 billion claim was approved \u2014 including crisis PR costs and compensation to patients.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>The Benefits of Having an Insurance Broker in Cyber \u200b\u200bRisk Management<\/b><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Aspect<\/b><\/td>\n<td><b>Without Broker<\/b><\/td>\n<td><b>With L&amp;G Broker<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Police Understanding<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Many misinterpretations<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Translated into business language<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Premium Negotiation<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Limited to one insurer<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L&amp;G access to local &amp; international markets<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Regulatory Compliance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Not understanding the PDP Law<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Assisted in preparing SOPs &amp; reporting<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Claim Process<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Slow &amp; risky to be rejected<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L&amp;G accompanies you from start to finish<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Prevention Strategy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">There is no roadmap<\/span><\/td>\n<td><span style=\"font-weight: 400;\">L&amp;G helps prepare cyber risk roadmap<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In other words, brokers serve as co-pilots of the company&#8217;s digital risks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Challenges Companies Often Face in Cyber \u200b\u200bRisk Management<\/span><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of top management awareness of the financial impact of cyber attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There is no internal incident reporting procedure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Not updating the policy according to technological developments.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does not have a clear claim SOP.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Overconfidence in one&#8217;s own IT system.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">L&amp;G Insurance Broker addresses this challenge with an educational approach \u2014 helping management understand risks and prepare anticipatory measures.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Ideal Collaboration Strategy: IT + Legal + Broker<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200brisk management is most effective when built through three-party collaboration:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Party<\/b><\/td>\n<td><b>Role<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">IT Department<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Maintain technical security &amp; detect incidents.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Department Legal\/Compliance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Ensure compliance with the PDP Act and incident reporting.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Insurance Broker (L&amp;G)<\/span> <span style=\"font-weight: 400;\">Ensuring financial readiness &amp; smooth claims process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This synergy ensures that companies are technically, legally, and financially prepared to face cyber risks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Choose PT. Liberty and General Insurance Broker (L&amp;G)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As a national broker with more than two decades of experience, L&amp;G Insurance Broker has handled various complex risks in the sectors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mining,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Energy,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Construction,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Logistics,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Technology and data center.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the field of Cyber \u200b\u200bInsurance, L&amp;G&#8217;s strengths include:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Risk mapping based on industry and business size.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Tailor-made policy designs, not generic templates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Direct relationships with global insurers experienced in cyber risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">24\/7 claims support with a team of experts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Cyber \u200b\u200brisk awareness education and workshops for clients.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With a comprehensive approach, L&amp;G is not just selling policies, but building the company&#8217;s digital resilience (cyber resilience).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Conclusion: Brokers Are Strategic Partners, Not Just Intermediaries<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200brisks are a real threat to the sustainability of modern businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Relying on an IT team alone is not enough \u2014 a well-thought-out financial and legal strategy is required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Insurance brokers such as PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) act as strategic partners that:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Help assess and manage risks,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing relevant policies,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensuring the claims process runs effectively,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And supports compliance with data regulations.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">With L&amp;G&#8217;s support, companies can run their digital businesses confidently, securely, and ready for the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ProtectProtect your business from digital threats with comprehensive solutions from PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker).<\/span><\/p>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"><b> 0811-8507-773<\/b><\/a><b>(CALL \u2013 WHATSAPP \u2013 SMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Website: lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email: halo@lngrisk.co.id<\/span><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber \u200b\u200bRisk Is No Longer an Option, But a Necessity In the digital age, data is a company&#8217;s most valuable asset. Unfortunately, precisely because of this value, data is a prime target for cyberattacks. In Indonesia, cases of hacking and data leaks have increased sharply \u2014 from the banking sector, logistics, to government agencies. For [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8694,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[799],"tags":[129,1298],"class_list":{"0":"post-8693","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-risk-insurance","8":"tag-asuransi-cyber","9":"tag-asuransi-cyber-liability"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=8693"}],"version-history":[{"count":1,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8693\/revisions"}],"predecessor-version":[{"id":8695,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8693\/revisions\/8695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/8694"}],"wp:attachment":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=8693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=8693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=8693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}