{"id":114896,"date":"2024-08-22T09:13:06","date_gmt":"2024-08-22T13:13:06","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=114896"},"modified":"2024-08-26T09:28:02","modified_gmt":"2024-08-26T13:28:02","slug":"sme-it-security-2024","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024","title":{"rendered":"How Are SMEs Approaching IT Security?\u00a0"},"content":{"rendered":"\n

Security remains a thorny issue for small- to medium-sized enterprises (SMEs), consistently topping the list<\/a> of challenges for IT professionals in 探花大神\u2019s biannual SME IT Trends survey. In our latest edition, IT pros shared their real-world experiences and strategies around security, among other pressing topics. This blog will dive into those insights to reveal how SMEs are tackling the security landscape today.<\/p>\n\n\n\n

Unless otherwise stated, all data cited in this article are from 探花大神\u2019s latest <\/em>SME IT Trends Report<\/em><\/a>. Download your copy of the report today!<\/em><\/p>\n\n\n\n

Security Is SMEs\u2019 Top Challenge<\/h2>\n\n\n\n

When asked about their top challenges, 60% of SME IT professionals said security, followed distantly by new service and application rollouts (42%), the cost of solutions necessary to enable remote work (41%), and device management (39%). What\u2019s more, half of IT teams reported being more concerned about their organization\u2019s security posture than they were six months ago. <\/p>\n\n\n\n

What makes up these challenges? IT professionals put network attacks (40%), software vulnerability exploits, ransomware, and shadow IT (29%) at the top of their lists of security concerns.<\/p>\n\n\n\n

\"Network<\/figure>\n\n\n\n

Shadow IT: A Growing Threat<\/h2>\n\n\n\n

Shadow IT presents significant risk to SMEs, and the threat is on the rise: shadow IT usage has increased by 59%<\/a> since the remote work boom. 84% of SME IT professionals expressed concern about shadow IT; however, many of them aren\u2019t able to adequately address it. When asked what has prevented them from addressing shadow IT, the most popular answer was that they had other more pressing priorities.\u00a0<\/p>\n\n\n\n

\"84%<\/figure>\n\n\n\n

Security \u2014 not to mention IT as a whole \u2014 has many moving parts. Lean teams find themselves hard-pressed to address all of them. But as shadow IT looms \u2014 and with it emerge new shadow IT vectors, like \u201cshadow AI<\/a>\u201d \u2014 SMEs may want to consider moving shadow IT up on their priority list.<\/p>\n\n\n\n

The Importance of Centralized Resource Management<\/h2>\n\n\n\n

Another element that affects SME security is their ability to centrally manage resources. Centralized IT management provides full visibility and control over the IT environment. This is key to preventing threats like shadow IT and eliminating blind spots. About half (49%) of SMEs have built a centrally managed environment where all employee accounts are managed centrally with permissions and security measures controlled by IT. <\/p>\n\n\n\n

\"About<\/figure>\n\n\n\n

While this leaves another half with at least some accounts going unmanaged, the majority (84%) of IT professionals would prefer a single platform to manage user identity, access, and security over a mix of best-in-class point solutions. This suggests that, given their way, IT teams will be moving toward more consolidated infrastructure in the future. Fortunately, it seems that executives generally support their IT staff\u2019s recommendations \u2014 read on to learn how executives are supporting their IT teams below. <\/p>\n\n\n\n

How Are SMEs Rising to Meet the Challenge?<\/h2>\n\n\n\n

In the face of pressing challenges, SMEs display resilience and a willingness to adapt. The following are some of the ways SMEs are working to combat the security threats they face.<\/p>\n\n\n\n

Investing in IT Staff<\/h3>\n\n\n\n

SMEs continue to invest in security and support their IT staff. Over eight in 10 SMEs (84%) have an IT security expert on staff, and 82% of IT professionals at SMEs say that management respects their counsel and recommendations around IT operations.<\/p>\n\n\n\n

\"The<\/figure>\n\n\n\n

These numbers suggest that SMEs acknowledge the critical role of IT security in their operations and are actively fostering a supportive environment for their IT teams. Trusting in expert analysis and recommendations puts SMEs in a good position to invest in the best security tools, processes, and practices for their business. This is critical to staying protected and competitive.<\/p>\n\n\n\n

Financial Preparedness<\/h3>\n\n\n\n

They say the best security programs plan for when <\/em>\u2014 not if<\/em> \u2014 an attack occurs. And it seems that attacks are more than a distant possibility for SMEs: nearly half (45%) of them fell victim to a cybersecurity attack in the first half of 2024. <\/p>\n\n\n\n

SMEs seem to be embracing preparedness when it comes to attacks. The majority (73%) report that they are financially equipped to recover from such incidents. This indicates that they are taking a well-rounded approach to managing cyber risks, not only by investing in technology and expertise but also by ensuring they have the necessary funds to deal with the aftermath of an attack.<\/p>\n\n\n\n

\"The<\/figure>\n\n\n\n

Stronger Authentication Practices<\/h3>\n\n\n\n

SMEs are increasingly focusing on improving security through better authentication practices. Currently, 66% of SMEs require biometric authentication, and 67% of IT professionals think that requiring biometrics would make their organization\u2019s security stronger. <\/p>\n\n\n\n

\"Biometrics<\/figure>\n\n\n\n

Despite strong biometric adoption, the vast majority (95%) of SMEs continue to rely on passwords, and only 26% of SME employees can access all of their IT resources with just one or two passwords. While passwordless authentication presents stronger security than password-based authentication, it seems that passwordless is a long way off from becoming a reality for SMEs. Single-sign on (SSO)<\/a>, however, may act as a stepping stone by improving authentication security while requiring less frequent password input.<\/p>\n\n\n\n

Learn More About SMEs<\/h2>\n\n\n\n

Security may be a tall mountain to climb, but there are many other issues facing SMEs today as well. 探花大神\u2019s latest SME IT Trends Report dives into how SMEs are approaching AI, vendor contracts, upcoming elections, and more. Download the full free report<\/a> to learn how other SMEs are navigating today\u2019s evolving world.<\/p>\n","protected":false},"excerpt":{"rendered":"

Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security. <\/p>\n","protected":false},"author":144,"featured_media":97189,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"collection":[2776,2775],"platform":[],"funnel_stage":[3015],"coauthors":[2532],"acf":[],"yoast_head":"\nHow Are SMEs Approaching IT Security?\u00a0 - 探花大神<\/title>\n<meta name=\"description\" content=\"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Are SMEs Approaching IT Security?\u00a0\" \/>\n<meta property=\"og:description\" content=\"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\" \/>\n<meta property=\"og:site_name\" content=\"探花大神\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T13:13:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-26T13:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kate Lake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Lake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\"},\"author\":{\"name\":\"Kate Lake\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\"},\"headline\":\"How Are SMEs Approaching IT Security?\u00a0\",\"datePublished\":\"2024-08-22T13:13:06+00:00\",\"dateModified\":\"2024-08-26T13:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\"},\"wordCount\":872,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\",\"url\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\",\"name\":\"How Are SMEs Approaching IT Security?\u00a0 - 探花大神\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg\",\"datePublished\":\"2024-08-22T13:13:06+00:00\",\"dateModified\":\"2024-08-26T13:28:02+00:00\",\"description\":\"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg\",\"width\":1000,\"height\":750,\"caption\":\"woman staring at her work on a laptop screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Are SMEs Approaching IT Security?\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"探花大神\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"探花大神\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"探花大神\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\",\"name\":\"Kate Lake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"caption\":\"Kate Lake\"},\"description\":\"Kate Lake is a Senior Content Writer at 探花大神, where she writes about 探花大神\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for 探花大神, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Are SMEs Approaching IT Security?\u00a0 - 探花大神","description":"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024","og_locale":"en_US","og_type":"article","og_title":"How Are SMEs Approaching IT Security?\u00a0","og_description":"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.","og_url":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024","og_site_name":"探花大神","article_published_time":"2024-08-22T13:13:06+00:00","article_modified_time":"2024-08-26T13:28:02+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg","type":"image\/jpeg"}],"author":"Kate Lake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kate Lake","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024"},"author":{"name":"Kate Lake","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78"},"headline":"How Are SMEs Approaching IT Security?\u00a0","datePublished":"2024-08-22T13:13:06+00:00","dateModified":"2024-08-26T13:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024"},"wordCount":872,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024","url":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024","name":"How Are SMEs Approaching IT Security?\u00a0 - 探花大神","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg","datePublished":"2024-08-22T13:13:06+00:00","dateModified":"2024-08-26T13:28:02+00:00","description":"Security has consistently topped SMEs\u2019 list of challenges. Get the breakdown of SMEs\u2019 biggest struggles and strides when it comes to security.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/sme-it-security-2024"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/Webinar-recap-1.jpg","width":1000,"height":750,"caption":"woman staring at her work on a laptop screen"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/sme-it-security-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"How Are SMEs Approaching IT Security?\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"探花大神","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"探花大神","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"探花大神"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78","name":"Kate Lake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879","url":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","caption":"Kate Lake"},"description":"Kate Lake is a Senior Content Writer at 探花大神, where she writes about 探花大神\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for 探花大神, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114896"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=114896"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114896\/revisions"}],"predecessor-version":[{"id":114905,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/114896\/revisions\/114905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/97189"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=114896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=114896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=114896"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=114896"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=114896"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=114896"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=114896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}