{"id":5935,"date":"2024-11-11T13:15:58","date_gmt":"2024-11-11T13:15:58","guid":{"rendered":"https:\/\/blog.cortado.com\/?p=5935"},"modified":"2024-11-12T11:11:22","modified_gmt":"2024-11-12T11:11:22","slug":"how-to-protect-your-business-from-smishing","status":"publish","type":"post","link":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/","title":{"rendered":"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/\/smishing-adobe-1024x683.jpeg\" alt=\"smishing\" class=\"wp-image-5933\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-1024x683.jpeg 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-300x200.jpeg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-768x512.jpeg 768w, https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-1536x1024.jpeg 1536w, https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-2048x1365.jpeg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As digitalization advances in the business world, the threat posed by cybercrime is increasing. While phishing attacks through email have long been known, another malicious method is on the rise &#8211; smishing. This term describes phishing attacks conducted through SMS or messaging services. As more companies rely on mobile devices, smishing is becoming an increasing risk to corporate data security. This article explains how smishing occurs, the associated risks, and the protective measures businesses should take.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-smishing\"><strong>What is Smishing?<\/strong><\/h2>\n\n\n\n<p>Smishing is a specific form of phishing where attackers attempt to steal sensitive data, such as passwords, credit card information, or other confidential business information, via SMS. The term combines &#8220;SMS&#8221; and &#8220;phishing.&#8221; Smishing messages often contain links or requests designed to entice recipients into clicking fraudulent websites or downloading harmful software.<\/p>\n\n\n\n<p><strong>Example of a typical smishing message:<\/strong> &#8220;Urgent message from your bank account: Suspicious activity detected. Confirm your identity here: [Link]&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-smishing-work\"><strong>How Does Smishing Work?<\/strong><\/h2>\n\n\n\n<p>Smishing attackers use the same psychological tactics as traditional phishing attacks: they play on the fear, curiosity, or urgency of recipients. A typical scenario could be an SMS from a supposed service provider urging the user to act quickly to prevent potential harm.<\/p>\n\n\n\n<p>Smishing is particularly dangerous because mobile devices play a central role in many people\u2019s daily work. Employees often use the same devices for both personal and business purposes, increasing the risk that fraudulent messages will go unnoticed. Carelessly clicking a malicious link can quickly have serious consequences.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-risks-of-smishing-for-businesses\"><strong>The Risks of Smishing for Businesses<\/strong><\/h2>\n\n\n\n<p>For companies, the risks of a smishing attack are significant. Here are just some examples of how smishing can endanger your business:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Loss:<\/strong> Smishing can lead to the theft of confidential corporate data, resulting in financial losses or damage to your reputation.<\/li>\n\n\n\n<li><strong>Device Compromission:<\/strong> Attackers can install malware that provides access to business information or control over the device.<\/li>\n\n\n\n<li><strong>Compliance Violations:<\/strong> Depending on the industry, the loss of sensitive data can have serious legal consequences, particularly in sectors with strict data protection regulations (e.g., GDPR).<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-protective-measures-against-smishing\"><strong>Protective Measures Against Smishing<\/strong><\/h2>\n\n\n\n<p>Fortunately, there are several measures companies can take to protect themselves against smishing attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Employee Training:<\/strong> One of the most effective protective measures is to regularly educate employees about cyber threats like smishing. They should know how to recognize suspicious messages and respond appropriately.<\/li>\n\n\n\n<li><strong>Anti-Phishing Software and Multi-Factor Authentication (MFA):<\/strong> Companies should use specialized security software that scans SMS messages for potentially harmful content. Additionally, MFA adds a layer of protection by ensuring that even if a password is stolen, unauthorized access is still prevented.<\/li>\n\n\n\n<li><strong>Mobile Device Management (MDM):<\/strong> Implementing MDM solutions, such as those offered by Cortado Mobile Solutions, helps companies securely manage mobile devices. With MDM, IT departments can set specific policies for all mobile devices to minimize potential security risks. While MDM solutions like Cortado MDM don\u2019t directly counteract smishing, they do help by enforcing a strict separation between business and personal use areas on devices. If an employee responds to a &#8220;private&#8221; fraudulent message, the business area remains secure, ensuring that corporate data is protected.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion-prevention-is-the-best-protection\"><strong>Conclusion: Prevention is the Best Protection<\/strong><\/h2>\n\n\n\n<p>With smishing, the main target and vulnerability is always the human factor. The only truly effective defense is: training, training, and more training. Only if employees understand and recognize smishing can they effectively prevent attacks. Technically, multi-factor authentication solutions are also advisable, as they prevent an attacker from accessing data even if usernames and passwords are compromised. Without multi-factor authentication, a criminal cannot access an account.\u00a0<\/p>\n\n\n\n<p>In the event of an attack, affected passwords should be changed without delay.<\/p>\n\n\n\n<p>If you would like to learn more about how to protect your company effectively from smishing and other mobile security threats, <a href=\"https:\/\/www.cortado.com\/en\/contact\/\">contact us for a free demo of our MDM solution<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.<\/p>\n","protected":false},"author":5,"featured_media":5933,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[40],"class_list":["post-5935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-work","tag-data-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smishing: How to Protect Your Business from Attacks via SMS and Messaging Services<\/title>\n<meta name=\"description\" content=\"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks\" \/>\n<meta property=\"og:description\" content=\"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T13:15:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T11:11:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Fulton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Fulton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\"},\"author\":{\"name\":\"Simone Fulton\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d6c64de7196768becc634f42cca6b14d\"},\"headline\":\"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks\",\"datePublished\":\"2024-11-11T13:15:58+00:00\",\"dateModified\":\"2024-11-12T11:11:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg\",\"keywords\":[\"Data Security\"],\"articleSection\":[\"Tips &amp; Tricks for Mobile Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\",\"name\":\"Smishing: How to Protect Your Business from Attacks via SMS and Messaging Services\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg\",\"datePublished\":\"2024-11-11T13:15:58+00:00\",\"dateModified\":\"2024-11-12T11:11:22+00:00\",\"description\":\"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Smishing or SMS phishing concept, digitally enhanced image with hooded computer hacker finger-pointing to text\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d6c64de7196768becc634f42cca6b14d\",\"name\":\"Simone Fulton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5bb26a2207d3999bcb7150e2eff9c3b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5bb26a2207d3999bcb7150e2eff9c3b0?s=96&d=mm&r=g\",\"caption\":\"Simone Fulton\"},\"url\":\"https:\/\/blog.cortado.com\/en\/author\/siklu\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Smishing: How to Protect Your Business from Attacks via SMS and Messaging Services","description":"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/","og_locale":"en_US","og_type":"article","og_title":"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks","og_description":"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.","og_url":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/","og_site_name":"Cortado Blog","article_published_time":"2024-11-11T13:15:58+00:00","article_modified_time":"2024-11-12T11:11:22+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg","type":"image\/jpeg"}],"author":"Simone Fulton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simone Fulton","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#article","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/"},"author":{"name":"Simone Fulton","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d6c64de7196768becc634f42cca6b14d"},"headline":"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks","datePublished":"2024-11-11T13:15:58+00:00","dateModified":"2024-11-12T11:11:22+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/"},"wordCount":641,"publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg","keywords":["Data Security"],"articleSection":["Tips &amp; Tricks for Mobile Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/","url":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/","name":"Smishing: How to Protect Your Business from Attacks via SMS and Messaging Services","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg","datePublished":"2024-11-11T13:15:58+00:00","dateModified":"2024-11-12T11:11:22+00:00","description":"Smishing is a growing risk for businesses. Here, you\u2019ll learn how smishing works and how to protect yourself.","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/smishing-adobe-scaled.jpeg","width":2560,"height":1707,"caption":"Smishing or SMS phishing concept, digitally enhanced image with hooded computer hacker finger-pointing to text"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/how-to-protect-your-business-from-smishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"Smishing: How to Protect Your Business from SMS and Messaging Service Attacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d6c64de7196768becc634f42cca6b14d","name":"Simone Fulton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5bb26a2207d3999bcb7150e2eff9c3b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bb26a2207d3999bcb7150e2eff9c3b0?s=96&d=mm&r=g","caption":"Simone Fulton"},"url":"https:\/\/blog.cortado.com\/en\/author\/siklu\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/5935"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=5935"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/5935\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/5933"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=5935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/categories?post=5935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/tags?post=5935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}