{"id":9542,"date":"2024-02-22T17:18:06","date_gmt":"2024-02-22T14:18:06","guid":{"rendered":"https:\/\/top.host\/blog\/?p=9542"},"modified":"2024-02-22T17:18:06","modified_gmt":"2024-02-22T14:18:06","slug":"phishing-what-is","status":"publish","type":"post","link":"https:\/\/top.host\/blog\/phishing-what-is\/","title":{"rendered":"Phishing: What it is and how to protect your business\u00a0"},"content":{"rendered":"<p><span data-contrast=\"none\">In today&#8217;s digitalized and connected operating environment, cyber threats are increasing, putting your business data at risk.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">Therefore, in this article, we will attempt to inform you about an issue that concerns many people.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">In particular, we will talk about phishing: what it is, how it works, how you can protect your business, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">So, let\u2019s start!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">What phishing is<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">First, we need to explain what phishing is and what it means.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Phishing is a homonym of the English word fishing. That\u2019s why it is commonly known as \u201celectronic fishing\u201d. Thus, phishing attacks use the logic of baiting. But the ph- of the word refers to the \u201cphreaks\u201d, a hacker group that attacked the AOL telecommunications company in the 1990s.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">So, phishing is a <\/span><b><span data-contrast=\"none\">type of cybercrime, in which a malicious person (scammer) or a group of people try to deceive and manipulate unsuspecting victims to obtain sensitive information<\/span><\/b><span data-contrast=\"none\">, such as credit card codes, insurance numbers, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">The perpetrators of such attacks usually pretend to be a trustworthy entity<\/span><\/b><span data-contrast=\"none\"> or company, such as a bank, to convince the victim to share their data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">How phishing works<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">But how exactly does phishing work?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Let\u2019s look at the process:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">1. First, <\/span><b><span data-contrast=\"none\">the attacker sets up a phishing website<\/span><\/b><span data-contrast=\"none\">. But, what is a phishing site?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">It is a fake site that imitates another legal and reliable website to mislead and deceive the victim.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">2. <\/span><span data-contrast=\"none\">The phisher then <\/span><b><span data-contrast=\"none\">sends an email, a social media message, or an SMS, etc., which seems urgent <\/span><\/b><span data-contrast=\"none\">and pretends to come from a trustworthy and legitimate entity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">3. The abuser in the message asks the victim to open a link or an attachment included in the message under the pretext that something is wrong with their account or service and that maybe they have been deceived.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">4. <\/span><b><span data-contrast=\"none\">The suspicious link sends the victim a fake clone website, which extracts the customer\u2019s sensitive personal data.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">5. <\/span><span data-contrast=\"none\">The attacker now has gained access to the victim\u2019s account and can use it as they wish (e.g. to extort money).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Types of phishing attacks<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Phishing attacks can take various types, with the main ones being:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Email phishing<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">This is the most common type of phishing. As mentioned above, the <\/span><b><span data-contrast=\"none\">attackers send a misleading email<\/span><\/b><span data-contrast=\"none\"> (phishing email) pretending to be a trustworthy organization or person.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These emails contain misleading links, attachments, or requests to disclose sensitive information. These are the well-known <\/span><b><span data-contrast=\"none\">spam emails<\/span><\/b><span data-contrast=\"none\">, which are, by the way, one of the most common types of botnet attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">To learn more about <\/span><a href=\"https:\/\/top.host\/blog\/what-is-a-botnet\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">what a botnet is<\/span><\/a><span data-contrast=\"none\">, look at our relevant article.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Spear phishing<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Another popular type of phishing attack is spear phishing. But, what is it?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It is a <\/span><b><span data-contrast=\"none\">targeted type of phishing focused on specific persons or organizations.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">The attackers do their research well in advance, and <\/span><b><span data-contrast=\"none\">collect detailed information regarding their targets<\/span><\/b><span data-contrast=\"none\">, such as names, job titles, etc., to personalize phishing emails and increase the chance of success.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Whaling<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Whaling is a <\/span><b><span data-contrast=\"none\">specialized type of spear phishing that targets high-level executives<\/span><\/b><span data-contrast=\"none\">, such as CEOs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">The attackers aim to deceive these people into disclosing sensitive corporate information or initiating financial transactions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Smishing<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Smishing, an abbreviation of SMS phishing, involves <\/span><b><span data-contrast=\"none\">sending misleading messages to victims\u2019 mobile phones.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These messages often claim to come from reliable sources and include links or prompts to reveal personal information or install malicious applications.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">As you can see, this type of attack is not an online attack, as it is not via the Internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Vishing<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Another offline method is vishing or <\/span><b><span data-contrast=\"none\">voice phishing<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you are unaware of what it is, let us inform you that it is phishing over the phone.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">Vishing occurs when attackers make voice calls to people pretending to be representatives of banks, government entities, or other trusted organizations, attempting to get the information they want over the phone.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Malware-based phishing<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In this type of phishing, attackers use emails, attachments, or malicious links aiming <\/span><b><span data-contrast=\"none\">to force their victims to install malware on their devices<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">After the device is infected, the malware can steal sensitive information, record keystrokes, or provide unauthorized access to the attacker.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you want to learn more about <\/span><a href=\"https:\/\/top.host\/blog\/what-malware-is\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">what malware is<\/span><\/a><span data-contrast=\"none\">, read our related article.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">How to protect your business from phishing attacks<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9546\" src=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2024\/02\/InseideimageTophostPhising23.jpg\" alt=\"phishing attacks\" width=\"700\" height=\"466\" srcset=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2024\/02\/InseideimageTophostPhising23.jpg 700w, https:\/\/top.host\/blog\/wp-content\/uploads\/2024\/02\/InseideimageTophostPhising23-300x200.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>As you understand, a phishing attack can be hazardous for your business, with high possibilities of financial loss, damage to its reputation and prestige, etc. It means that it is necessary to protect it against such attacks, which can happen in the following ways:<\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Use security software<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-preserver-spaces=\"true\">One of the most crucial ways to protect yourself from a phishing attack is to install<\/span><strong><span data-preserver-spaces=\"true\">\u00a0reliable security software on company devices that detect and block suspicious emails<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0before they reach your inbox.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Moreover, installing such software is one of the best methods of Information Security, meaning the security and protection of information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Find out more about <\/span><a href=\"https:\/\/top.host\/blog\/information-security-what-is-why-it-is-important-for-every-business\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">what Information Security is<\/span><\/a><span data-contrast=\"none\"> and its importance for your business in our related article.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Enable multi-factor authentication<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Implement multi-factor authentication for all relevant systems and applications in the company.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It adds an extra layer of security by <\/span><b><span data-contrast=\"none\">requiring users to provide multiple types of identification<\/span><\/b><span data-contrast=\"none\">, such as a password and a unique code sent to their mobile device to access sensitive information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Establish a strong password policy<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Another effective method of protecting your business is establishing a strong password policy. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ensure that company employees <\/span><b><span data-contrast=\"none\">use complex, strong passwords, unique<\/span><\/b><span data-contrast=\"none\"> for each service or account, which they <\/span><b><span data-contrast=\"none\">change regularly<\/span><\/b><span data-contrast=\"none\"> for maximum security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Also, encourage the use of specialized password management tools.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Organize information and training sessions for employees<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-preserver-spaces=\"true\">It will also be of great value to organize regular briefings and training sessions for employees <strong>o<\/strong><\/span><strong><span data-preserver-spaces=\"true\">n how to manage phishing attacks\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">and cybersecurity threats in general and to be\u00a0<\/span><strong><span data-preserver-spaces=\"true\">protected against them<\/span><\/strong><span data-preserver-spaces=\"true\">.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">You can also organize briefings on the different existing phishing techniques, how to recognize the various warning signs, how to deal with such an attack after it has already occurred, etc. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Create backups regularly<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-preserver-spaces=\"true\">Always remember to regularly create backups of your business data\u00a0<\/span><strong><span data-preserver-spaces=\"true\">to ensure their secure storage and retention, even in the case of an unexpected incident<\/span><\/strong><span data-preserver-spaces=\"true\">. That way, you will have peace of mind even if a successful attack occurs.\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">How to recognize a phishing attack<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Recognizing the warning signs of a phishing attack is vital for your business&#8217;s protection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">So, here are the most common signs indicating that you have probably been the victim of such an attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Let\u2019s see them:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul class=\"p-rich_text_list p-rich_text_list__bullet\" data-stringify-type=\"unordered-list\" data-indent=\"0\" data-border=\"0\">\n<li data-stringify-indent=\"0\" data-stringify-border=\"0\"><b data-stringify-type=\"bold\">Suspicious or strange URLs:\u00a0<\/b>the misleading links often contain misspellings and extra characters and slightly differ from the website address they are imitating.<\/li>\n<li data-stringify-indent=\"0\" data-stringify-border=\"0\"><b data-stringify-type=\"bold\">Grammatically or expressively wrong content<\/b>: phishing messages usually have some grammatical, spelling, syntax, or expressive errors, incomplete punctuation, and poor quality of language in general.<\/li>\n<li data-stringify-indent=\"0\" data-stringify-border=\"0\"><b data-stringify-type=\"bold\">A language that causes anxiety or fear:\u00a0<\/b>phishing emails or messages usually include expressions that evoke fear or a sense of emergency (e.g. the victim&#8217;s account is compromised) to prompt immediate action.<\/li>\n<li data-stringify-indent=\"0\" data-stringify-border=\"0\"><b data-stringify-type=\"bold\">Requests for disclosure of sensitive information:\u00a0<\/b>in such attacks, it is usual to request the immediate disclosure of personal and sensitive information (e.g. credit card codes, insurance numbers, etc.).<\/li>\n<li data-stringify-indent=\"0\" data-stringify-border=\"0\"><b data-stringify-type=\"bold\">Poor-quality graphics<\/b>: such messages often contain poor-quality images, logos, and generally poor graphics.<\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">What phishing is and how to be protected &#8211; Conclusion<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Now that you have reached the end of our article, you know all you need about phishing: what it is, how it works, what types of attacks exist, and how to protect your business.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This type of online threat can prove to be very dangerous for your business. Thus, it is extremely important to know well what it is and how to effectively protect your valuable business data in the ways we have seen above.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">So, keep in mind all we shared with you and if you have any relevant questions, feel free to leave your comment below!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digitalized and connected operating environment, cyber threats are increasing, putting your business data&hellip;<\/p>\n","protected":false},"author":39,"featured_media":9286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mc4wp_mailchimp_campaign":[],"footnotes":""},"categories":[2430],"tags":[4122,4124,4120],"coauthors":[3804],"class_list":["post-9542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-en","tag-email-phishing","tag-phishing-en","tag-types-of-phishing-attacks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing: What it is and how to protect your business\u00a0 - Top.Host Blog<\/title>\n<meta name=\"description\" content=\"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/top.host\/blog\/phishing-what-is\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: What it is and how to protect your business\u00a0\" \/>\n<meta property=\"og:description\" content=\"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/top.host\/blog\/phishing-what-is\/\" \/>\n<meta property=\"og:site_name\" content=\"Top.Host Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tophostGR\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-22T14:18:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandros Kokolis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:site\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandros Kokolis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/\"},\"author\":{\"name\":\"Alexandros Kokolis\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/97ebbb0e6cf427db673eed4b1e91767d\"},\"headline\":\"Phishing: What it is and how to protect your business\u00a0\",\"datePublished\":\"2024-02-22T14:18:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/\"},\"wordCount\":1314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/BlogimageTophostPhising23.jpg\",\"keywords\":[\"Email phishing\",\"phishing\",\"Types of phishing attacks\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/\",\"name\":\"Phishing: What it is and how to protect your business\u00a0 - Top.Host Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/BlogimageTophostPhising23.jpg\",\"datePublished\":\"2024-02-22T14:18:06+00:00\",\"description\":\"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#primaryimage\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/BlogimageTophostPhising23.jpg\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/BlogimageTophostPhising23.jpg\",\"width\":700,\"height\":466,\"caption\":\"phishing \u03c4\u03b9 \u03b5\u03af\u03bd\u03b1\u03b9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/phishing-what-is\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/top.host\\\/blog\\\/el\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing: What it is and how to protect your business\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"name\":\"Top.Host Blog\",\"description\":\"Extreme Support\",\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/top.host\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\",\"name\":\"Top.Host\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Top.Host\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tophostGR\\\/\",\"https:\\\/\\\/x.com\\\/TophostExtreme\",\"https:\\\/\\\/www.instagram.com\\\/tophostgr\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/752527\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/TophostXtremeSupport\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/97ebbb0e6cf427db673eed4b1e91767d\",\"name\":\"Alexandros Kokolis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/kokolis-150x150-1-140x140.webp14fe871f77d08f8dc7a5cb1747d1977a\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/kokolis-150x150-1-140x140.webp\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/kokolis-150x150-1-140x140.webp\",\"caption\":\"Alexandros Kokolis\"},\"description\":\"Alexandros Kokolis is the founder of SEM Wizard Google Premier Partner. With 15 years of experience in Marketing &amp; Advertising, he has handled important advertising and digital marketing projects in Greece and abroad.\",\"sameAs\":[\"https:\\\/\\\/www.sem-wizard.com\\\/\"],\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/author\\\/kokolis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing: What it is and how to protect your business\u00a0 - Top.Host Blog","description":"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/top.host\/blog\/phishing-what-is\/","og_locale":"en_US","og_type":"article","og_title":"Phishing: What it is and how to protect your business\u00a0","og_description":"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.","og_url":"https:\/\/top.host\/blog\/phishing-what-is\/","og_site_name":"Top.Host Blog","article_publisher":"https:\/\/www.facebook.com\/tophostGR\/","article_published_time":"2024-02-22T14:18:06+00:00","og_image":[{"width":700,"height":466,"url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg","type":"image\/jpeg"}],"author":"Alexandros Kokolis","twitter_card":"summary_large_image","twitter_creator":"@TophostExtreme","twitter_site":"@TophostExtreme","twitter_misc":{"Written by":"Alexandros Kokolis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/top.host\/blog\/phishing-what-is\/#article","isPartOf":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/"},"author":{"name":"Alexandros Kokolis","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/97ebbb0e6cf427db673eed4b1e91767d"},"headline":"Phishing: What it is and how to protect your business\u00a0","datePublished":"2024-02-22T14:18:06+00:00","mainEntityOfPage":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/"},"wordCount":1314,"commentCount":0,"publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"image":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg","keywords":["Email phishing","phishing","Types of phishing attacks"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/top.host\/blog\/phishing-what-is\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/top.host\/blog\/phishing-what-is\/","url":"https:\/\/top.host\/blog\/phishing-what-is\/","name":"Phishing: What it is and how to protect your business\u00a0 - Top.Host Blog","isPartOf":{"@id":"https:\/\/top.host\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/#primaryimage"},"image":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg","datePublished":"2024-02-22T14:18:06+00:00","description":"Are you looking to find out about what phishing is? Learn all you need in the article, and secure your business from malicious attacks.","breadcrumb":{"@id":"https:\/\/top.host\/blog\/phishing-what-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/top.host\/blog\/phishing-what-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/phishing-what-is\/#primaryimage","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2023\/07\/BlogimageTophostPhising23.jpg","width":700,"height":466,"caption":"phishing \u03c4\u03b9 \u03b5\u03af\u03bd\u03b1\u03b9"},{"@type":"BreadcrumbList","@id":"https:\/\/top.host\/blog\/phishing-what-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/top.host\/blog\/el\/"},{"@type":"ListItem","position":2,"name":"Phishing: What it is and how to protect your business\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/top.host\/blog\/#website","url":"https:\/\/top.host\/blog\/","name":"Top.Host Blog","description":"Extreme Support","publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/top.host\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/top.host\/blog\/#organization","name":"Top.Host","url":"https:\/\/top.host\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","width":300,"height":300,"caption":"Top.Host"},"image":{"@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tophostGR\/","https:\/\/x.com\/TophostExtreme","https:\/\/www.instagram.com\/tophostgr\/","https:\/\/www.linkedin.com\/company\/752527\/","https:\/\/www.youtube.com\/user\/TophostXtremeSupport"]},{"@type":"Person","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/97ebbb0e6cf427db673eed4b1e91767d","name":"Alexandros Kokolis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/wp-content\/uploads\/2022\/02\/kokolis-150x150-1-140x140.webp14fe871f77d08f8dc7a5cb1747d1977a","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2022\/02\/kokolis-150x150-1-140x140.webp","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2022\/02\/kokolis-150x150-1-140x140.webp","caption":"Alexandros Kokolis"},"description":"Alexandros Kokolis is the founder of SEM Wizard Google Premier Partner. With 15 years of experience in Marketing &amp; Advertising, he has handled important advertising and digital marketing projects in Greece and abroad.","sameAs":["https:\/\/www.sem-wizard.com\/"],"url":"https:\/\/top.host\/blog\/author\/kokolis\/"}]}},"_links":{"self":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/9542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/comments?post=9542"}],"version-history":[{"count":29,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/9542\/revisions"}],"predecessor-version":[{"id":9544,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/9542\/revisions\/9544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media\/9286"}],"wp:attachment":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media?parent=9542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/categories?post=9542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/tags?post=9542"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/coauthors?post=9542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}