{"id":18013,"date":"2024-01-04T14:03:32","date_gmt":"2024-01-04T14:03:32","guid":{"rendered":"https:\/\/www.ignition-technology.com\/ne\/?page_id=18013"},"modified":"2026-01-14T11:23:04","modified_gmt":"2026-01-14T11:23:04","slug":"ransomware","status":"publish","type":"page","link":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/","title":{"rendered":"Ransomware"},"content":{"rendered":"<h1 style=\"text-align: center\">Ransomware Protection<\/h1>\n<h5 style=\"text-align: center\"><span style=\"color: #fff\">As the digital landscape evolves, so do the threats that businesses face. One of the most prevalent threats in today&#8217;s digital age is ransomware.<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-1.svg\" alt=\"Blue Gradient Icon for Ransomware\" \/><\/p>\n<h4 style=\"text-align: left\">It&#8217;s not a question of &#8220;if&#8221;, but &#8220;when&#8221;&#8230;<\/h4>\n<p>Ransomware is a type of malicious software designed to block access to a computer system or files until a &#8220;ransom,&#8221; is paid. Cybercriminals use sophisticated techniques to infiltrate networks; encrypting crucial data and demanding payment for its release. The consequences of a ransomware attack can be devastating, affecting not only the company&#8217;s bottom line, but also its reputation and customer trust. According to recent stats, more than 73% of companies have fallen victim to ransomware, experiencing severe disruptions to their operations, reputational damage, and financial losses. <span style=\"letter-spacing: 0px\">This alarming statistic emphasises that no organisation, regardless of its size or industry, is immune to threat of a ransomware attacks and needs Ransomware Protection.<\/span><\/p>\n<h2 style=\"text-align: center\">Our Ransomware Protection Vendors<\/h2>\n<ul class=\"clients clients_slider_ul\">\n<li><a title=\"BeyondTrust\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/beyondtrust\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/BeyondTrust-1.svg\" alt=\"BeyondTrust logo\" \/><\/a><\/li>\n<li><a title=\"BlackBerry \u2013 Cybersecurity\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/blackberry-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Blackberry.svg\" alt=\"BlackBerry logo\" \/><\/a><\/li>\n<li><a title=\"Illumio\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/illumio\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Illumio.svg\" alt=\"Illumio logo\" \/><\/a><\/li>\n<li><a title=\"Okta\" href=\"https:\/\/www.ignition-technology.com\/ne\/vendors\/okta\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"scale-with-grid wp-post-image\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/okta.svg\" alt=\"Okta logo\" \/><\/a><\/li>\n<\/ul>\n<h2 style=\"text-align: center\"><span style=\"color: #fcfcfc\">The Biggest Ransomware Threats<\/span><\/h2>\n<p style=\"text-align: center\"><span style=\"color: #fcfcfc\">\u00a0<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"letter-spacing: 0px;color: #fcfcfc\">Understanding the vulnerbilities cybercriminals exploit can help protect against the threat of ransomware. Our curated suite of cybersecurity solutions is designed to fortify your defenses and safeguard your business against evolving cyber threats.<\/span><\/p>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-01.svg\" alt=\"White Icon for Phishing\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Phishing<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-02-1.svg\" alt=\"White Icon for Operating Vulnerabilities\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Operating Vulnerabilities<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-03.svg\" alt=\"White icon for Gaining access to Identities\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Gaining access to Identities<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-04.svg\" alt=\"White icon for Malware Spread\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Malware Spread<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-05.svg\" alt=\"White icon for Account Takeover\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Account Takeover<\/span><\/h5>\n<p><img decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-06-1.svg\" alt=\"White icon for Digital Attack Surface\" \/><\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #fcfcfc\">Digital Attack Surface<\/span><\/h5>\n<h3 style=\"text-align: left\">Want to stay up to date with the latest on Ransomware attacks and Ransomware Protection?<\/h3>\n<h4 style=\"text-align: left\">Sign up to our newsletter or follow us on LinkedIn.<\/h4>\n<p style=\"text-align: left\"><a class=\"button button_size_2 button_theme\" title=\"\" href=\"mailto:enquiries@ignition-technology.com?subject=Ransomware%20Enquiry\"><span class=\"button_label\">Contact Us<\/span><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"scale-with-grid\" src=\"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/shutterstock_2104483976-1.png\" alt=\"A man smiling while looking at a computer screen\" width=\"2241\" height=\"1258\" \/><\/p>\n<h2>How Do We Partner With Ignition?<\/h2>\n<p>We are keen to work with like-minded partners that are looking to drive business and successful outcomes for their customers. If you are a VAR interested in any of the technologies across our portfolio, get in touch with our team today.<\/p>\n<p><a class=\"button button_size_2 button_theme\" title=\"\" href=\"\/become-a-partner\/\"><span class=\"button_label\">Become a Partner<\/span><\/a><\/p>\n<p><span class=\"num\">1<\/span>How do I become an Ignition Technology Partner or VAR?You can get in touch with us by clicking on the Become a Partner button or via the information on our Contact Us page. Once we receive your request, we\u2019ll get one of Channel specialists to contact you and take you through our onboarding process.<br \/>\n<span class=\"num\">2<\/span>What support does Ignition Technology offer Partners or VARs?At Ignition Technology, we work as an extension of your team. Whether you need support with sales &amp; product training, pre-sales services, go-to-marketing &amp; lead-gen campaigns, or implementation, our team is ready to help you identify &amp; convert opportunities across our portfolio.<br \/>\n<span class=\"num\">3<\/span>Why partner with Ignition Technology?Nobody knows cloud &amp; Saas cybersecurity solutions like we do. Our team understands the intricacies of the industry, the complexities of the technologies in the market, and are committed to developing and supporting the channel.<br \/>\n<span class=\"num\">4<\/span>How long does it take to become a Partner?No two VARs are the same. Once our team has made contact with you and understood your requirements, we\u2019ll build out an onboarding programme that is unique to you and the vendors that you would like to sell. The programme will include a short qualification process and if successful will be followed by dedicated enablement sessions. You could be transacting in a matter of weeks.<br \/>\n<span class=\"num\">5<\/span>How do I transact through Ignition Technology?We work closely with our Vendors and will support you in protecting your opportunities by registering your deals. We will follow up, keeping you informed every step of the way.<\/p>\n<h2><span style=\"color: #ffffff\">Follow us on<\/span> <span style=\"color: #41bfea;letter-spacing: 0px\">LinkedIn<\/span> <span style=\"color: #ffffff;letter-spacing: 0px\">for the latest industry news and events!<\/span><\/h2>\n<p><a class=\"button button_size_2\" title=\"\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwids6yAo4KEAxUPUkEAHSDLDxcQFnoECBEQAQ&amp;url=https%3A%2F%2Fuk.linkedin.com%2Fcompany%2Fignition-technology&amp;usg=AOvVaw26OjtsUw0Rb2qaWdv6TRzX&amp;opi=89978449\"><span class=\"button_label\">Follow Now<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware Protection As the digital landscape evolves, so do the threats that businesses face. One of the most prevalent threats<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":-1,"parent":389,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-18013","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Protection and the Importance<\/title>\n<meta name=\"description\" content=\"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware\" \/>\n<meta property=\"og:description\" content=\"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Ignition Technology NEUR\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T11:23:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ignition_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/\",\"name\":\"Ransomware Protection and the Importance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Ransomware-1.svg\",\"datePublished\":\"2024-01-04T14:03:32+00:00\",\"dateModified\":\"2026-01-14T11:23:04+00:00\",\"description\":\"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Ransomware-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2024\\\/01\\\/Solution-Icons_Ransomware-1.svg\",\"caption\":\"Blue Gradient Icon for Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#website\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"name\":\"Iginition Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#organization\",\"name\":\"Iginition Technology\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"contentUrl\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/wp-content\\\/uploads\\\/sites\\\/17\\\/2023\\\/09\\\/Ignition-logo-black.svg\",\"caption\":\"Iginition Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ignition-technology.com\\\/ne\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ignition_tech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UChpbrHykg8qwmT4hQSHwqXQ\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ignition-technology\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Protection and the Importance","description":"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_GB","og_type":"article","og_title":"Ransomware","og_description":"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.","og_url":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/","og_site_name":"Ignition Technology NEUR","article_modified_time":"2026-01-14T11:23:04+00:00","twitter_card":"summary_large_image","twitter_site":"@ignition_tech","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/","url":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/","name":"Ransomware Protection and the Importance","isPartOf":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-1.svg","datePublished":"2024-01-04T14:03:32+00:00","dateModified":"2026-01-14T11:23:04+00:00","description":"As the digital landscape evolves, businesses encounter many threats that they require protection against, none more prevalent than ransomware.","breadcrumb":{"@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/#primaryimage","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-1.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2024\/01\/Solution-Icons_Ransomware-1.svg","caption":"Blue Gradient Icon for Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ignition-technology.com\/ne\/solutions\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ignition-technology.com\/ne\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.ignition-technology.com\/ne\/solutions\/"},{"@type":"ListItem","position":3,"name":"Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.ignition-technology.com\/ne\/#website","url":"https:\/\/www.ignition-technology.com\/ne\/","name":"Iginition Technology","description":"","publisher":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ignition-technology.com\/ne\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ignition-technology.com\/ne\/#organization","name":"Iginition Technology","url":"https:\/\/www.ignition-technology.com\/ne\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/","url":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","contentUrl":"https:\/\/www.ignition-technology.com\/ne\/wp-content\/uploads\/sites\/17\/2023\/09\/Ignition-logo-black.svg","caption":"Iginition Technology"},"image":{"@id":"https:\/\/www.ignition-technology.com\/ne\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ignition_tech","https:\/\/www.youtube.com\/channel\/UChpbrHykg8qwmT4hQSHwqXQ","https:\/\/www.linkedin.com\/company\/ignition-technology\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/comments?post=18013"}],"version-history":[{"count":5,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18013\/revisions"}],"predecessor-version":[{"id":19127,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/18013\/revisions\/19127"}],"up":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/pages\/389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.ignition-technology.com\/ne\/wp-json\/wp\/v2\/media?parent=18013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}