{"id":9148,"date":"2024-03-19T10:00:19","date_gmt":"2024-03-19T08:00:19","guid":{"rendered":"https:\/\/aboveit.fi\/communication-security-part-2\/"},"modified":"2025-11-27T14:03:21","modified_gmt":"2025-11-27T12:03:21","slug":"communication-security-part-2","status":"publish","type":"post","link":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/","title":{"rendered":"Communication Security Part 2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9148\" class=\"elementor elementor-9148 elementor-1469\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9b42299 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b42299\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0bb385\" data-id=\"c0bb385\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc8fd1f elementor-widget elementor-widget-text-editor\" data-id=\"cc8fd1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>In the <a href=\"https:\/\/aboveit.fi\/en\/communication-security-part-1\/\">first part<\/a> of communication security, I discussed message hygiene, specifically how we can better protect ourselves from the misuse of our email domains and enhance message deliverability. This second section will cover what should be considered to safeguard incoming email traffic and our users from malicious messages. <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2487f3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2487f3c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43a4ba3\" data-id=\"43a4ba3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81b7e03 elementor-widget elementor-widget-heading\" data-id=\"81b7e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attack Methods Are Evolving<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10a3931 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10a3931\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf8a580\" data-id=\"cf8a580\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7789c14 elementor-widget elementor-widget-text-editor\" data-id=\"7789c14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Some of today&#8217;s email attacks are highly sophisticated, and anyone can fall victim to them. The most common attacks targeting organizations are so-called BEC \u2013 Business Email Compromise attacks, where the perpetrator impersonates an employee or partner of the same organization. In the worst-case scenario, a partner&#8217;s or colleague&#8217;s email account may have been compromised, making it extremely difficult for the user to discern who they are truly communicating with.   <\/p>\n<p>Another prevalent method is the &#8220;Fake email forward,&#8221; where an attacker constructs a fabricated email thread that includes genuine email addresses and fictitious agreed-upon payment instructions, among other things. The attacker then sends this message to an unsuspecting user, prompting them to take action. Examples of such attacks are numerous! The tactics have become increasingly sophisticated. Artificial intelligence further complicates defense efforts, necessitating a natural increase in vigilance.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6071aa2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6071aa2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9fdc86b\" data-id=\"9fdc86b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01f8c1f elementor-widget elementor-widget-heading\" data-id=\"01f8c1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Five Pillars for Securing Communication<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-00f9f56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00f9f56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bde282a\" data-id=\"bde282a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76de0d9 elementor-widget elementor-widget-text-editor\" data-id=\"76de0d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"i1UGIH\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-i1UGIH layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-fHXTCE\">\n<div class=\"sticky-wrapper\" data-id=\"fHXTCE\">\n<div class=\"guten-column-wrapper\">\n<p>How can organizations enhance their protection today? Below, I have briefly outlined five key areas that form a comprehensive framework for minimizing an organization&#8217;s cybersecurity threats and risks. While this overview is not exhaustive, it aims to provide insights and a benchmark for assessing your organization&#8217;s current status.  <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3112758 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3112758\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d7676dc\" data-id=\"d7676dc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fff30c3 elementor-widget elementor-widget-heading\" data-id=\"fff30c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Strategy<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4db6fdeb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4db6fdeb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b37c2b3\" data-id=\"5b37c2b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6dc9e73c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6dc9e73c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Everything begins with a strategy. Without one, efforts tend to be reactive and, regrettably, often belated. A strategy defines and guides, for instance:  <\/p>\n<ul>\n<li>Legislation and Standards: What potential requirements are imposed on our organization, such as ISO 27001, NIS2, etc. <\/li>\n<li>Technical Security Policy<\/li>\n<li>Incident Response Plan for Security Breaches<\/li>\n<li>Recovery and Continuity Plans<\/li>\n<li>Staff Training: How to ensure cybersecurity implementation for end-users<\/li>\n<li>Continuous Monitoring and Metrics: For example, how users can effortlessly report detected cybersecurity threats or incidents<\/li>\n<li>Cybersecurity Culture: How users are engaged in the organization&#8217;s collective cybersecurity initiatives<\/li>\n<\/ul>\n<p><br>The development of a cybersecurity strategy is a continuous process that requires regular review and updates. Moreover, it must be an integral part of the organization&#8217;s risk management, with commitment from leadership and continuous oversight. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-765dd04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"765dd04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995005\" data-id=\"7995005\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2bc035 elementor-widget elementor-widget-heading\" data-id=\"a2bc035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Technical Security Measures<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29a9220 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29a9220\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5c0d42\" data-id=\"c5c0d42\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8230b4e elementor-widget elementor-widget-text-editor\" data-id=\"8230b4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"NiNDAX\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-NiNDAX layout-boxed align-stretch\">\n<div class=\"guten-shape-divider guten-shape-divider-bottom\">Every Microsoft 365 subscription includes Exchange Online Protection (EOP), which provides basic protection measures.<\/div>\n<div class=\"guten-shape-divider guten-shape-divider-bottom\">For instance, the Microsoft Business Basic license only includes EOP. Business Premium, widely adopted in the SMB sector, already incorporates Defender for Office 365 Plan 1, which provides more advanced protection measures. I contend that EOP alone is insufficient today; it should be augmented either a) with a Defender for Office 365 add-on or b) by integrating a third-party security solution. Conditional Access Management for Entra ID is also a crucial component of end-user security, provided it is available under the current licensing.     <\/div>\n<div> <\/div>\n<div class=\"guten-shape-divider guten-shape-divider-bottom\">It is also important to note that both Defender and EOP require configuration to achieve the optimal level of protection, even though default settings allow for initial deployment.<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72719b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72719b0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8430019\" data-id=\"8430019\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f903fd elementor-widget elementor-widget-heading\" data-id=\"1f903fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">User Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-542c881 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"542c881\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-279d7a3\" data-id=\"279d7a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-699f943 elementor-widget elementor-widget-text-editor\" data-id=\"699f943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"Ze1B7c\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-Ze1B7c layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-WVDw1v\">\n<div class=\"sticky-wrapper\" data-id=\"WVDw1v\">\n<div class=\"guten-column-wrapper\">\n<p>This is arguably the most critical aspect to address within the strategy. Regular, targeted training sessions should cover current and common cybersecurity threats. The market offers excellent services providing cybersecurity micro-training. It is crucial to keep end-users consistently informed about phishing messages and other cybersecurity threats. However, it is equally important to ensure that the training material is presented in an easily understandable format.    <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68860de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68860de\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69e07d0\" data-id=\"69e07d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f66d17e elementor-widget elementor-widget-heading\" data-id=\"f66d17e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Processes<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a06428 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a06428\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a279b2c\" data-id=\"a279b2c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f648df9 elementor-widget elementor-widget-text-editor\" data-id=\"f648df9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"bcz9BJ\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-bcz9BJ layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-78pG74\">\n<div class=\"sticky-wrapper\" data-id=\"78pG74\">\n<div class=\"guten-column-wrapper\">\n<p>Processes outline the operating principles for various scenarios. They serve as guidelines for how we act in different situations and regarding communication. Examples include how an organization has documented a process for verifying payment change requests received via email, how to verify an individual&#8217;s identity when necessary, and how we generally respond to cybersecurity incidents.    <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0991539 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0991539\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83125c0\" data-id=\"83125c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a590ea5 elementor-widget elementor-widget-heading\" data-id=\"a590ea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Reporting and Monitoring<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd314a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd314a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc5f5ee\" data-id=\"dc5f5ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3f02b8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e3f02b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reporting and monitoring may have been overlooked in many organizations. End-users should be central to observing and reporting cybersecurity incidents. For phishing and malicious messages, this could involve, for example, integrating an email reporting button for users directly into the Outlook client within the M365 service. Another approach is to establish a Teams channel where users can report incidents and simultaneously inform other members of the organization. The IT department&#8217;s role is to actively monitor these reports and implement necessary adjustments to policies, training, or guidelines as required.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f32e481 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f32e481\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f3dc300\" data-id=\"f3dc300\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d076eda elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d076eda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section-wrapper\" data-id=\"i1UGIH\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-i1UGIH layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-fHXTCE\">\n<div class=\"sticky-wrapper\" data-id=\"fHXTCE\">\n<div class=\"guten-column-wrapper\">\n<p><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"section-wrapper\" data-id=\"A09Eir\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-A09Eir layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-2qJwb9\"><em>What thoughts did this article evoke in you? Do you perhaps need a sounding board or a consultant on this topic? Please do not hesitate to contact us to discuss further. You can book an appointment directly from my calendar at the bottom of the page.   <\/em><\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"section-wrapper\" data-id=\"L0WBHY\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-L0WBHY layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-fxV8A0\">\n<div class=\"sticky-wrapper\" data-id=\"fxV8A0\">\n<div class=\"guten-column-wrapper\">\n<p><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n<\/div>\n<\/section>\n<\/div>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the first part of communication security, I discussed message hygiene, specifically how we can better protect ourselves from the misuse of our email domains and enhance message deliverability. This second section will cover what should be considered to safeguard incoming email traffic and our users from malicious messages. Attack Methods Are Evolving Some of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[218,331,236,354],"tags":[362,219,363,381],"class_list":["post-9148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-information-work-and-communication","category-microsoft-365","category-modern-workplace","tag-communications","tag-cybersecurity","tag-knowledge-work","tag-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Communication Security Part 2 - Above IT Oy<\/title>\n<meta name=\"description\" content=\"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/communication-security-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Communication Security Part 2 - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/communication-security-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T08:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T12:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1710\" \/>\n\t<meta property=\"og:image:height\" content=\"1710\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mika Hakkarainen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mika Hakkarainen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/\"},\"author\":{\"name\":\"Mika Hakkarainen\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/042286daab0cbba998398a365b01589d\"},\"headline\":\"Communication Security Part 2\",\"datePublished\":\"2024-03-19T08:00:19+00:00\",\"dateModified\":\"2025-11-27T12:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg\",\"keywords\":[\"Communications\",\"cybersecurity\",\"Knowledge work\",\"Phishing\"],\"articleSection\":[\"Cybersecurity\",\"Information Work and Communication\",\"Microsoft 365\",\"Modern Workplace\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/\",\"name\":\"Communication Security Part 2 - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg\",\"datePublished\":\"2024-03-19T08:00:19+00:00\",\"dateModified\":\"2025-11-27T12:03:21+00:00\",\"description\":\"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg\",\"width\":1710,\"height\":1710},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/communication-security-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Communication Security Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/042286daab0cbba998398a365b01589d\",\"name\":\"Mika Hakkarainen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"caption\":\"Mika Hakkarainen\"},\"sameAs\":[\"https:\\\/\\\/aboveit.fi\"],\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/author\\\/mika-hakkarainenaboveit-fi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Communication Security Part 2 - Above IT Oy","description":"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Communication Security Part 2 - Above IT Oy","og_description":"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.","og_url":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_published_time":"2024-03-19T08:00:19+00:00","article_modified_time":"2025-11-27T12:03:21+00:00","og_image":[{"width":1710,"height":1710,"url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg","type":"image\/jpeg"}],"author":"Mika Hakkarainen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mika Hakkarainen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#article","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/"},"author":{"name":"Mika Hakkarainen","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/042286daab0cbba998398a365b01589d"},"headline":"Communication Security Part 2","datePublished":"2024-03-19T08:00:19+00:00","dateModified":"2025-11-27T12:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/"},"wordCount":763,"publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"image":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg","keywords":["Communications","cybersecurity","Knowledge work","Phishing"],"articleSection":["Cybersecurity","Information Work and Communication","Microsoft 365","Modern Workplace"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/","url":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/","name":"Communication Security Part 2 - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#primaryimage"},"image":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg","datePublished":"2024-03-19T08:00:19+00:00","dateModified":"2025-11-27T12:03:21+00:00","description":"The majority of cybersecurity threats target communication. Learn about the key areas that constitute protection practices against malicious email messages.","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/communication-security-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#primaryimage","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/03\/pexels-christina-morillo-1181542-scaled-e1710835049379.jpg","width":1710,"height":1710},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/communication-security-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"Communication Security Part 2"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]},{"@type":"Person","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/042286daab0cbba998398a365b01589d","name":"Mika Hakkarainen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","caption":"Mika Hakkarainen"},"sameAs":["https:\/\/aboveit.fi"],"url":"https:\/\/aboveit.fi\/en\/author\/mika-hakkarainenaboveit-fi\/"}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=9148"}],"version-history":[{"count":3,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9148\/revisions"}],"predecessor-version":[{"id":9164,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9148\/revisions\/9164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media\/9149"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=9148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/categories?post=9148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/tags?post=9148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}