{"id":2498,"date":"2026-02-01T22:36:18","date_gmt":"2026-02-01T22:36:18","guid":{"rendered":"https:\/\/spywizards.com\/blog\/?p=2498"},"modified":"2026-03-10T09:56:27","modified_gmt":"2026-03-10T09:56:27","slug":"top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately","status":"publish","type":"post","link":"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/","title":{"rendered":"Top 10 Signs Your Business Has Been Compromised (And What to Do Immediately)"},"content":{"rendered":"<p>Cyberattacks rarely start with a loud alarm. Most compromises begin quietly &#8211; one suspicious login, one unusual file change, or one employee clicking a convincing phishing link. If you can recognize the <strong>signs your business has been compromised<\/strong> early, you can contain the incident before it spreads.<\/p>\n<p class=\"updated-date\" style=\"font-size: 0.9em; color: #666; margin-top: 20px;\">Updated February 2026<\/p>\n<\/p>\n<p>This guide covers the top indicators of a breach, what to do in the first 60 minutes, and how to strengthen your defenses. Its written for business owners, IT managers, and teams that want clear, practical steps.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/images.unsplash.com\/photo-1550751827-4bd374c3f58b?auto=format&#038;fit=crop&#038;w=1600&#038;q=80\" alt=\"Cybersecurity incident response checklist\" title=\"\"><\/figure>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<p><span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav>\n<ul class='ez-toc-list ez-toc-list-level-1 ' >\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#Signs_Your_Business_Has_Been_Compromised_10_Critical_Indicators\" >Signs Your Business Has Been Compromised: 10 Critical Indicators<\/a>\n<ul class='ez-toc-list-level-3' >\n<li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#1_Unusual_Login_Activity\" >1) Unusual Login Activity<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#2_New_Admin_Accounts_You_Didnt_Create\" >2) New Admin Accounts You Didnt Create<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#3_Sudden_System_Slowdowns_or_Crashes\" >3) Sudden System Slowdowns or Crashes<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#4_Unexplained_Data_Transfers_or_Spikes\" >4) Unexplained Data Transfers or Spikes<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#5_Security_Tools_Disabled_Without_Permission\" >5) Security Tools Disabled Without Permission<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#6_Employees_Report_Strange_Emails_or_Pop-ups\" >6) Employees Report Strange Emails or Pop-ups<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#7_Files_Are_Encrypted_or_Missing\" >7) Files Are Encrypted or Missing<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#8_Website_Defacement_or_Redirects\" >8) Website Defacement or Redirects<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#9_Unauthorized_Financial_Transactions\" >9) Unauthorized Financial Transactions<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#10_Customers_Report_Suspicious_Activity\" >10) Customers Report Suspicious Activity<\/a><\/li>\n<\/ul>\n<\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#What_To_Do_in_the_First_60_Minutes_Incident_Response_Checklist\" >What To Do in the First 60 Minutes (Incident Response Checklist)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#Why_Small_Breaches_Become_Big_Incidents\" >Why Small Breaches Become Big Incidents<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#Prevention_Tips_That_Reduce_Breach_Risk\" >Prevention Tips That Reduce Breach Risk<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#FAQs_Fast_Answers\" >FAQs (Fast Answers)<\/a><\/li>\n<li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/spywizards.com\/blog\/top-10-signs-your-business-has-been-compromised-and-what-to-do-immediately\/#Final_Word\" >Final Word<\/a><\/li>\n<\/ul>\n<\/nav>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"Signs_Your_Business_Has_Been_Compromised_10_Critical_Indicators\"><\/span><span class=\"ez-toc-section\" id=\"Signs_Your_Business_Has_Been_Compromised_10_Critical_Indicators\"><\/span>Signs Your Business Has Been Compromised: 10 Critical Indicators<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"1_Unusual_Login_Activity\"><\/span><span class=\"ez-toc-section\" id=\"1_Unusual_Login_Activity\"><\/span>1) Unusual Login Activity<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Logins from strange locations, odd times, or unknown devices. You may see multiple failed logins followed by one successful access.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Force password resets<\/li>\n<li>Enable MFA immediately<\/li>\n<li>Review admin access logs<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"2_New_Admin_Accounts_You_Didnt_Create\"><\/span><span class=\"ez-toc-section\" id=\"2_New_Admin_Accounts_You_Didnt_Create\"><\/span>2) New Admin Accounts You Didnt Create<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> A new user with high privileges appears in your system, or existing user roles are suddenly elevated.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Disable the account<\/li>\n<li>Audit all admin users<\/li>\n<li>Review recent permission changes<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"3_Sudden_System_Slowdowns_or_Crashes\"><\/span><span class=\"ez-toc-section\" id=\"3_Sudden_System_Slowdowns_or_Crashes\"><\/span>3) Sudden System Slowdowns or Crashes<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Servers or PCs become noticeably slower, crash randomly, or show unusual CPU spikes.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Isolate affected devices<\/li>\n<li>Run endpoint scans<\/li>\n<li>Check for unusual processes<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"4_Unexplained_Data_Transfers_or_Spikes\"><\/span><span class=\"ez-toc-section\" id=\"4_Unexplained_Data_Transfers_or_Spikes\"><\/span>4) Unexplained Data Transfers or Spikes<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Large outgoing traffic at odd hours, unexplained file uploads, or spikes in data egress.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Block suspicious IPs<\/li>\n<li>Review firewall and proxy logs<\/li>\n<li>Isolate the affected machine<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"5_Security_Tools_Disabled_Without_Permission\"><\/span><span class=\"ez-toc-section\" id=\"5_Security_Tools_Disabled_Without_Permission\"><\/span>5) Security Tools Disabled Without Permission<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Antivirus, EDR, or firewall tools are turned off or show tampered settings.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Re-enable protection<\/li>\n<li>Investigate who changed settings<\/li>\n<li>Scan for persistence tools<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"6_Employees_Report_Strange_Emails_or_Pop-ups\"><\/span><span class=\"ez-toc-section\" id=\"6_Employees_Report_Strange_Emails_or_Pop-ups\"><\/span>6) Employees Report Strange Emails or Pop-ups<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Phishing reports, unusual prompts, urgent login requests, or pop-ups asking for credentials.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Warn staff company-wide<\/li>\n<li>Block the sender domain<\/li>\n<li>Reset passwords for affected users<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"7_Files_Are_Encrypted_or_Missing\"><\/span><span class=\"ez-toc-section\" id=\"7_Files_Are_Encrypted_or_Missing\"><\/span>7) Files Are Encrypted or Missing<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Documents wont open, have new extensions, or entire folders disappear.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Disconnect from network<\/li>\n<li>Start incident response<\/li>\n<li>Restore from clean backups<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"8_Website_Defacement_or_Redirects\"><\/span><span class=\"ez-toc-section\" id=\"8_Website_Defacement_or_Redirects\"><\/span>8) Website Defacement or Redirects<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Your site shows unknown content, redirects to spam, or displays warnings in browsers.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Take the site offline<\/li>\n<li>Restore from clean backup<\/li>\n<li>Scan hosting environment<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"9_Unauthorized_Financial_Transactions\"><\/span><span class=\"ez-toc-section\" id=\"9_Unauthorized_Financial_Transactions\"><\/span>9) Unauthorized Financial Transactions<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Suspicious bank or payment activity, unusual refunds, or new payout destinations.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Freeze accounts<\/li>\n<li>Contact your bank immediately<\/li>\n<li>Investigate compromised credentials<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"10_Customers_Report_Suspicious_Activity\"><\/span><span class=\"ez-toc-section\" id=\"10_Customers_Report_Suspicious_Activity\"><\/span>10) Customers Report Suspicious Activity<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>What it looks like:<\/strong> Clients receive spam or fraud linked to your brand, or report account takeovers.<\/p>\n<p><strong>Do this now:<\/strong><\/p>\n<ul>\n<li>Notify customers promptly<\/li>\n<li>Rotate all compromised credentials<\/li>\n<li>Launch a full forensic review<\/li>\n<\/ul>\n<figure><img decoding=\"async\" src=\"https:\/\/images.unsplash.com\/photo-1518770660439-4636190af475?auto=format&#038;fit=crop&#038;w=1600&#038;q=80\" alt=\"Business cybersecurity risk assessment\" title=\"\"><\/figure>\n<h2><span class=\"ez-toc-section\" id=\"What_To_Do_in_the_First_60_Minutes_Incident_Response_Checklist\"><\/span><span class=\"ez-toc-section\" id=\"What_To_Do_in_the_First_60_Minutes_Incident_Response_Checklist\"><\/span>What To Do in the First 60 Minutes (Incident Response Checklist)<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Isolate affected devices or servers from the network<\/li>\n<li>Preserve logs and evidence before making major changes<\/li>\n<li>Reset admin passwords and revoke suspicious sessions<\/li>\n<li>Disable unknown accounts and rotate API keys<\/li>\n<li>Notify leadership and activate your incident response team<\/li>\n<li>Contact a professional security team if the impact is unclear<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Why_Small_Breaches_Become_Big_Incidents\"><\/span><span class=\"ez-toc-section\" id=\"Why_Small_Breaches_Become_Big_Incidents\"><\/span>Why Small Breaches Become Big Incidents<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Most breaches become costly because organizations wait too long to respond. Attackers often linger for days or weeks, escalating privileges and moving laterally. Thats why a fast, structured response matters more than perfect answers. If you need a deeper look at how attackers operate, read our guide on <a href=\"https:\/\/spywizards.com\/blog\/what-is-a-penetration-test-step-by-step-breakdown\/\">what a penetration test is and how it works<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Prevention_Tips_That_Reduce_Breach_Risk\"><\/span><span class=\"ez-toc-section\" id=\"Prevention_Tips_That_Reduce_Breach_Risk\"><\/span>Prevention Tips That Reduce Breach Risk<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Enforce MFA everywhere:<\/strong> Email, admin panels, and remote access tools.<\/li>\n<li><strong>Audit access monthly:<\/strong> Remove stale accounts and over-privileged users.<\/li>\n<li><strong>Patch fast:<\/strong> Outdated plugins and software are the #1 entry point.<\/li>\n<li><strong>Back up daily:<\/strong> Keep offline and immutable backups if possible.<\/li>\n<li><strong>Train staff:<\/strong> Run phishing simulations and basic security training.<\/li>\n<\/ul>\n<p>For additional context on modern attack surfaces, see our analysis of <a href=\"https:\/\/spywizards.com\/blog\/attacking-an-iot-device-on-a-corporate-network-risks-methods-and-protection\/\">IoT risks on corporate networks<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FAQs_Fast_Answers\"><\/span><span class=\"ez-toc-section\" id=\"FAQs_Fast_Answers\"><\/span>FAQs (Fast Answers)<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Q1: How do I know if my business has been hacked?<\/strong><br \/>Look for unusual logins, disabled security tools, suspicious data transfers, or new admin accounts you didnt create.<\/p>\n<p><strong>Q2: What should I do first if I suspect a breach?<\/strong><br \/>Isolate the affected device or server and preserve logs before making changes.<\/p>\n<p><strong>Q3: Do I need to report a cyber incident?<\/strong><br \/>Depending on your industry and region, you may have legal or regulatory reporting obligations.<\/p>\n<p><strong>Q4: How can I reduce damage during an attack?<\/strong><br \/>Cut off access, rotate credentials, and engage incident response support immediately.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Final_Word\"><\/span><span class=\"ez-toc-section\" id=\"Final_Word\"><\/span>Final Word<span class=\"ez-toc-section-end\"><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Early detection is the difference between a manageable incident and a business-threatening breach. If you are seeing any of these signs, act fast and get expert help.<\/p>\n<p><strong>Need urgent response or a security audit?<\/strong> Contact Spy Wizards for confidential, professional cybersecurity support.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks rarely start with a loud alarm. Most compromises begin quietly &#8211; one suspicious login, one unusual file change, or one employee clicking a convincing phishing link. If you can recognize the signs your business has been compromised early, you can contain the incident before it spreads. Updated February 2026 This guide covers the top [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2498","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/posts\/2498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/comments?post=2498"}],"version-history":[{"count":5,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/posts\/2498\/revisions"}],"predecessor-version":[{"id":3702,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/posts\/2498\/revisions\/3702"}],"wp:attachment":[{"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/media?parent=2498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/categories?post=2498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spywizards.com\/blog\/wp-json\/wp\/v2\/tags?post=2498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}