{"id":10691,"date":"2014-01-08T22:10:47","date_gmt":"2014-01-09T03:10:47","guid":{"rendered":"http:\/\/www.poweryourpractice.com\/?p=10691"},"modified":"2025-07-01T11:59:22","modified_gmt":"2025-07-01T11:59:22","slug":"essentials-security-risk-analysis","status":"publish","type":"post","link":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/","title":{"rendered":"3 Essentials for a Successful Security Risk Analysis"},"content":{"rendered":"<p>Beyond the inevitable loss of patient trust, there are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.<\/p>\n<p>First off, security breaches can lead to serious financial losses. HIPAA penalties can cost as much as $50,000 for a single violation depending on the severity of the breach. Add this to any litigation brought forth by compromised patients, and the costs become astronomical.<\/p>\n<p><!--more-->Additionally, conducting a security risk analysis and correcting deficiencies is a core requirement for both <a href=\"https:\/\/www.carecloud.com\/continuum\/electronic-health-records\/cpoe-meaningful-use-incentives\/\">Meaningful Use<\/a> Stage 1 and Stage 2.<\/p>\n<p>Today, we\u2019ll break down how to conduct an effective security risk analysis into a three-step process that will keep your patients\u2019 information protected, HIPAA satisfied and Meaningful Use attestation on track.<\/p>\n<h2><strong>Review HIPAA Standards<\/strong><\/h2>\n<p>Meaningful Use\u2019s security risk analysis requirement is based on the HIPAA Security Rule of 1996. Even for those not looking to attest, it is the standard by which the federal government judges patient information protection. Therefore, familiarizing yourself with HIPAA standards is the first step to an effective analysis.<\/p>\n<p>As with any piece of legislation, the security rule is lengthy. But HHS provides a much shorter <a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/understanding\/srsummary.html\" target=\"_blank\" rel=\"noopener\">summary overview<\/a> of the rule, which includes any requirements your practice must comply with to avoid penalties.<\/p>\n<p>Because the rule was updated in late 2013, it\u2019s important to review it even if you\u2019re familiar with it. Among other things, <a href=\"https:\/\/www.carecloud.com\/continuum\/medical-practice-resources\/getting-up-to-speed-with-the-hipaa-omnibus-rule\/\">the Omnibus update<\/a> altered the definition of business associate and increased patient access to protected health information (PHI).<\/p>\n<h2><strong>Identify Vulnerabilities<\/strong><\/h2>\n<p>Since the responsibility of protecting PHI falls solely on providers, even practices with Meaningful Use certified EHRs need to protect themselves against security breaches.<\/p>\n<p>One area to look at is your EHRs user access controls. If not properly configured, unauthorized staff members or even an intruder may gain access to sensitive patient information.<\/p>\n<p>Also focus on drafting a strong security policy. An ambiguous policy can result in processes that put patient information at risk. Not having a policy is even worse, as it can push you into legal issues.<\/p>\n<p>Portable devices are another area where security can go awry. Seemingly, many security breach horror stories involve staff members leaving USB drives or laptops with patient information in places easily accessible to thieves. Make sure your staff avoids this at all costs.<\/p>\n<h2><strong>Implement Updates<\/strong><\/h2>\n<p>To meet Meaningful Use \u2013 and for patient data security in general \u2013 you\u2019ll have to implement changes to fix identified security risks.<\/p>\n<p>To ensure your patient access controls are up to HIPAA standards, every employee authorized to access your EHR should be given a unique username and password. Accessing the EHR while under another\u2019s username should be strictly forbidden. Tying each employee to a particular username makes it easier to track the source of a security breach.<\/p>\n<p>Make sure to include user access control protocols in your written policy. Other important areas to cover in your practice\u2019s policy include data backup procedures, HIPAA rules for security breach notification and best practices for using portable devices.<\/p>\n<p>If you\u2019d like to avoid using portable devices altogether, consider adopting a <a href=\"https:\/\/www.carecloud.com\/continuum\/ehr\/\" target=\"_blank\" rel=\"noopener\">cloud-based EHR<\/a>. Since cloud technology offers providers remote access to patient records from any place with an Internet connection, the use of USBs and external hard drives is almost completely eliminated.<\/p>\n<p>A preemptive security risk analysis should prevent your practices from falling victim to a security breach. Putting effort into protecting patient data ahead of time can save you from severe financial headaches down the line.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beyond the inevitable loss of patient trust, there are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices. First off, security breaches can lead to serious financial losses. HIPAA penalties can cost as much as $50,000 for a single violation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":32786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[38],"class_list":["post-10691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-growth","tag-icd-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Risk Analysis Essentials \u2013 CareCloud<\/title>\n<meta name=\"description\" content=\"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risk Analysis Essentials \u2013 CareCloud\" \/>\n<meta property=\"og:description\" content=\"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Continuum\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-09T03:10:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T11:59:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cc_continuum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cc_continuum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/\"},\"author\":{\"name\":\"cc_continuum\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/person\\\/6af17e75a684cc5cd23741e014351348\"},\"headline\":\"3 Essentials for a Successful Security Risk Analysis\",\"datePublished\":\"2014-01-09T03:10:47+00:00\",\"dateModified\":\"2025-07-01T11:59:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/\"},\"wordCount\":593,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png\",\"keywords\":[\"ICD-10\"],\"articleSection\":[\"Growth\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/\",\"name\":\"Security Risk Analysis Essentials \u2013 CareCloud\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png\",\"datePublished\":\"2014-01-09T03:10:47+00:00\",\"dateModified\":\"2025-07-01T11:59:22+00:00\",\"description\":\"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png\",\"contentUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png\",\"width\":400,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/essentials-security-risk-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Essentials for a Successful Security Risk Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#website\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\",\"name\":\"Continuum\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#organization\",\"name\":\"Continuum\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cc-logo-header-2021-1-2.png\",\"contentUrl\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/cc-logo-header-2021-1-2.png\",\"width\":218,\"height\":57,\"caption\":\"Continuum\"},\"image\":{\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/carecloud.com\\\/continuum\\\/#\\\/schema\\\/person\\\/6af17e75a684cc5cd23741e014351348\",\"name\":\"cc_continuum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g\",\"caption\":\"cc_continuum\"},\"sameAs\":[\"https:\\\/\\\/carecloud.com\\\/continuum\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Risk Analysis Essentials \u2013 CareCloud","description":"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Security Risk Analysis Essentials \u2013 CareCloud","og_description":"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.","og_url":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/","og_site_name":"Continuum","article_published_time":"2014-01-09T03:10:47+00:00","article_modified_time":"2025-07-01T11:59:22+00:00","og_image":[{"width":400,"height":350,"url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png","type":"image\/png"}],"author":"cc_continuum","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cc_continuum","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#article","isPartOf":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/"},"author":{"name":"cc_continuum","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/person\/6af17e75a684cc5cd23741e014351348"},"headline":"3 Essentials for a Successful Security Risk Analysis","datePublished":"2014-01-09T03:10:47+00:00","dateModified":"2025-07-01T11:59:22+00:00","mainEntityOfPage":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/"},"wordCount":593,"commentCount":0,"publisher":{"@id":"https:\/\/carecloud.com\/continuum\/#organization"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png","keywords":["ICD-10"],"articleSection":["Growth"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/","url":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/","name":"Security Risk Analysis Essentials \u2013 CareCloud","isPartOf":{"@id":"https:\/\/carecloud.com\/continuum\/#website"},"primaryImageOfPage":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#primaryimage"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png","datePublished":"2014-01-09T03:10:47+00:00","dateModified":"2025-07-01T11:59:22+00:00","description":"There are two important reasons your practice should perform a yearly security risk analysis on the patient data held in your EHR and other electronic devices.","breadcrumb":{"@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#primaryimage","url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png","contentUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2015\/10\/dummy-5-paigl6zusafxfmk55j3mhrce0nfw5zrnw9chmopqcs.png","width":400,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/carecloud.com\/continuum\/essentials-security-risk-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carecloud.com\/continuum\/"},{"@type":"ListItem","position":2,"name":"3 Essentials for a Successful Security Risk Analysis"}]},{"@type":"WebSite","@id":"https:\/\/carecloud.com\/continuum\/#website","url":"https:\/\/carecloud.com\/continuum\/","name":"Continuum","description":"","publisher":{"@id":"https:\/\/carecloud.com\/continuum\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carecloud.com\/continuum\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/carecloud.com\/continuum\/#organization","name":"Continuum","url":"https:\/\/carecloud.com\/continuum\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/logo\/image\/","url":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2025\/03\/cc-logo-header-2021-1-2.png","contentUrl":"https:\/\/carecloud.com\/continuum\/wp-content\/uploads\/2025\/03\/cc-logo-header-2021-1-2.png","width":218,"height":57,"caption":"Continuum"},"image":{"@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/carecloud.com\/continuum\/#\/schema\/person\/6af17e75a684cc5cd23741e014351348","name":"cc_continuum","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b6d796be6337a9688b6e065532f1be27bf69a98f06ddc7a6dda2c9cbbcf4078?s=96&d=mm&r=g","caption":"cc_continuum"},"sameAs":["https:\/\/carecloud.com\/continuum"]}]}},"_links":{"self":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/10691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/comments?post=10691"}],"version-history":[{"count":1,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/10691\/revisions"}],"predecessor-version":[{"id":42782,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/posts\/10691\/revisions\/42782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/media\/32786"}],"wp:attachment":[{"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/media?parent=10691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/categories?post=10691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carecloud.com\/continuum\/wp-json\/wp\/v2\/tags?post=10691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}