{"id":44484,"date":"2017-09-19T00:00:00","date_gmt":"2017-09-18T23:00:00","guid":{"rendered":"https:\/\/www.colt.net\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/"},"modified":"2024-04-10T17:06:26","modified_gmt":"2024-04-10T16:06:26","slug":"piratage-telephonique-entre-vulnerabilite-et-protection","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/","title":{"rendered":"Protection face au piratage t\u00e9l\u00e9phonique"},"content":{"rendered":"<p dir=\"LTR\" align=\"JUSTIFY\"><strong><em>Fraude t\u00e9l\u00e9phonique : entre vuln\u00e9rabilit\u00e9 et protection. Il est important de ma\u00eetriser la r\u00e8gle des 5.<\/em><\/strong><\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">Le piratage t\u00e9l\u00e9phonique explose, et que dire de la facture finalement pay\u00e9e par les entreprises ! Il est urgent pour elles d\u2019instaurer en interne des comportements vertueux afin de se pr\u00e9munir contre la perturbation de leurs services et la perte de dizaines de millions d&#8217;euros \u00e0 l\u2019\u00e9chelle mondiale. Pindrop Labs chiffre \u00e0 45 % la hausse \u00e0 l\u2019internationale du nombre d\u2019appels frauduleux que re\u00e7oivent les entreprises depuis 2013*. Sachant qu\u2019un seul de ces appels co\u00fbte en moyenne 0,65 \u20ac \u00e0 l\u2019entreprise.\u00a0 \u00c0 multiplier par des milliards d\u2019appels \u00e0 travers le monde la facture atteint rapidement des sommes astronomiques. Puisque la s\u00e9curit\u00e9 des entreprises repose, en fonction de leur taille, sur les \u00e9paules des \u00e9quipes IT ou des responsables de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI), c\u2019est \u00e0 eux qu\u2019il incombe de\u00a0transmettre une culture de la vigilance et quelques bons r\u00e9flexes au sein de l&#8217;ensemble de l\u2019entreprise.<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">Les 5 signes de la fraude\u2026<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">Un collaborateur bien sensibilis\u00e9 en amont peut rep\u00e9rer plus facilement l\u2019un de ces indices de malveillance dont son entreprise peut \u00eatre victime : (1) des appels tr\u00e8s longs, ou tr\u00e8s courts et en nombre, pass\u00e9s depuis les terminaux de l\u2019entreprise ; (2) des interlocuteurs insolites dans les historiques, (3) ou anormalement r\u00e9p\u00e9t\u00e9s ; (4) des volumes d\u2019appels incongrus pass\u00e9s la nuit ou le week-end ; (5) et des difficult\u00e9s \u00e0 acc\u00e9der aux messageries vocales.<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">La sensibilisation des collaborateurs est par cons\u00e9quent indispensable pour que ces signes soient d\u00e9tect\u00e9s et fassent l\u2019objet de signalements, d\u2019investigations, puis de mesures correctrices.<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">\u2026et les cinq r\u00e9flexes premiers pour s\u2019en pr\u00e9munir<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">En parall\u00e8le, cinq premi\u00e8res mesures pr\u00e9ventives sont \u00e0 impl\u00e9menter pour hisser le niveau de s\u00e9curit\u00e9 du r\u00e9seau t\u00e9l\u00e9phonique interne de l\u2019entreprise\u3000:<\/p>\n<ol>\n<li>La d\u00e9sactivation de toute fonctionnalit\u00e9 non utilis\u00e9e du PBX**, ports d\u2019acc\u00e8s \u00e0 distance inclus. Si ces ports sont utilis\u00e9s, ou si le r\u00e9seau t\u00e9l\u00e9phonique est virtualis\u00e9 (<em>via<\/em> cloud), les processus d\u2019identification les plus stricts (Smartcards, Tokens, <em>etc<\/em>.) seront de rigueur.<\/li>\n<li>La revue r\u00e9guli\u00e8re de l\u2019utilisation de tous les \u00e9quipements constituant le PBX. Cette revue sera syst\u00e9matique en cas d\u2019anomalie d\u00e9tect\u00e9e (voir ci-dessus).<\/li>\n<li>Le changement de tous les mots de passe et identifiants en cas de changement d\u2019\u00e9quipement PBX ou de solution de t\u00e9l\u00e9phonie virtualis\u00e9e. Dans ce cadre, le nombre d\u2019employ\u00e9s habilit\u00e9s \u00e0 changer un identifiant et un mot de passe doit \u00eatre aussi limit\u00e9 que possible.<\/li>\n<li>La mise \u00e0 jour r\u00e9guli\u00e8re des syst\u00e8mes de s\u00e9curit\u00e9 : si ce point semble \u00e9vident, les derniers cas d\u2019attaques ransomware montrent qu\u2019il ne l\u2019est pas effectivement pour toutes les entreprises.<\/li>\n<li>La vigilance du standard lorsqu\u2019une pr\u00e9tendue entreprise ext\u00e9rieure appelle pour \u00eatre mise en relation avec un collaborateur de l\u2019entreprise.<\/li>\n<\/ol>\n<p dir=\"LTR\" align=\"JUSTIFY\">Ces premi\u00e8res mesures sont le pr\u00e9alable \u00e0 un n\u00e9cessaire diagnostic de s\u00e9curit\u00e9 de l\u2019infrastructure t\u00e9l\u00e9phonique de l\u2019entreprise. N\u2019oublions pas que la t\u00e9l\u00e9phonie interne est une porte d\u2019entr\u00e9e sur son r\u00e9seau, ses donn\u00e9es et son activit\u00e9 \u00e9conomique. Les lignes VoIP sont par cons\u00e9quent des cibles de choix, 45% des appels frauduleux leur sont destin\u00e9s. Toute entreprise doit demeurer vigilante et instaurer une culture de la pr\u00e9vention et alimenter une prise de conscience parmi les collaborateurs : ils sont tous des acteurs de sa protection !<\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">*<em>Pindrop Labs, 2016 Call Center Fraud Report<\/em><\/p>\n<p dir=\"LTR\" align=\"JUSTIFY\">**<em>L\u2019autocommutateur t\u00e9l\u00e9phonique priv\u00e9 (PBX) est le lien physique entre le r\u00e9seau t\u00e9l\u00e9phonique interne d\u2019une entreprise et le r\u00e9seau t\u00e9l\u00e9phonique public.<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[1487],"colt_ind":[1252],"colt_products":[1492],"colt_solutions":[],"class_list":["post-44484","post","type-post","status-publish","format-standard","hentry","colt_type-blog-fr","colt_ind-technology-fr","colt_products-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-18T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T16:06:26+00:00\" \/>\n<meta name=\"author\" content=\"Robert Ba\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Ba\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\"},\"author\":{\"name\":\"Robert Ba\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c\"},\"headline\":\"Protection face au piratage t\u00e9l\u00e9phonique\",\"datePublished\":\"2017-09-18T23:00:00+00:00\",\"dateModified\":\"2024-04-10T16:06:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\"},\"wordCount\":654,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"articleSection\":[\"General\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\",\"name\":\"Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"datePublished\":\"2017-09-18T23:00:00+00:00\",\"dateModified\":\"2024-04-10T16:06:26+00:00\",\"description\":\"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\/\/legacy.colt.net\/fr\/resources\/type\/blog-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protection face au piratage t\u00e9l\u00e9phonique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c\",\"name\":\"Robert Ba\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g\",\"caption\":\"Robert Ba\"},\"description\":\"Colt provide world class network and voice connectivity to businesses in Europe, Asia and the US.\",\"url\":\"https:\/\/legacy.colt.net\/fr\/resources\/author\/robertba\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services","description":"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services","og_description":"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.","og_url":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2017-09-18T23:00:00+00:00","article_modified_time":"2024-04-10T16:06:26+00:00","author":"Robert Ba","twitter_card":"summary_large_image","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Robert Ba","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/"},"author":{"name":"Robert Ba","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c"},"headline":"Protection face au piratage t\u00e9l\u00e9phonique","datePublished":"2017-09-18T23:00:00+00:00","dateModified":"2024-04-10T16:06:26+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/"},"wordCount":654,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"articleSection":["General"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/","url":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/","name":"Protection face au piratage t\u00e9l\u00e9phonique - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"datePublished":"2017-09-18T23:00:00+00:00","dateModified":"2024-04-10T16:06:26+00:00","description":"An article dedicated to the prevention against phone fraud and the signs of the hacking with a description in 5 points and the best to prevent them.","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/fr\/resources\/piratage-telephonique-entre-vulnerabilite-et-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/fr\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/legacy.colt.net\/fr\/resources\/type\/blog-fr\/"},{"@type":"ListItem","position":3,"name":"Protection face au piratage t\u00e9l\u00e9phonique"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/b52e42bb2cb7da752a39308bf6dfd29c","name":"Robert Ba","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec258f338241acab715f7f4666b716a74823ba6b4ec18774d9d5af0cc27545bd?s=96&d=mm&r=g","caption":"Robert Ba"},"description":"Colt provide world class network and voice connectivity to businesses in Europe, Asia and the US.","url":"https:\/\/legacy.colt.net\/fr\/resources\/author\/robertba\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/44484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/comments?post=44484"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/posts\/44484\/revisions"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/media?parent=44484"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_type?post=44484"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_ind?post=44484"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_products?post=44484"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/fr\/wp-json\/wp\/v2\/colt_solutions?post=44484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}