{"id":12511,"date":"2015-11-20T05:13:55","date_gmt":"2015-11-19T18:13:55","guid":{"rendered":"https:\/\/creately.com\/blog\/?p=12511"},"modified":"2026-03-09T17:13:40","modified_gmt":"2026-03-09T06:13:40","slug":"what-is-cybersquatting-prevention-steps","status":"publish","type":"post","link":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/","title":{"rendered":"What is Cybersquatting and What You Can do to Prevent It"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p>There is nothing more natural and at the same time more annoying than the notion of bandwagon. As soon as something becomes \u201cthe thing\u201d everyone wants a piece of it and this can often be quite problematic. And the latest trend everyone&#8217;s trying to cash in on is Cybersquatting.<\/p>\n<p>For those of you who don&#8217;t know, <strong>Cybersquatting is the practice of\u00a0registering brand names of reputed companies as Internet domains for the intention of selling them later at a profit<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12529\" src=\"https:\/\/creately.com\/blog\/wp-content\/uploads\/2015\/11\/cybersquatting-1024x512.png\" alt=\"Cybersquatting\" width=\"595\" height=\"298\" srcset=\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting-1024x512.png 1024w, https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting-300x150.png 300w, https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png 1200w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/p>\n<p>Another similar problem that is even trickier to solve is <strong>username squatting<\/strong>. Username squatting is the practice of registering brand names of reputed companies as user names in popular sites.<\/p>\n<p>Spammers, will often try to find a way to exploit a <a href=\"https:\/\/creately.com\/blog\/marketing\/social-media-in-brand-building\/\" target=\"_blank\" rel=\"noopener noreferrer\">renowned brand<\/a> by trying to incorporate its name into their domain. However, while wicked men plot to tear down the online civilization, forces of order are not at idle either.<\/p>\n<h3>Damage to brand image<\/h3>\n<p>Even though it is easy for anyone to differentiate between an original brand page and a work of a cyber-squatter, most people simply won\u2019t care to do a thorough examination.<\/p>\n<p>One of the best example of this was when <a href=\"http:\/\/www.pcworld.com\/article\/171601\/how_cybersquatters_tarnish_brand_names.html\" target=\"_blank\" rel=\"noopener noreferrer\">website FreeLegoPorn.com started posting pictures with inappropriate videos featuring Lego characters<\/a>. Even though any vigilant person\u00a0could tell that this is not Lego\u2019s work, the damage had already been done.<\/p>\n<p>If you do a Google search you can find hundreds of cases like this where brands had to go to extreme lengths to rectify the situation. Check this link for some more interesting examples.<\/p>\n<h3>Security hazard<\/h3>\n<p>A hit to your brand name is one thing but\u00a0there is a problem even more serious than simple name borrowing.<\/p>\n<p>Hackers and cybersquatters sometimes create similar domain names and even copy the entire web page layout in order to trick people. This way, they can steal usernames and passwords from visitors and apply them at the real site.<\/p>\n<p>So far, <strong>the greatest problem that actual brand owners have with cybersquatting is that these phony sites are so numerous they simply cannot all be removed<\/strong>. When you remove one ten more pops up. Some of these decoys remain up even a full year after they are officially reported.<\/p>\n<h3>Legal means to fight cybersquatting<\/h3>\n<p>First you need to identify whether the question is about simple trademark infringement or cybersquatting. The difference between these two is quite significant since trademark infringement is a simple unlawful use of certain mark, logo or symbol. On the other hand cybersquatting is a violation of business\u2019s right to exclusively use its brand online.<\/p>\n<p>This being said, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Anticybersquatting_Consumer_Protection_Act\" target=\"_blank\" rel=\"noopener noreferrer\">Anticybersquatting Consumer Protection Act (or ACPA)<\/a> which was voted by the congress in late 1999, facilitates the process of recognizing sites which are results of cybersquatting.<\/p>\n<h3>Protecting yourself from Cybersquatting<\/h3>\n<p>As you can see, law is always on brand owner\u2019s side, however legal action can often be quite slow. For this reason it is crucial to do everything that is in your power to protect your online business.<\/p>\n<p>One of the simplest and by far the most effective steps here are to choose several top-level domains and create a page on all of them. Reserving a name on several domains like .com, .org or one of other top tier domains like <a href=\"http:\/\/domain.me\/\" target=\"_blank\" rel=\"noopener noreferrer\">.me domain<\/a>, might be surprisingly effective.<\/p>\n<p>Think of username squatting too. Even if you&#8217;re not planning to be active on them its a good idea to reserve your name in upcoming social media and social sharing sites.<\/p>\n<p>Other than that what the brands can do is be vigilant and try to act on cybersquatting as soon as possible. You can set up Google alerts for your brand or even use some brand mention tool for better results.<\/p>\n<h3>Preparing for the worse<\/h3>\n<p>The bigger your brand gets, the more hate you will accumulate, it is just the way things are. This will lead to people bashing you online and trying to hurt your reputation. The best way to deal with this is to always be prepared for the worst.<\/p>\n<p>Try to come up with the most probable and most common insulting names and wordplay&#8217;s for your company and <a href=\"http:\/\/www.thesitewizard.com\/domain\/reserve-domain-name.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">reserve those names before anyone else does<\/a>. You never know when an angry competitor or former employee will decide to do something this drastic. This is why you always need to stay one step ahead of them.<\/p>\n<p>In order to succeed in any business, you need to invest a lot of hard work and sacrifice. Because of this, it would be more than foolish to leave it all at the mercy of those that wish you harm.<\/p>\n<p>As always in life, it is up to you to protect what is rightfully yours or in this case, your business and your domain. As Roman poet Ovid once said \u201cHappy are those who dare courageously to defend what they love.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is nothing more natural and at the same time more annoying than the notion of bandwagon. As soon as something becomes \u201cthe thing\u201d everyone wants a piece of it and this can often be quite problematic. And the latest&#8230;<span class=\"continue-reading\"> <a href=\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\">Read More<\/a><\/span><\/p>\n","protected":false},"author":15,"featured_media":12529,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[666,669,668,667],"class_list":["post-12511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-marketing","tag-cybersquatting","tag-cybersquatting-examples","tag-domain-buying","tag-username-squatting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Cybersquatting and What You Can do to Prevent It - Creately Blog<\/title>\n<meta name=\"description\" content=\"What is cybersquatting, some examples of cybersquatting &amp; how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cybersquatting and What You Can do to Prevent It - Creately Blog\" \/>\n<meta property=\"og:description\" content=\"What is cybersquatting, some examples of cybersquatting &amp; how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\" \/>\n<meta property=\"og:site_name\" content=\"Creately Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/creately\" \/>\n<meta property=\"article:author\" content=\"http:\/\/facebook.com\/nishadha\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-19T18:13:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T06:13:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nishadha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nishadha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\"},\"author\":{\"name\":\"Nishadha\",\"@id\":\"https:\/\/creately.com\/blog\/#\/schema\/person\/3b0114786fc2afe9bb05acfea873e291\"},\"headline\":\"What is Cybersquatting and What You Can do to Prevent It\",\"datePublished\":\"2015-11-19T18:13:55+00:00\",\"dateModified\":\"2026-03-09T06:13:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\"},\"wordCount\":821,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/creately.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png\",\"keywords\":[\"cybersquatting\",\"cybersquatting examples\",\"domain buying\",\"username squatting\"],\"articleSection\":[\"Marketing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\",\"url\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\",\"name\":\"What is Cybersquatting and What You Can do to Prevent It - Creately Blog\",\"isPartOf\":{\"@id\":\"https:\/\/creately.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png\",\"datePublished\":\"2015-11-19T18:13:55+00:00\",\"dateModified\":\"2026-03-09T06:13:40+00:00\",\"description\":\"What is cybersquatting, some examples of cybersquatting & how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting\",\"breadcrumb\":{\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage\",\"url\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png\",\"contentUrl\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png\",\"width\":1200,\"height\":600,\"caption\":\"Cybersquatting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/creately.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cybersquatting and What You Can do to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/creately.com\/blog\/#website\",\"url\":\"https:\/\/creately.com\/blog\/\",\"name\":\"Creately Blog\",\"description\":\"Latest Product Updates and Tips on Working Visually\",\"publisher\":{\"@id\":\"https:\/\/creately.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/creately.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/creately.com\/blog\/#organization\",\"name\":\"Creately\",\"url\":\"https:\/\/creately.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/creately.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2023\/01\/creately-logo-symbol.png\",\"contentUrl\":\"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2023\/01\/creately-logo-symbol.png\",\"width\":430,\"height\":237,\"caption\":\"Creately\"},\"image\":{\"@id\":\"https:\/\/creately.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/creately\",\"https:\/\/x.com\/creately\",\"https:\/\/www.instagram.com\/creately_app\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/creately.com\/blog\/#\/schema\/person\/3b0114786fc2afe9bb05acfea873e291\",\"name\":\"Nishadha\",\"description\":\"Software engineer turned tech evangelist. I handle marketing stuff here at Creately including writing blog posts and handling social media accounts. In my spare time, I love to read and travel.\",\"sameAs\":[\"http:\/\/facebook.com\/nishadha\",\"https:\/\/x.com\/rumblinglankan\"],\"url\":\"https:\/\/creately.com\/blog\/author\/nish\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cybersquatting and What You Can do to Prevent It - Creately Blog","description":"What is cybersquatting, some examples of cybersquatting & how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"What is Cybersquatting and What You Can do to Prevent It - Creately Blog","og_description":"What is cybersquatting, some examples of cybersquatting & how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting","og_url":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/","og_site_name":"Creately Blog","article_publisher":"https:\/\/www.facebook.com\/creately","article_author":"http:\/\/facebook.com\/nishadha","article_published_time":"2015-11-19T18:13:55+00:00","article_modified_time":"2026-03-09T06:13:40+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png","type":"image\/png"}],"author":"Nishadha","twitter_misc":{"Written by":"Nishadha","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#article","isPartOf":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/"},"author":{"name":"Nishadha","@id":"https:\/\/creately.com\/blog\/#\/schema\/person\/3b0114786fc2afe9bb05acfea873e291"},"headline":"What is Cybersquatting and What You Can do to Prevent It","datePublished":"2015-11-19T18:13:55+00:00","dateModified":"2026-03-09T06:13:40+00:00","mainEntityOfPage":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/"},"wordCount":821,"commentCount":0,"publisher":{"@id":"https:\/\/creately.com\/blog\/#organization"},"image":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png","keywords":["cybersquatting","cybersquatting examples","domain buying","username squatting"],"articleSection":["Marketing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/","url":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/","name":"What is Cybersquatting and What You Can do to Prevent It - Creately Blog","isPartOf":{"@id":"https:\/\/creately.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage"},"image":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png","datePublished":"2015-11-19T18:13:55+00:00","dateModified":"2026-03-09T06:13:40+00:00","description":"What is cybersquatting, some examples of cybersquatting & how it can harm businesses and brands. Plus what brands can do to protect them from cybersquatting","breadcrumb":{"@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#primaryimage","url":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png","contentUrl":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2015\/11\/cybersquatting.png","width":1200,"height":600,"caption":"Cybersquatting"},{"@type":"BreadcrumbList","@id":"https:\/\/creately.com\/blog\/marketing\/what-is-cybersquatting-prevention-steps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/creately.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Cybersquatting and What You Can do to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/creately.com\/blog\/#website","url":"https:\/\/creately.com\/blog\/","name":"Creately Blog","description":"Latest Product Updates and Tips on Working Visually","publisher":{"@id":"https:\/\/creately.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/creately.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/creately.com\/blog\/#organization","name":"Creately","url":"https:\/\/creately.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/creately.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2023\/01\/creately-logo-symbol.png","contentUrl":"https:\/\/d3n817fwly711g.cloudfront.net\/uploads\/2023\/01\/creately-logo-symbol.png","width":430,"height":237,"caption":"Creately"},"image":{"@id":"https:\/\/creately.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/creately","https:\/\/x.com\/creately","https:\/\/www.instagram.com\/creately_app\/"]},{"@type":"Person","@id":"https:\/\/creately.com\/blog\/#\/schema\/person\/3b0114786fc2afe9bb05acfea873e291","name":"Nishadha","description":"Software engineer turned tech evangelist. I handle marketing stuff here at Creately including writing blog posts and handling social media accounts. In my spare time, I love to read and travel.","sameAs":["http:\/\/facebook.com\/nishadha","https:\/\/x.com\/rumblinglankan"],"url":"https:\/\/creately.com\/blog\/author\/nish\/"}]}},"_links":{"self":[{"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/posts\/12511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/comments?post=12511"}],"version-history":[{"count":9,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/posts\/12511\/revisions"}],"predecessor-version":[{"id":32318,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/posts\/12511\/revisions\/32318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/media\/12529"}],"wp:attachment":[{"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/media?parent=12511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/categories?post=12511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/creately.com\/blog\/wp-json\/wp\/v2\/tags?post=12511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}