{"id":11005,"date":"2017-08-22T10:55:17","date_gmt":"2017-08-22T15:55:17","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=11005"},"modified":"2022-11-22T16:09:08","modified_gmt":"2022-11-22T22:09:08","slug":"7-reasons-end-users-bypass-department","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2017\/08\/7-reasons-end-users-bypass-department\/","title":{"rendered":"7 reasons why end users bypass the IT department"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" alt=\"Education\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control the rise of Shadow IT in your business? You must first understand why it happens. Why do users feel the need to circumvent IT in the first place? In this article, we explore a few reasons and share some tips to help you control Shadow IT.<\/em><\/span><br \/>\n<a name=\"201700821\"><\/a><!--more--><br \/>\nIt\u2019s a growing problem: End users are bypassing the IT department, and opting for third-party solutions&#8211;a practice known as Shadow IT. How prevalent is this issue? According to a recent <a onclick=\"ga('send', 'event', 'Blog', 'Outside Link', 'Digitalist Mag'); \" href=\"http:\/\/www.digitalistmag.com\/resource-optimization\/2016\/02\/11\/2016-state-of-shadow-it-04005674\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">survey<\/span><\/a>, 83% of organizations say employees are using apps not sanctioned by IT.<\/p>\n<p>By now, you probably understand the risks of Shadow IT. How can the IT department monitor or secure company data if they don\u2019t even know where it\u2019s stored? How can they avoid security breaches if employees are carrying confidential data around on their personal devices?<\/p>\n<p>Now, the automatic reaction for some IT leaders is full-on war. They want to ban third-party apps, outlaw personal devices, and restrict internet usage. After all, these employees are putting corporate data at risk. They must be stopped! Right?<\/p>\n<p>While I understand the mentality, this is rarely a good approach. Treating users like the bad guys and implementing heavy restrictions will not only waste your time, it will alienate your employees. After all, it doesn\u2019t address the root of the issue: Why are employees bypassing IT in the first place? Do they enjoy breaking the rules? I don\u2019t think so. <\/p>\n<p>If you want to control the rise of Shadow IT in your organization, first understand the cause. Learn why employees feel the need to circumvent IT in the first place\u2026and then you\u2019ll better understand how to control (or even harness) it.<\/p>\n<p>So, why do end users bypass the IT department? What can you do about it? Today, let\u2019s focus on these questions. Here are 7 of the most common reasons why end users bypass the IT department:<\/p>\n<h3>1. IT does not offer solutions quickly<\/h3>\n<p><figure id=\"attachment_9284\" aria-describedby=\"caption-attachment-9284\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/07\/turtle-279399_640-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" class=\"size-medium wp-image-9284\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/07\/turtle-279399_640-300x200.jpg 300w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/07\/turtle-279399_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-9284\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/pixabay.com\/en\/turtle-tortoise-reptile-animal-279399\/\">amayaeguizabal<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>The biggest reason why end users bypass IT departments: Speed. They believe they can get a solution faster on their own.<\/p>\n<p>Now, I understand the dilemma facing IT. Most IT departments are already overworked. Chances are, they\u2019re understaffed as well. Answering every end user request and delivering solutions in a timely manner is likely impossible.<\/p>\n<p>That being said, users now have choices. For instance, suppose a user needs a basic web application from the IT department. For many users, the choice looks like this: <\/p>\n<p><strong>Choice #1:<\/strong> Request a new application from IT, wait around for approval, and then wait around while IT builds the solution. Time required: Weeks.<\/p>\n<p><strong>Choice #2:<\/strong> Bypass IT altogether and use a cloud-based alternative. Time required: Days.<\/p>\n<p>For business users whose salaries are directly tied to their results, which option is more appealing? Which option delivers results faster?<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cIt&#8217;s 2017, and most software solutions are now a web-based, SaaS (Software-As-A-Service) solutions that are Subscription-based Cloud Services hosted by an outside service provider,\u201d says Maria Santagati, Founder of <span style=\"color: red; font-weight: bold;\">Stratball<\/span>. \u201cThis often proves to be more cost-effective and efficient because businesses can get their software installed, configured, and stood up faster than they could to do this themselves in-house. They also don&#8217;t need to hire these resources, train them, pay them benefits, etc.\u201d<\/p>\n<p>\u201cSo business users don&#8217;t need to wait for IT &#8211; they can get the software solution they need quickly and begin realizing the cost-benefits of the solution faster and easier; with the solution returning real value to the business, ROI, and profits.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nYes, your IT department is probably overworked. But, you must understand that end users will take the path of least resistance. If your IT department can\u2019t deliver the solutions they need (when they need them), give them self-service options to create their own solutions. This gives them what they want, while still giving you control over data and user access.<\/p>\n<h3>2. IT and the business do not speak the same language<\/h3>\n<p>It\u2019s no secret that IT departments and business users often struggle with communication. Sometimes, it feels like the two sides speak different languages altogether. <\/p>\n<p>Here\u2019s an <a onclick=\"ga('send', 'event', 'Blog', 'Outside Link', 'CIO Insight'); \" href=\"http:\/\/www.cioinsight.com\/it-management\/expert-voices\/translating-it-speak-into-business-speak.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">article<\/span><\/a> from a few years back that highlights why this is such a problem: \u201cIs it any wonder that, lacking a common vocabulary with which to effectively communicate, many IT initiatives fail to deliver what the business really wanted?\u201d<\/p>\n<p>Now, I\u2019m not saying the fault lies with one side or the other. But, this issue helps us understand another reason why end users bypass the IT department. If there\u2019s a communication barrier that results in solutions that don&#8217;t meet the user&#8217;s needs, is it any wonder that they try another route?<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cThe less obvious reason for Shadow IT is due to neurodiversity and the vastly different way business and technology people process and interact with the world,\u201d says <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'Tim Goldstein'); \" href=\"https:\/\/www.timgoldstein.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Tim Goldstein<\/span><\/a>, Neurodiversity Communication Specialist. \u201cFrom my background in both business and technology I am more aware than most of the great difficulty working with the tech department. Getting them to understand the actual business need is frequently very difficult. Because of the lack of understanding, not only is frustration created, but the work they create will frequently not match the actual way the business works.\u201d<\/p>\n<p>\u201cLack of Neurodiversity understanding make it a frustrating task with poor social interactions and frustrating convoluted discussion. Easier to just let Mary in the biz department who like doing spreadsheets take on something bigger that will get done, than to deal with the IT department, get frustrated, and still have the same business problem.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nOne way to improve communication: Bring both sides together. That could mean anything from changing where the IT staff is located in the office to having more cross-department functions. If you&#8217;d like to learn more, here\u2019s a nice <span style=\"color: red; font-weight: bold;\">article<\/span> that explains a few more ways to improve communication between both sides.<\/p>\n<h3>3. IT is viewed as a barrier<\/h3>\n<p><figure id=\"attachment_7192\" aria-describedby=\"caption-attachment-7192\" style=\"width: 161px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2013\/11\/small_2966571740.jpg\" alt=\"\" width=\"161\" height=\"240\" class=\"size-full wp-image-7192\" \/><figcaption id=\"caption-attachment-7192\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/mugley\/2966571740\/\">mugley<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure>In the past, IT departments controlled technology because it was scarce, and hard for business users to obtain and use. Unfortunately, this created a \u201cculture of no\u201d among many IT departments. These IT departments were more likely to deny user requests than attempt to help solve their problems.<\/p>\n<p>These days, IT departments are no longer the only ones with access to technology. The problem is, some IT departments haven\u2019t received the memo. They still act like they\u2019re the only option. They\u2019re quick to say \u201cNo\u201d, and slow to help.<\/p>\n<p>Now, I\u2019m not suggesting that IT departments say \u201cYes\u201d to every request. I also understand that procedures, processes, and budgets may slow down IT departments attempting to help users. <\/p>\n<p>But, IT must understand that they\u2019re no longer the only option. When the only thing users hear from IT is \u201cNo\u201d or \u201cYou can\u2019t do that\u201d, they will look for other options.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cEnd-users opting to bypass the IT department are often frustrated with lengthy bureaucratic processes which &#8211; in their view &#8211; inhibit progress with significant wait times before any changes can be made,\u201d says Lauren Stafford, Digital Publishing Strategist at <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'Discover CRM'); \" href=\"http:\/\/discovercrm.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Discover CRM<\/span><\/a>. \u201cEven corporate policy devised with the best of intentions becomes outdated very quickly. As such, it\u2019s difficult for any IT department to keep up with the demand of end-users who are used to having autonomy over their technological decisions outside of work. This is compounded by the rise of BYOD practices in the workplace, which promotes a culture of entitlement and self-sufficiency that is sometimes in conflict with restrictive company policy. There\u2019ll always need to be a level of compromise as IT departments adjust to an influx of increasingly tech savvy end-users.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nTake a look at your technology approval procedures. Do they pose a barrier for end users? How long does it take to get a solution? Also, modern IT departments must adopt a \u201ccan-do\u201d attitude. Even if they can\u2019t give the user exactly what they want, they must try to understand the problem and help provide a solution. <\/p>\n<h3>4. IT lacks the skills<\/h3>\n<p>Technology is evolving faster than ever. The problem is, skills aren\u2019t keeping up. Many IT departments lack the skills necessary to deliver modern solutions.<\/p>\n<p>Now, I do understand how tricky this can be for IT departments. They\u2019re overworked and understaffed. They spend most of their time fighting fires. How can they learn new skills when all of their time is spent keeping things running?<\/p>\n<p>While those are valid questions, you must also look at the problem from the other side. What happens when users ask for a solution that the IT department can\u2019t deliver? Or, what if the solution that IT delivers is vastly inferior to third-party solutions? They look for other options. <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cWhile restricting employees&#8217; capabilities, it&#8217;s important to understand the requirements, and provide an acceptable alternative that would be secure and appropriate,\u201d says Steve E. Driz, I.S.P., ITCP, Bcomp..| President &#038; Chief Architect at <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'The Driz Group'); \" href=\"https:\/\/www.drizgroup.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">The Driz Group<\/span><\/a>. \u201cIT is often faced with a dilemma since they don&#8217;t have enough resources to support new technologies, and the most prevalent issue is that IT staff&#8217;s skill sets are not up to date to even understand what&#8217;s out there. The reason for that is that they don&#8217;t have the time to think about innovation and training when they bogged down in the day to day activities, practically fighting fires.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nBusiness leaders must take steps to <a onclick=\"ga('send', 'event', 'Blog', 'Outside Link', 'bridge this skills gap'); \" href=\"https:\/\/www.mrc-productivity.com\/blog\/2014\/03\/6-ways-to-bridge-the-it-skills-gap\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">bridge this skills gap<\/span><\/a>. As technology plays an increasingly important role in the modern business, outdated skills become a liability. <\/p>\n<p>But, what if you don\u2019t have the skills to deliver a solution that the business needs, and you don\u2019t have time to learn? Find a solution that solves their problem. Give them something that meets their needs, as well as your security requirements. After all, it\u2019s more secure than asking them to go out and find their own.<\/p>\n<h3>5. Users aren\u2019t aware of the policies<\/h3>\n<p><figure id=\"attachment_7061\" aria-describedby=\"caption-attachment-7061\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2013\/10\/small_7623744452.jpg\" alt=\"\" width=\"240\" height=\"180\" class=\"size-full wp-image-7061\" \/><figcaption id=\"caption-attachment-7061\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/86979666@N00\/7623744452\/\">Tsahi Levent-Levi<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/figcaption><\/figure>In most cases, employees aren\u2019t practicing Shadow IT maliciously. They\u2019re trying to solve a problem. Most don\u2019t realize the security risks of their actions.<\/p>\n<p>The problem is, many companies take a heavy-handed approach to Shadow IT. They create policies and restrictions, without telling the employees why it\u2019s important. They take an \u201cus-vs-them\u201d mentality.<\/p>\n<p>If you truly want to reduce security risks, educate your users. Make sure your employees understand the risks involved, and why unauthorized tools and software must be avoided. Then, show them how to solve their problems securely, using approved tools and methods.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cFor the most part, employees (end users) bypass the IT department and security measures mainly due to two things convenience and ignorance,\u201d says Lindsey Havens, Senior Marketing Manager at <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'PhishLabs'); \" href=\"https:\/\/www.phishlabs.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">PhishLabs<\/span><\/a>. \u201cThe majority of the people placing a company\u2019s sensitive data at risk don&#8217;t realize that they are doing it. They are going about their day at work, engaging in habits that such as checking their personal emails, shopping online, online banking and paying bills. Needless to say these unauthorized applications pose a risk for data theft by a hacker or data loss by the employee. Within some companies, security checks are put into place to monitor on the job internet activities.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nAs mentioned above, preventing Shadow IT often comes down to educating the users on the risks. Many don\u2019t understand how their actions jeopardize company data. Additionally, set up clear processes and policies (if you don\u2019t have them already), and make sure employees know what they are. <\/p>\n<h3>6. Users think their issue is too minor<\/h3>\n<p>Oftentimes, Shadow IT occurs when users are just trying to help. They don\u2019t want to trouble the IT department with a minor issue, so they try to solve it themselves. Unfortunately, they don\u2019t realize that this could lead to more problems down the road.<\/p>\n<p>The problem is, this often goes unnoticed. How do you know if users believe their issues are too minor, if they never tell you? As mentioned below, an anonymous survey is a great way to uncover these problems.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cWe had this problem as well, so we sent out an anonymous survey around the company and we found there were two main reasons that users were bypassing the IT department:<\/p>\n<p>&#8211; They felt the issue was too minor.<br \/>\n&#8211; They didn\u2019t know the correct process.<\/p>\n<p>The first response was what we\u2019d expected but the second one left us scratching our heads a little bit,\u201d says Job Brown, IT Manager at <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'Roman Blinds Direct'); \" href=\"http:\/\/www.roman-blinds-direct.co.uk\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">Roman Blinds Direct<\/span><\/a>. \u201cWe don\u2019t have a complicated process, all our employees have to do is send us an email. So what we did was send out an email to everyone, reiterating how simple it was to get IT support and how friendly our team is. In this email we also encouraged everyone to send us a request, no matter how minor. The response we saw was very positive, we managed to solve a lot of issues that our employees were having and they\u2019ve since been a lot more comfortable coming to us with issues.\u201d\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nThe tip mentioned above is a great way to address this issue. Gather information from your users, and then educate them on the proper procedures.<\/p>\n<h3>7. Users think they don\u2019t need help<\/h3>\n<p>The level of tech expertise coming into the workplace these days has increased significantly. Employees entering the workforce now have grown up with computers their entire life. If they run across a problem, they\u2019re far more likely to (attempt to) fix it on their own. <\/p>\n<p>Is that a good thing? I guess it depends on the employee and the problem they\u2019re trying to fix\u2026but, it\u2019s important to understand that this happens more often than you realize.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n&#8220;Another reason being, some employees simply don&#8217;t ask IT for help,&#8221; says Dodi Glenn, Vice President of Cyber Security for <a onclick=\"ga('send', 'event', 'Blog', 'Source', 'PC Matic'); \" href=\"https:\/\/www.pcmatic.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red; font-weight: bold;\">PC Matic<\/span><\/a>. &#8220;Instead, they choose to take matters in their own hands. This could be due to the IT staff not being approachable, or the employee simply thinking they can accomplish the task, without help.&#8221;\n<\/p><\/blockquote>\n<p><strong>TIP<\/strong><br \/>\nAgain, this comes down to education. Make sure all users (even the power users) understand the risks of Shadow IT. Put clear and simple procedures in place, and provide them with (controlled) self-service options.<\/p>\n<h3>Summary<\/h3>\n<p>These are just 7 reasons why end users bypass the IT department, but the list could be much longer. If you would like to add anything to this list, I\u2019d love to hear it. Feel free to share in the comments.<\/p>\n<div id=\"sendgrid_nlvx_widget-2\" class=\"widget widget_sendgrid_nlvx_widget\" style=\"padding-bottom: 10px;width: auto;text-align: center;background-color: #edeff4;border: 1px solid #d1d1d1\">\r\n\r\n<h3 class=\"widget-title\" style=\"font-size: 18px;margin-top: 28px;font-weight: 400;margin-bottom:25px\">If you enjoyed this article, sign up for email updates<\/h3>\r\n<p>Sign up below, and we'll notify you of new blog articles via email. We value your privacy and will never share or sell your information. To learn more about how we handle data, please review our <a href=\"https:\/\/www.mrc-productivity.com\/about\/privacy.html\">privacy policy<\/a>.\r\n\r\n\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control the rise of Shadow IT in your business? You must first understand why it happens. Why do users feel the need to circumvent IT in the first place? In this &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.mrc-productivity.com\/blog\/2017\/08\/7-reasons-end-users-bypass-department\/\"> <span class=\"screen-reader-text\">7 reasons why end users bypass the IT department<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"7 reasons why end users bypass the IT department - mrc&#039;s Cup of Joe Blog","description":"Summary: \u201cShadow IT\u201d is a term used to describe IT solutions and systems created and applied inside companies without their authorization. How can you control t"},"footnotes":""},"categories":[8],"tags":[77],"class_list":["post-11005","post","type-post","status-publish","format-standard","hentry","category-education","tag-shadow-it"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=11005"}],"version-history":[{"count":15,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11005\/revisions"}],"predecessor-version":[{"id":14206,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/11005\/revisions\/14206"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=11005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=11005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=11005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}