{"id":1376,"date":"2017-06-02T09:00:06","date_gmt":"2017-06-02T08:00:06","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=1376"},"modified":"2017-05-30T14:47:49","modified_gmt":"2017-05-30T13:47:49","slug":"third-party-companies-your-biggest-security-risk","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk","title":{"rendered":"Third Party companies may be your biggest security risk"},"content":{"rendered":"<p><em>A large number of security risks are caused by third party vendors.<\/em><\/p>\n<p>As we saw with the recent <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/debenhams-data-breach-affects-over-26000-customers\" target=\"_blank\" style=\"font-weight: bold;\">Debenhams Flowers cyber-attack<\/a>, using a third party company or service provider can leave your network vulnerable to security breaches. Whilst your company could have top of the line security measures put in place, the company that handles your packaging and shipping, or the company who processes customer purchases, may have weak to non-existent security measures.<\/p>\n<p>This is a clear risk.<br \/>\n<!--more--><br \/>\nChief scientist at security provider Agari, Markus Jakobsson, says:<\/p>\n<blockquote><p><strong><em>&#8220;&#8230;not only does each vendor create a new entry point into an organization&#8217;s network for cyber criminals to exploit, but it also means every employee for that vendor is now a potential target to breach your brand. Unfortunately, the only way to ensure your company is not exposed to greater risks is by keeping everything in-house. But in today&#8217;s digital world, this isn&#8217;t a reality.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<h2>Lacking in resources<\/h2>\n<p>Companies who don&#8217;t have the resources to conduct certain activities in-house might out-source them to another third party provider who already have the necessary equipment to complete the tasks. However, in this digitally centred world, in order for a vendor to carry out their work, they often need access to the company&#8217;s servers.<\/p>\n<p>As an example, a vendor like DHL (courier service) may need access to a company&#8217;s customer database to see which address they are delivering certain goods to. However, once the vendor is allowed access to the server, it may potentially leave the company vulnerable to attacks. If you have a building on lockdown but provide a key to a third party to get in through a side door, how do you know they&#8217;ve locked the door behind them?<\/p>\n<h3>Third parties need to ramp up security<\/h3>\n<p>Third parties are used by a large majority of companies, but their security risks are not always properly scrutinised.\u00a0In trusting vendors with data that could compromise the company itself, as well as their consumers&#8217; sensitive data, companies need to ensure their vendors can handle the data securely. Whilst companies may not be the ones in control over their vendors&#8217; security measures, they cannot simply shirk all the blame if a breach happens. As with the Debenhams data breach, customers looked to Debenhams to take responsibility for the attack; not the vendor.<\/p>\n<p>Some security experts say companies have a responsibility to properly vet their vendors to ensure their security is on par. From then on, companies should regularly check to ensure their security is still intact. Others say companies must assume their vendors have already been breached, and a high tech detection and response system needs to be in place to stop a breach from affecting the companies.<\/p>\n<h3>Companies should ensure third parties are protected<\/h3>\n<p>Soha Systems, innovator of Enterprise Secure Access, found that 63% of all data breaches on a company&#8217;s server came from attacking a third party. Whilst they may no doubt be essential to a business, companies need to do more to ensure they are not at risk of a security hole. A lack of security protocol may mean the vendor doesn&#8217;t know if there are certain security procedures they should be following.<\/p>\n<p>SecZetta, a company dedicated to identifying security risks and providing lifecycle solutions, has often blogged about the issue. In one post\u00a0 they warn that:<\/p>\n<blockquote><p><strong><em>&#8220;&#8230;the increased reliance on third-party employees, coupled with the growing sophistication of hackers, has led to the current identity and access management crisis that most businesses are faced with today &#8211; whether they realize it or not.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>Unfortunately for security, companies usually involve third party vendors to save resources; to reduce costs and even for a &#8216;quick fix&#8217; for temporary tasks. This means that the last thing they want to do is invest more money and time into making sure their vendors are compliant with security protocols.<\/p>\n<p>Resources needed for security management may end up using the money saved from using vendors in the first place. Companies clearly have an essential responsibility to balance the delicate scales for managing both third party vendors who save them resources, and using enough resources to invest in robust security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A large number of security risks are caused by third party vendors. As we saw with the recent Debenhams Flowers cyber-attack, using a third party company or service provider can leave your network vulnerable to security breaches. Whilst your company could have top of the line security measures put in place, the company that handles &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Third Party companies may be your biggest security risk<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1432,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[20],"class_list":["post-1376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest","tag-online-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Third Party Companies May Be Your Biggest Security Risk<\/title>\n<meta name=\"description\" content=\"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Third Party Companies May Be Your Biggest Security Risk\" \/>\n<meta property=\"og:description\" content=\"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-02T08:00:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Third Party companies may be your biggest security risk\",\"datePublished\":\"2017-06-02T08:00:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk\"},\"wordCount\":706,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/thirs-party-security-min.png\",\"keywords\":[\"online security\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk\",\"name\":\"Third Party Companies May Be Your Biggest Security Risk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/thirs-party-security-min.png\",\"datePublished\":\"2017-06-02T08:00:06+00:00\",\"description\":\"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/thirs-party-security-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/thirs-party-security-min.png\",\"width\":725,\"height\":250,\"caption\":\"third party security risks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/third-party-companies-your-biggest-security-risk#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Third Party companies may be your biggest security risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Third Party Companies May Be Your Biggest Security Risk","description":"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk","og_locale":"en_GB","og_type":"article","og_title":"Third Party Companies May Be Your Biggest Security Risk","og_description":"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2017-06-02T08:00:06+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Third Party companies may be your biggest security risk","datePublished":"2017-06-02T08:00:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk"},"wordCount":706,"commentCount":0,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-min.png","keywords":["online security"],"articleSection":["Latest"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk","name":"Third Party Companies May Be Your Biggest Security Risk","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-min.png","datePublished":"2017-06-02T08:00:06+00:00","description":"Whilst using third party companies may be essential to a business, they must ensure that vendors are not an online security hole risk.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/thirs-party-security-min.png","width":725,"height":250,"caption":"third party security risks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/third-party-companies-your-biggest-security-risk#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Third Party companies may be your biggest security risk"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1376"}],"version-history":[{"count":5,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1376\/revisions"}],"predecessor-version":[{"id":1433,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1376\/revisions\/1433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1432"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}