{"id":1575,"date":"2017-07-03T14:57:55","date_gmt":"2017-07-03T13:57:55","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=1575"},"modified":"2017-07-03T15:04:15","modified_gmt":"2017-07-03T14:04:15","slug":"hacked-passwords-crux-data-breaches","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches","title":{"rendered":"Are hacked passwords the crux to data breaches?"},"content":{"rendered":"<p>According to security and risk management company <em>CSO<\/em>, hacked passwords are reportedly the cause of 81% of data breaches.<\/p>\n<p>Some may then say &#8220;users\/individuals should be more cautious about what passwords they use&#8221; &#8211; but what about the responsibility of businesses and organisations to ensure the safety of their users&#8217; personal data?<\/p>\n<p>The impact of one person&#8217;s compromised credentials could be felt far and wide&#8230;<br \/>\n<!--more--><br \/>\nCentrify, a leader in securing hybrid enterprises through the power of identity services, noted that four out of five data breaches that occurred this year involved compromised credentials. What this means is that another person or an intruder has gained access to someone&#8217;s personal details, and there are a number of ways that such credentials could be compromised.<\/p>\n<p>For example:<\/p>\n<div class=\"panel panel-default\">\n<div class=\"panel-heading\"><strong>Being a victim of a phishing attack<\/strong><\/div>\n<div class=\"panel-body\">\nA phishing attack is where a cyber-attacker attempts to gain access to personal information such as passwords and credit card information. Cyber-attackers usually launch these malicious attacks by disguising themselves as trustworthy companies\/organisations in an electronic communication. A popular example of a phishing attack would be a cyber-attacker sending a disguised email that looks like it&#8217;s from Facebook asking the user to change\/update their personal details or change their password. This could dupe the user into clicking the link that has been provided by the cyber-attacker. Once the user clicks on the link to the fake site, which may usually be dressed up to look like the proper site, any information entered can be copied, or viruses could be downloaded.\n<\/div>\n<\/div>\n<div class=\"panel panel-default\">\n<div class=\"panel-heading\"><strong>Computer\/Laptop theft<\/strong><\/div>\n<div class=\"panel-body\">\nIf the computer system isn&#8217;t password protected, this could allow the criminal to have full access to masses of personal information and\/or data that may be stored on there. A lot of people are guilty of saving their usernames and passwords on their online accounts, and this could allow full access to card payment details stored on their online shopping accounts, for example.\n<\/div>\n<\/div>\n<div class=\"panel panel-default\">\n<div class=\"panel-heading\"><strong>Individuals sharing passwords with others<\/strong><\/div>\n<div class=\"panel-body\">\nThis, according to CSO, is the biggest factor for data breaches. Though you may feel that you can trust the people you share passwords with, it&#8217;s probably best not to share passwords as that could increase the chances of a data breach.\n<\/div>\n<\/div>\n<p>As mentioned above, compromised credentials could entail multiple things, not just hacked passwords.<\/p>\n<p>According to the 2017 Verizon Data Breach Investigations Report (DBIR), compromised credentials are a big factor to data breaches. Centrify&#8217;s Senior Director, Niall King, looks at the statistics and states: <\/p>\n<blockquote><p><strong><em>&#8220;&#8230;for years, we&#8217;ve seen compromised credentials as a primary cause of data breaches.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>Mr King notes that the Verizon report states that the number of data breaches have had an unprecedented rise in the past 3 years; from 50% to 66% to 81%. This may demonstrate that today&#8217;s cyber-security isn&#8217;t secure at all.<\/p>\n<p>Mr King goes on to say that cyber-criminals will find a way to break down the least resistant individuals who have &#8216;simple factor&#8217; passwords.<\/p>\n<p>Passwords alone aren&#8217;t enough for securing data, it seems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to security and risk management company CSO, hacked passwords are reportedly the cause of 81% of data breaches. Some may then say &#8220;users\/individuals should be more cautious about what passwords they use&#8221; &#8211; but what about the responsibility of businesses and organisations to ensure the safety of their users&#8217; personal data? The impact of &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Are hacked passwords the crux to data breaches?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[13],"class_list":["post-1575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are Hacked Passwords The Crux To Data Breaches?<\/title>\n<meta name=\"description\" content=\"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Hacked Passwords The Crux To Data Breaches?\" \/>\n<meta property=\"og:description\" content=\"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-03T13:57:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-03T14:04:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Are hacked passwords the crux to data breaches?\",\"datePublished\":\"2017-07-03T13:57:55+00:00\",\"dateModified\":\"2017-07-03T14:04:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches\"},\"wordCount\":510,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-passwords-min.png\",\"keywords\":[\"personal data\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches\",\"name\":\"Are Hacked Passwords The Crux To Data Breaches?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-passwords-min.png\",\"datePublished\":\"2017-07-03T13:57:55+00:00\",\"dateModified\":\"2017-07-03T14:04:15+00:00\",\"description\":\"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-passwords-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-passwords-min.png\",\"width\":725,\"height\":250,\"caption\":\"hacked passwords\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hacked-passwords-crux-data-breaches#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are hacked passwords the crux to data breaches?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are Hacked Passwords The Crux To Data Breaches?","description":"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches","og_locale":"en_GB","og_type":"article","og_title":"Are Hacked Passwords The Crux To Data Breaches?","og_description":"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2017-07-03T13:57:55+00:00","article_modified_time":"2017-07-03T14:04:15+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Are hacked passwords the crux to data breaches?","datePublished":"2017-07-03T13:57:55+00:00","dateModified":"2017-07-03T14:04:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches"},"wordCount":510,"commentCount":0,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-min.png","keywords":["personal data"],"articleSection":["Latest"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches","name":"Are Hacked Passwords The Crux To Data Breaches?","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-min.png","datePublished":"2017-07-03T13:57:55+00:00","dateModified":"2017-07-03T14:04:15+00:00","description":"Hacked passwords are reportedly the cause of 81% of data breaches... Read our expert advice on making sure your passwords are hacker proof!","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-passwords-min.png","width":725,"height":250,"caption":"hacked passwords"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hacked-passwords-crux-data-breaches#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Are hacked passwords the crux to data breaches?"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1575"}],"version-history":[{"count":8,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1575\/revisions"}],"predecessor-version":[{"id":1586,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1575\/revisions\/1586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1583"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}