{"id":1675,"date":"2017-07-19T11:27:12","date_gmt":"2017-07-19T10:27:12","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=1675"},"modified":"2017-07-19T11:27:12","modified_gmt":"2017-07-19T10:27:12","slug":"ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","title":{"rendered":"FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted"},"content":{"rendered":"<p>I&#8217;m sure many are curious to find out where and how their data is used after hackers gain access to their information. According to a recent study, hackers are reportedly able to use leaked data within 9 minutes of it being posted.<\/p>\n<p>Mr Salsburg, chief counsel and acting chief of research and investigation project at the FTC (Federal Trade Commission), reiterated the mysteriousness of what happens to data when it&#8217;s publicised: <\/p>\n<blockquote><p><strong><em>&#8220;&#8230;there&#8217;s a real mystery of what happens to consumer data when it becomes public.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>But the dangers of how quickly it can be used are evident.<br \/>\n<!--more--><\/p>\n<h2>FTC&#8217;s role and example of their enforcement<\/h2>\n<p>Since 2002, the FTC has brought over 60 cases against companies that have engaged in unfair or deceptive practices that put consumers&#8217; personal data at unreasonable risk.<\/p>\n<p>One such example is dating site Ashley Madison that was subjected to a hack. It transpired that the website allegdly deceived consumers and failed to protect 36 million users&#8217; account and profile information in relation to the July 2015 data breach. Ashely Madison agreed to implement a data-security programme and also agreed to pay a total of $1.6 million (\u00a31.2 million) to settle FTC and other actions.<\/p>\n<h2>FTC&#8217;s presentation<\/h2>\n<p>In the FTC presentation, headed by Tina Yeung and Dan Salsburg at the FTC Office of Technology Research &amp; Investigation, they stated that &#8220;if you post it, they will use it.&#8221;<\/p>\n<p>They emphasised the fact that when sensitive consumer data such as credit card information or email login details are publicised &#8211; whether accidentally or purposely &#8211; it only takes cyber-hackers\/thieves a matter of minutes to make an unauthorised access attempt. If not minutes, then at best, only a few hours; they warned that they&#8217;re quick to leech onto the information.<\/p>\n<h3>FTC&#8217;s study<\/h3>\n<p>In order to oust some of the mysteriousness, researchers created 100 consumer profiles, making up names, gathering addresses from a national database, phone numbers and emails for the purposes of the study. Researchers also created payment methods for the study &#8211; online payment account, bitcoin wallet or a credit card. Passwords were also set up for the purposes of the study.<\/p>\n<p>Upon setting up these batches of consumer profiles, Mr Salsburg states: <\/p>\n<blockquote><p><strong><em>&#8220;&#8230;our goal was to make this customer database look as realistic as possible.&#8221;<\/em><\/strong><\/p><\/blockquote>\n<p>The made-up database was released twice on a website known to cyber-thieves. <\/p>\n<p>Within 90 minutes of the first release, some cyber-thieves had already tried to access the email and payment accounts &#8211; there were 100 views. <\/p>\n<p>The researchers released the information again a week later &#8211; there were 550 views. It only <strong>took 9 minutes for the cyber-thieves to leech onto the information and start using the false data<\/strong> to make purchases as well as attempting to access the accounts. <\/p>\n<p>The total amount of credit card purchase attempts amounted to $12,825.53 (\u00a39,901.31) in just 2 weeks. <\/p>\n<p>The noteworthy attempts of using the credit card information were on online dating services, pizza places and hotels.<\/p>\n<h3>FTC&#8217;s advice<\/h3>\n<p>The FTC&#8217;s study provides 3 insights that could assist consumers in protecting their data:<\/p>\n<div class=\"well\">\n<ul>\n<li>Continuously monitor your accounts &#8211; setting up alerts for suspicious transactions like big purchases and purchases made abroad could increase the protection on your accounts.<\/li>\n<li>Enable two-factor authentication &#8211; this can force cyber-thieves to hold additional ID knowledge beyond the password. This could also be used as a notification system that someone is trying to log into your account from a different device.<\/li>\n<li>Put additional precautions in place &#8211; it&#8217;s important to be proactive and not reactive, because when cyber-hacks have already taken place, the damage has already been done. Proactive steps could include using a complex password which is unique to each and every one of your accounts.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m sure many are curious to find out where and how their data is used after hackers gain access to their information. According to a recent study, hackers are reportedly able to use leaked data within 9 minutes of it being posted. Mr Salsburg, chief counsel and acting chief of research and investigation project at &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1681,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[13],"class_list":["post-1675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes<\/title>\n<meta name=\"description\" content=\"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes\" \/>\n<meta property=\"og:description\" content=\"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-19T10:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted\",\"datePublished\":\"2017-07-19T10:27:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/ftc-leaked-data-study-min.png\",\"keywords\":[\"personal data\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\",\"name\":\"FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/ftc-leaked-data-study-min.png\",\"datePublished\":\"2017-07-19T10:27:12+00:00\",\"description\":\"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/ftc-leaked-data-study-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/ftc-leaked-data-study-min.png\",\"width\":725,\"height\":250,\"caption\":\"data study\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes","description":"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","og_locale":"en_GB","og_type":"article","og_title":"FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes","og_description":"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2017-07-19T10:27:12+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted","datePublished":"2017-07-19T10:27:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes"},"wordCount":628,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-min.png","keywords":["personal data"],"articleSection":["Latest"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes","name":"FTC Prove Cyber-Hackers Can Access Breached Data Within 9 Minutes","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-min.png","datePublished":"2017-07-19T10:27:12+00:00","description":"In an attempt to understand how breached data is used when posted online, the FTC set-up a false database for hackers to find - the results are astonishing.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/ftc-leaked-data-study-min.png","width":725,"height":250,"caption":"data study"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/ftc-prove-cyber-hackers-can-access-breached-data-within-9-minutes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"FTC prove that cyber-hackers can access and use breached data within 9 minutes of it being posted"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1675"}],"version-history":[{"count":4,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1675\/revisions"}],"predecessor-version":[{"id":1683,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1675\/revisions\/1683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1681"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}