{"id":2013,"date":"2017-10-06T10:31:53","date_gmt":"2017-10-06T09:31:53","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=2013"},"modified":"2017-10-06T10:31:53","modified_gmt":"2017-10-06T09:31:53","slug":"security-experts-call-for-faster-detection-data-breaches","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches","title":{"rendered":"Security experts call for faster detection of data breaches"},"content":{"rendered":"<p>Data breaches seem to be constantly in the news and they seem to be getting bigger, more frequent and more sophisticated.<\/p>\n<p>So, can anything be done to stop them?<\/p>\n<p>While there may be no definitive method to stop <em>all<\/em> data breaches completely, there are steps which can be taken to help detect them quicker. Of course, it would be preferable to prevent them from happening in the first place, but security experts like Paul White recognise that detection is an imperative part of cybersecurity as well.<br \/>\n<!--more--><\/p>\n<h2>Hackers hard to identify and predict<\/h2>\n<p>Without adequate detection, many companies may not even realise they&#8217;ve been breached for months or even years, giving criminals an abundance of time to misuse stolen personal data.<\/p>\n<p><strong>This is a big worry!<\/strong><\/p>\n<p>Paul White works for a cybersecurity firm called <em>Cyber adAPT<\/em> as the senior vice president for Europe, Middle East and Africa. He explains that hackers are hard to prevent because they are hard to identify and hard to predict. The difficulty lies in the &#8220;moving feet of the attacker. The ability for the attacker to think through different techniques and tactics, different modes of entry is actually outfoxing and outplaying the prevention and detection side of the industry.&#8221;<\/p>\n<p>Detection is therefore vitally important to find if and where hackers have breached through security walls so that problems can be shut down quickly and patched up.<\/p>\n<h3>The cloud making it easier<\/h3>\n<p>The expansion of technologies like the cloud also potentially means more points of entry for the criminals. Data is stored and accessed in multiple places which means hackers can also attack any of those places: through simple logins, portals, apps, connected devices, etc.<\/p>\n<p>At the moment, many companies do not appear to have invested adequate resources into the detection of data breaches and end up being notified by others. Firms may often find out about a breach through discovery online, or perhaps via interested cybersecurity experts, or the authorities.<\/p>\n<h3>How can organisations detect a breach?<\/h3>\n<p>During a brief interview, White explained that scanning for malware is a popular method, but may not always be the most efficient way to detect cyberattacks quickly because hackers are using more sophisticated techniques that may not require malware.<\/p>\n<p>We&#8217;re told that &#8220;Combinations of traffic that suggest someone has already got through the perimeter&#8221; is a new key area to look into. However, this is still being developed. Malware signatures and analysing the speed of network traffic may at least provide warning signs so IT and security departments can investigate any potential threats.<\/p>\n<h3>The importance of detection<\/h3>\n<p>Detection is incredibly important. When entities are not aware they have been hacked, they won&#8217;t know to patch up their security and notify affected data subjects. Individuals should be warned that their information may have been stolen to allow them to take steps to prevent further damage.<\/p>\n<p>If banking information has been compromised, notifying individuals can give them the opportunity to keep an eye out for suspicious activity and take steps to protect accounts. Organisations have a duty to protect personal data they have access to, and that should include reporting data breaches when they occur.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches seem to be constantly in the news and they seem to be getting bigger, more frequent and more sophisticated. So, can anything be done to stop them? While there may be no definitive method to stop all data breaches completely, there are steps which can be taken to help detect them quicker. Of &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security experts call for faster detection of data breaches<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-2013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest","tag-data-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Experts Call For Faster Detection Of Data Breaches<\/title>\n<meta name=\"description\" content=\"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Experts Call For Faster Detection Of Data Breaches\" \/>\n<meta property=\"og:description\" content=\"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-06T09:31:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Security experts call for faster detection of data breaches\",\"datePublished\":\"2017-10-06T09:31:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/verizon-data-breach-report-min.png\",\"keywords\":[\"data breach\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches\",\"name\":\"Security Experts Call For Faster Detection Of Data Breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/verizon-data-breach-report-min.png\",\"datePublished\":\"2017-10-06T09:31:53+00:00\",\"description\":\"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/verizon-data-breach-report-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/verizon-data-breach-report-min.png\",\"width\":725,\"height\":250,\"caption\":\"data breach report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/security-experts-call-for-faster-detection-data-breaches#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security experts call for faster detection of data breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Experts Call For Faster Detection Of Data Breaches","description":"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches","og_locale":"en_GB","og_type":"article","og_title":"Security Experts Call For Faster Detection Of Data Breaches","og_description":"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2017-10-06T09:31:53+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Security experts call for faster detection of data breaches","datePublished":"2017-10-06T09:31:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches"},"wordCount":535,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-min.png","keywords":["data breach"],"articleSection":["Latest"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches","name":"Security Experts Call For Faster Detection Of Data Breaches","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-min.png","datePublished":"2017-10-06T09:31:53+00:00","description":"It would be preferable to prevent data breaches from happening at all, but security experts recognise that detection is an important part of cybersecurity.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/verizon-data-breach-report-min.png","width":725,"height":250,"caption":"data breach report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-experts-call-for-faster-detection-data-breaches#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Security experts call for faster detection of data breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2013"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2013\/revisions"}],"predecessor-version":[{"id":2015,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2013\/revisions\/2015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1393"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}