{"id":3207,"date":"2018-08-01T16:30:41","date_gmt":"2018-08-01T15:30:41","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3207"},"modified":"2018-07-30T22:12:59","modified_gmt":"2018-07-30T21:12:59","slug":"is-mobile-phone-data-protection-lagging-behind","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind","title":{"rendered":"Is mobile phone data protection lagging behind?"},"content":{"rendered":"<p>There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.<\/p>\n<p>The smartphone industry in particular has grown exponentially in recent years, and with more than half of the internet\u2019s traffic thought to be on mobile devices, and with mobile apps springing up all the time, some experts are concerned at the lack of maturity mobile phone data protection has when compared to desktop protection.<\/p>\n<p>Does security and attitudes need to change?<\/p>\n<p><!--more--><\/p>\n<h3><strong>Mobile phone data protection lagging behind<\/strong><\/h3>\n<p>Mobile phone data protection may be lagging behind as a result of a lack of maturity as well as the growth in the use of the internet on mobile devices. There are many who still wrongly assume that mobile phones are \u201ccompletely safe\u201d from hacking and malicious software, but that isn\u2019t necessarily the case.<\/p>\n<p>On top of the that, recent research has shown that many <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/70-per-cent-smartphone-users-unaware-apps-share-personal-information\" target=\"_blank\" rel=\"noopener\"><strong>mobile apps are leaking data at volumes and rates that are incredibly concerning<\/strong><\/a>. People should be worried about mobile phone data protection, and it\u2019s a matter that both end-users, organisations and security firms may need to pay more attention to.<\/p>\n<p>We cannot simply assume mobile phone data protection is on top and that we\u2019re all safe, and some experts warn that the industry and end-users need to catch up as soon as possible. Phishing and malware is reportedly evolving to target mobile phones more now, so the defence against the black-hat activities needs to evolve in turn.<\/p>\n<h3><strong>Work and mobile phone data protection is a problem<\/strong><\/h3>\n<p>Working habits and mobile phone data protection is a massive problem according to recent research that indicated that <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/mobile-working-data-breach-worries\" target=\"_blank\" rel=\"noopener\"><strong>many employees simply don\u2019t care<\/strong><\/a> or take heed of mobile data security, with <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/mobile-working-data-breach-worries\" target=\"_blank\" rel=\"noopener\"><strong>95% of businesses struggling to secure mobile working<\/strong><\/a>.<\/p>\n<p>It seems clear to us that many employees need far better training and understanding of the dangers of mobile working, which is an increasingly-popular thing these days. Organisations must not ignore the needs of mobile phone data protection, or let it lag behind without considerations as to how dangerous a mobile breach could actually be.<\/p>\n<p>It only takes one doorway to potentially get into an entire network. With <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ico-publishes-useful-gdpr-guide\" target=\"_blank\" rel=\"noopener\"><strong>the new GDPR in force<\/strong><\/a> that can allow the Information Commissioner\u2019s Office (ICO) to impose fines in the region of \u00a317m or 4% of a company\u2019s annual turnover, no one can really afford to neglect something as important as mobile phone data protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety. The smartphone industry in particular has grown exponentially in recent years, and with more than half of the internet\u2019s traffic thought to be on mobile devices, and with mobile apps springing up all &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Is mobile phone data protection lagging behind?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,53,115,64,39,51],"tags":[40,55,54,47,33,13],"class_list":["post-3207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data","category-mobile-data","category-security","category-smartphones","category-technology","tag-apps","tag-cybersecurity","tag-database-security","tag-employee-breaches","tag-mobile-malware","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-01T15:30:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Is mobile phone data protection lagging behind?\",\"datePublished\":\"2018-08-01T15:30:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/work-mobile-devices-unsecure-min.png\",\"keywords\":[\"apps\",\"cybersecurity\",\"database security\",\"employee breaches\",\"mobile malware\",\"personal data\"],\"articleSection\":[\"Cybersecurity\",\"Data\",\"Mobile Data\",\"Security\",\"Smartphones\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind\",\"name\":\"Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/work-mobile-devices-unsecure-min.png\",\"datePublished\":\"2018-08-01T15:30:41+00:00\",\"description\":\"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/work-mobile-devices-unsecure-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/work-mobile-devices-unsecure-min.png\",\"width\":725,\"height\":250,\"caption\":\"mobile devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/is-mobile-phone-data-protection-lagging-behind#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is mobile phone data protection lagging behind?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks","description":"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind","og_locale":"en_GB","og_type":"article","og_title":"Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks","og_description":"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-08-01T15:30:41+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Is mobile phone data protection lagging behind?","datePublished":"2018-08-01T15:30:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind"},"wordCount":422,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png","keywords":["apps","cybersecurity","database security","employee breaches","mobile malware","personal data"],"articleSection":["Cybersecurity","Data","Mobile Data","Security","Smartphones","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind","name":"Is mobile phone data protection lagging behind? - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png","datePublished":"2018-08-01T15:30:41+00:00","description":"There are suggestions that mobile phone data protection is lagging behind as a result of security immaturity and attitudes toward mobile safety.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/work-mobile-devices-unsecure-min.png","width":725,"height":250,"caption":"mobile devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/is-mobile-phone-data-protection-lagging-behind#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Is mobile phone data protection lagging behind?"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3207"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3207\/revisions"}],"predecessor-version":[{"id":3208,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3207\/revisions\/3208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1636"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}