{"id":3772,"date":"2019-05-15T13:42:26","date_gmt":"2019-05-15T12:42:26","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3772"},"modified":"2019-05-15T13:42:26","modified_gmt":"2019-05-15T12:42:26","slug":"compensation-for-cancer-treatment-too-late","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late","title":{"rendered":"Huge risks of online streaming data breach incidents"},"content":{"rendered":"<p>There can be huge risks when it comes to online streaming data breach incidents, with research showing that they\u2019re one of the biggest targets for cybercriminals.<\/p>\n<p>And it makes sense as to why they\u2019re a huge target as well. Not only could they gain financial information from your account, but they could also use your account for pirating as well.<\/p>\n<p>Online streaming is growing and growing in popularity, so there\u2019s no way that it will be left behind when it comes to targets for cybercriminals and hackers. It can be so easy for accounts to be breached, so you need to make sure to do all you can to protect yourself. And know your rights when it\u2019s not your fault!<\/p>\n<p><!--more--><\/p>\n<h3><strong>Numbers of online streaming data breach incidents<\/strong><\/h3>\n<p>The numbers when it comes to online streaming data breach incidents are staggering. Not all of them are successful, but it\u2019s understood that there are hundreds of millions of attempts every year by cybercriminals to break into online streaming accounts. It can be platforms themselves who are targeted, or credential stuffing is used to try and break into accounts with stolen credentials.<\/p>\n<p>Credential stuffing, in case you\u2019re not aware, is using stolen login information to attempt to break into other platforms. With many people still reusing passwords and usernames across multiple sites, you\u2019re at risk of information stolen in one breach then being used to break into your other accounts.<\/p>\n<p>And its easy to do. There\u2019s software that can be used to carry out a credential stuffing attack so there\u2019s barely any effort on the part of the criminals.<\/p>\n<h3><strong>A reminder about good security practises<\/strong><\/h3>\n<p>The fact that many online streaming data breach incidents take place because of credential stuffing is a reminder about good practice when it comes to protecting yourself from attacks.<\/p>\n<p>Never reuse passwords and credentials. Never use simple and obvious passwords, like \u201c12345\u201d or your name backwards. There\u2019s software that can be used to guess easy passwords as well, so you\u2019re opening yourself up to being easily hacked by failing to have good passwords in place.<\/p>\n<p>And always change your password if you see news of an incident that affects you. In fact, this is also a stark reminder as to how there isn\u2019t such thing as a \u201cminor\u201d data breach when it comes to login information. Once it\u2019s stolen, it could be used to get into other platforms.<\/p>\n<h3><strong>When it\u2019s not your fault, give us a call<\/strong><\/h3>\n<p>If you\u2019re involved in an online streaming data breach\u00a0 incident and you\u2019ve become a victim through no fault of your own, there\u2019s action you can take.<\/p>\n<p>We represent victims who are <a href=\"https:\/\/www.dataleaklawyers.co.uk\/can-i-claim-compensation\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claiming for data breach compensation<\/strong><\/a>, and we have been doing so for years. Thousands of people have come to us for help over the years we\u2019ve been fighting for data breach justice, and we\u2019re involved in <a href=\"https:\/\/www.dataleaklawyers.co.uk\/group-actions\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>over 25 different group and multi-party actions<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There can be huge risks when it comes to online streaming data breach incidents, with research showing that they\u2019re one of the biggest targets for cybercriminals. And it makes sense as to why they\u2019re a huge target as well. Not only could they gain financial information from your account, but they could also use your &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Huge risks of online streaming data breach incidents<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2842,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,116,11,64,51],"tags":[2,26,55,54,3,7,17],"class_list":["post-3772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-ransomware","category-scammers","category-security","category-technology","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-database-security","tag-phishing-scams","tag-ransomware","tag-website-hacked"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-15T12:42:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Huge risks of online streaming data breach incidents\",\"datePublished\":\"2019-05-15T12:42:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late\"},\"wordCount\":508,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/catastrophic-data-breach-warning.png\",\"keywords\":[\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"database security\",\"phishing scams\",\"ransomware\",\"website hacked\"],\"articleSection\":[\"Cybersecurity\",\"Ransomware\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late\",\"name\":\"Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/catastrophic-data-breach-warning.png\",\"datePublished\":\"2019-05-15T12:42:26+00:00\",\"description\":\"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/catastrophic-data-breach-warning.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/catastrophic-data-breach-warning.png\",\"width\":1200,\"height\":414,\"caption\":\"Have I Been Pwned\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cancer-treatment-too-late#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Huge risks of online streaming data breach incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks","description":"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late","og_locale":"en_GB","og_type":"article","og_title":"Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks","og_description":"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-05-15T12:42:26+00:00","og_image":[{"width":1200,"height":414,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Huge risks of online streaming data breach incidents","datePublished":"2019-05-15T12:42:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late"},"wordCount":508,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png","keywords":["cyber attack","cyber crime","cybersecurity","database security","phishing scams","ransomware","website hacked"],"articleSection":["Cybersecurity","Ransomware","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late","name":"Huge risks of online streaming data breach incidents - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png","datePublished":"2019-05-15T12:42:26+00:00","description":"There can be huge risks when it comes to online streaming data breach incidents, with research showing they\u2019re one of the biggest targets for cybercriminals","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/catastrophic-data-breach-warning.png","width":1200,"height":414,"caption":"Have I Been Pwned"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cancer-treatment-too-late#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Huge risks of online streaming data breach incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3772"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3772\/revisions"}],"predecessor-version":[{"id":3773,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3772\/revisions\/3773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2842"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}