{"id":3881,"date":"2019-07-17T11:35:30","date_gmt":"2019-07-17T10:35:30","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3881"},"modified":"2019-07-17T11:35:30","modified_gmt":"2019-07-17T10:35:30","slug":"nhs-cybersecurity-breach-advice","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice","title":{"rendered":"NHS cybersecurity breach advice"},"content":{"rendered":"<p>If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.<\/p>\n<p>The NHS is a huge target for cybercriminals, and a lot of this stems from a lack of infrastructure and investment. It takes the government to ensure that the NHS is properly equipped to defend itself in the digital age, and it appears that they\u2019re still falling short.<\/p>\n<p>For the victims whose information is misused and \/ or compromised, it\u2019s important to know what can be done when it comes to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical data breach compensation claims<\/strong>.<\/a><\/p>\n<p><!--more--><\/p>\n<h3><strong>Huge NHS cybersecurity breach risks<\/strong><\/h3>\n<p>The risk of an NHS cybersecurity breach is huge. We know that there\u2019s an abundance of outdated computers and systems being used, and these can be more vulnerable to being successfully attacked.<\/p>\n<p>Simply put, outdated systems aren\u2019t always equipped with the latest security technology which can leave them vulnerable to being compromised.<\/p>\n<p>We saw this from the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wannacry-attack-was-lucky-escape-nhs\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>2017 WannaCry incident<\/strong><\/a>. That particular software targeted older and outdated systems that are easier to breach, and it hit the NHS hard.<\/p>\n<h3><strong>A lack of skilled workers<\/strong><\/h3>\n<p>A lack of investment can mean that older systems and equipment is still being relied on, which means the possibility of an NHS cybersecurity breach can be potentiality high.<\/p>\n<p>But it doesn\u2019t stop there.<\/p>\n<p>Last year, a Freedom of Information request reportedly found that almost a quarter of NHS Trusts don\u2019t have employees with sufficient security qualifications. This indicates a lack of skilled workers who can help to ensure that the NHS can defend against attacks, and ensure that leaks and breaches internally can be prevented also.<\/p>\n<h3><strong>The impact of an NHS cybersecurity breach<\/strong><\/h3>\n<p>The impact of an NHS cybersecurity breach simply cannot be understated.<\/p>\n<p>We can tell you from years of experience and with thousands of people coming to us for help that <a href=\"https:\/\/www.dataleaklawyers.co.uk\/nhs-data-breach-compensation\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>NHS data breach compensation<\/strong><\/a> claims are incredibly common. But the impact for the victims is often severe because we\u2019re talking about personal and sensitive medical information that people don\u2019t want to be shared around.<\/p>\n<p>And once it\u2019s exposed, it\u2019s out there. We saw in the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/56-dean-street\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>56 Dean Street leak we\u2019re dealing with<\/strong><\/a> just how bad the impact of medical data exposure can be when the HIV statuses for hundreds of patients was accidentally shared.<\/p>\n<p>We continue to fight for justice for victims of that leak, which is <a href=\"https:\/\/www.dataleaklawyers.co.uk\/group-actions\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>one of the dozens of data group and multi-party actions <\/strong><\/a>we\u2019re involved in.<\/p>\n<h3><strong>Justice is important<\/strong><\/h3>\n<p>When you consider the extent of the distress and suffering that can be caused by an NHS cybersecurity breach, you can see why justice for the victims is important.<\/p>\n<p><strong><a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\">That\u2019s why we do what we do.<\/a> <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice. The NHS is a huge target for cybercriminals, and a lot of this stems from a lack of infrastructure and investment. It takes the government to ensure that the &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">NHS cybersecurity breach advice<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2243,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,52,64],"tags":[16,2,55,99,31,95,37,35],"class_list":["post-3881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-healthcare","category-security","tag-compensation","tag-cyber-attack","tag-cybersecurity","tag-healthcare-sector","tag-medical-apps","tag-medical-data-breach","tag-medical-records","tag-nhs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-17T10:35:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"NHS cybersecurity breach advice\",\"datePublished\":\"2019-07-17T10:35:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/detect-data-hack-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cybersecurity\",\"healthcare sector\",\"medical apps\",\"medical data breach\",\"medical records\",\"nhs\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Healthcare\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice\",\"name\":\"NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/detect-data-hack-min.png\",\"datePublished\":\"2019-07-17T10:35:30+00:00\",\"description\":\"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/detect-data-hack-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/detect-data-hack-min.png\",\"width\":725,\"height\":250,\"caption\":\"detect data hack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/nhs-cybersecurity-breach-advice#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NHS cybersecurity breach advice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks","description":"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice","og_locale":"en_GB","og_type":"article","og_title":"NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks","og_description":"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-07-17T10:35:30+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"NHS cybersecurity breach advice","datePublished":"2019-07-17T10:35:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice"},"wordCount":470,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png","keywords":["compensation","cyber attack","cybersecurity","healthcare sector","medical apps","medical data breach","medical records","nhs"],"articleSection":["Claims","Cybersecurity","Healthcare","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice","name":"NHS cybersecurity breach advice - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png","datePublished":"2019-07-17T10:35:30+00:00","description":"If you\u2019ve been the victim of an NHS cybersecurity breach, it\u2019s important to know what you can do in terms of your rights for legal justice.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/detect-data-hack-min.png","width":725,"height":250,"caption":"detect data hack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/nhs-cybersecurity-breach-advice#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"NHS cybersecurity breach advice"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3881"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3881\/revisions"}],"predecessor-version":[{"id":3882,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3881\/revisions\/3882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2243"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}