{"id":411,"date":"2016-08-04T16:31:36","date_gmt":"2016-08-04T15:31:36","guid":{"rendered":"http:\/\/www.dataleaklawyers.co.uk\/blog\/?p=411"},"modified":"2016-08-04T16:33:23","modified_gmt":"2016-08-04T15:33:23","slug":"thwarting-data-breaches-is-an-everyday-mission","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission","title":{"rendered":"Thwarting data breaches is an everyday mission for IT Managers"},"content":{"rendered":"<p>Data security provider WinMagic conducted a study that found one in four IT managers attempt to stop a data breach every single day and that almost half of all employees believed that IT security was solely the responsibility of the IT department. Only 37% believe they play a role in IT security &#8211; two very alarming statistics.<\/p>\n<p>The study found that a quarter of IT managers believe that, whilst <strong>hackers<\/strong> are the biggest security risk to organisations, the next biggest security risk was in fact <strong>employees<\/strong>. This is further enforced by the report that found a third of IT managers only want certain employees that have been given clearance to use personal devices.<\/p>\n<p class=\"well text-center\"><strong>This is not surprising when 17% of employees admit that they would open an attachment from an unknown sender.<\/strong><\/p>\n<p><!--more--><br \/>\nHowever, a fifth of IT managers actually want to empower their employees. They want to allow them access to use personal devices.<\/p>\n<p>WinMagic Enterprise director for EMEA Andreas Jenson says that:<\/p>\n<blockquote><p><em>&#8220;Encryption itself can be complex and open to human error. IT managers must recognise this and ensure they have the processes and tools in place to facilitate effective encryption across the entire device estate.<\/em><\/p>\n<p><em>Devices change and move as much as the data itself and encryption in not a tick box task, by using automation and effective tools, businesses can ensure that the last line of defence from hackers and human error, is robust and minimises the chance and impact on a data breach.\u201d<\/em><\/p><\/blockquote>\n<p>The vast majority of decision makers believed that a digital transformation needed to happen, but there was a lack of knowing how to do it. Until then, it could be that IT managers will continue to thwart data breaches each day as a primary first and last line of defence.<\/p>\n<h2>Can I claim?<\/h2>\n<p>If you have <a href=\"\/can-i-claim-compensation\">suffered a data breach then you could be entitled to compensation<\/a>. You do not always have to have financially or psychologically suffered in order to make a claim; the fact that a data breach has happened can sometimes be enough to make a claim. In many instances though it is about the level of distress caused.<\/p>\n<p>Hundreds of thousands of pounds can be claimed in compensation if you have suffered a data breach and if you have been the victim of a data breach we urge you to get in contact if you think you have a claim &#8211; we may be able to help you get the compensation you deserve.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security provider WinMagic conducted a study that found one in four IT managers attempt to stop a data breach every single day and that almost half of all employees believed that IT security was solely the responsibility of the IT department. Only 37% believe they play a role in IT security &#8211; two very &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Thwarting data breaches is an everyday mission for IT Managers<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":242,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Managers Thwarting Data Breaches is an Everyday Mission<\/title>\n<meta name=\"description\" content=\"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Managers Thwarting Data Breaches is an Everyday Mission\" \/>\n<meta property=\"og:description\" content=\"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-04T15:31:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-04T15:33:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation_large.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation_large.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Thwarting data breaches is an everyday mission for IT Managers\",\"datePublished\":\"2016-08-04T15:31:36+00:00\",\"dateModified\":\"2016-08-04T15:33:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission\"},\"wordCount\":422,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/data_breach_compensation.png\",\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission\",\"name\":\"IT Managers Thwarting Data Breaches is an Everyday Mission\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/data_breach_compensation.png\",\"datePublished\":\"2016-08-04T15:31:36+00:00\",\"dateModified\":\"2016-08-04T15:33:23+00:00\",\"description\":\"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/data_breach_compensation.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/data_breach_compensation.png\",\"width\":725,\"height\":250,\"caption\":\"data breach compensation expert guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/thwarting-data-breaches-is-an-everyday-mission#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Thwarting data breaches is an everyday mission for IT Managers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Managers Thwarting Data Breaches is an Everyday Mission","description":"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission","og_locale":"en_GB","og_type":"article","og_title":"IT Managers Thwarting Data Breaches is an Everyday Mission","og_description":"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2016-08-04T15:31:36+00:00","article_modified_time":"2016-08-04T15:33:23+00:00","og_image":[{"width":1024,"height":482,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation_large.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"http:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation_large.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Thwarting data breaches is an everyday mission for IT Managers","datePublished":"2016-08-04T15:31:36+00:00","dateModified":"2016-08-04T15:33:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission"},"wordCount":422,"commentCount":0,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation.png","articleSection":["Latest"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission","name":"IT Managers Thwarting Data Breaches is an Everyday Mission","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation.png","datePublished":"2016-08-04T15:31:36+00:00","dateModified":"2016-08-04T15:33:23+00:00","description":"Spare a thought for those IT Managers in your department as a new report reveals they are the first and last line of defence against data breaches.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/05\/data_breach_compensation.png","width":725,"height":250,"caption":"data breach compensation expert guide"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/thwarting-data-breaches-is-an-everyday-mission#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Thwarting data breaches is an everyday mission for IT Managers"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=411"}],"version-history":[{"count":4,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411\/revisions"}],"predecessor-version":[{"id":417,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411\/revisions\/417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/242"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}