{"id":5070,"date":"2021-08-23T08:00:18","date_gmt":"2021-08-23T07:00:18","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=5070"},"modified":"2021-09-01T10:21:52","modified_gmt":"2021-09-01T09:21:52","slug":"cybercriminals-targeting-medical-data-in-attacks","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks","title":{"rendered":"Cybercriminals targeting medical data in attacks"},"content":{"rendered":"<p>Healthcare organisations hold a vast array of different data about their patients, most of which is highly private and sensitive. Confidential medical information should be safeguarded by the principle of doctor-patient confidentiality, as well as by strong data protection measures. Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe.<\/p>\n<p>With medical information a prime target, it is important that all healthcare organisations ensure that their systems are secure, and that employees abide by strict data protection procedures. However, in too many cases, there appears to be holes in the defences that put patient data at risk.<\/p>\n<p>Any patient that has been made vulnerable to data misuse by the errors of a healthcare organisation may be able to claim compensation for the harm caused. If you think that you may have a claim to make, you can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us for free, no-obligation advice<\/strong><\/a> on your potential compensation claim.<\/p>\n<p><!--more--><\/p>\n<h3><strong>The motivations for cybercriminals targeting medical data<\/strong><\/h3>\n<p>For cybercriminals, the sensitive and emotionally charged nature of medical information can make it highly valuable. Cybercriminals targeting medical data can misuse it for a variety of purposes, some of which can be highly profitable.<\/p>\n<p>For example, cybercriminals can use medical information to execute scams, as the mention of medical details can be enough to make victims trust unknown third parties. By sending an email in the guise of a healthcare professional or a legitimate organisation, cybercriminals may be able to manipulate victims into handing over further data, such as bank account details.<\/p>\n<p>In addition, cybercriminals are all too aware of the fact that private medical information can be potent fuel for blackmail. Cybercriminals targeting medical data can use ransomware attacks to hold data for ransom, leaving healthcare organisations and sometimes the patients themselves in the difficult position of having to pay a price for the safe return or release of private information, which is by no means guaranteed.<\/p>\n<h3><strong>The growing cybersecurity risk for healthcare organisations<\/strong><\/h3>\n<p>According to recent statistics, the cybersecurity risk to healthcare organisations is only increasing. Ransomware is a serious driving force for successful cyberattacks against healthcare organisations across the globe, and events of the past must not be forgotten.<\/p>\n<p>One memorable ransomware threat that the UK faced was the notorious NHS data breach of 2017 involving the WannaCry ransomware attack. Over a third of Trusts in England were said to have been affected and, although there was no evidence that patient data was compromised, many appointments had to be cancelled after systems were brought to a standstill.<\/p>\n<p>Analysts have yet to fully take stock of the impact of coronavirus on NHS cybersecurity, but NHS Digital revealed that health services had reportedly received over 20,000 fraudulent emails in a single month during the early stages of the pandemic in Spring 2020.<\/p>\n<h3><strong>Making a data breach compensation claim<\/strong><\/h3>\n<p>Anyone who has fallen prey to cybercriminals targeting medical data will likely have suffered a great degree of distress and worry as a result of the exposure of their private information. It is essential that all cyberattacks on healthcare organisations are thoroughly investigated to identify if negligence is at play. In cases such as this, the affected patients may be able to make a data breach compensation claim.<\/p>\n<p>If you believe your data security has been unlawfully put at risk by the errors of a healthcare organisation, you can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us for free, no-obligation advice on your potential compensation claim.<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Healthcare organisations hold a vast array of different data about their patients, most of which is highly private and sensitive. Confidential medical information should be safeguarded by the principle of doctor-patient confidentiality, as well as by strong data protection measures. Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybercriminals targeting medical data in attacks<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1425,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,139,8,52,6,116,11,64,51],"tags":[16,2,26,55,10,14,54,118,99,95,37,35,13,3,7],"class_list":["post-5070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-government","category-hacking-news","category-healthcare","category-malware","category-ransomware","category-scammers","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-database-security","tag-government","tag-healthcare-sector","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-personal-data","tag-phishing-scams","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T07:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-01T09:21:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Cybercriminals targeting medical data in attacks\",\"datePublished\":\"2021-08-23T07:00:18+00:00\",\"dateModified\":\"2021-09-01T09:21:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/large-companies-cyber-attack-threat-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"database security\",\"government\",\"healthcare sector\",\"medical data breach\",\"medical records\",\"nhs\",\"personal data\",\"phishing scams\",\"ransomware\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Government\",\"Hacking News\",\"Healthcare\",\"Malware\",\"Ransomware\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks\",\"name\":\"Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/large-companies-cyber-attack-threat-min.png\",\"datePublished\":\"2021-08-23T07:00:18+00:00\",\"dateModified\":\"2021-09-01T09:21:52+00:00\",\"description\":\"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/large-companies-cyber-attack-threat-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/large-companies-cyber-attack-threat-min.png\",\"width\":725,\"height\":250,\"caption\":\"large companies cyber attack threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cybercriminals-targeting-medical-data-in-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals targeting medical data in attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks","description":"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks","og_locale":"en_GB","og_type":"article","og_title":"Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks","og_description":"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2021-08-23T07:00:18+00:00","article_modified_time":"2021-09-01T09:21:52+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Cybercriminals targeting medical data in attacks","datePublished":"2021-08-23T07:00:18+00:00","dateModified":"2021-09-01T09:21:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks"},"wordCount":575,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","database security","government","healthcare sector","medical data breach","medical records","nhs","personal data","phishing scams","ransomware"],"articleSection":["Claims","Cybersecurity","Data","Government","Hacking News","Healthcare","Malware","Ransomware","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks","name":"Cybercriminals targeting medical data in attacks - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png","datePublished":"2021-08-23T07:00:18+00:00","dateModified":"2021-09-01T09:21:52+00:00","description":"Unfortunately, the number of cybercriminals targeting medical data appears to be on the rise around the globe. We help victims claim.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/large-companies-cyber-attack-threat-min.png","width":725,"height":250,"caption":"large companies cyber attack threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cybercriminals-targeting-medical-data-in-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Cybercriminals targeting medical data in attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5070"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5070\/revisions"}],"predecessor-version":[{"id":5147,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5070\/revisions\/5147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1425"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}