{"id":5115,"date":"2021-10-26T08:00:10","date_gmt":"2021-10-26T07:00:10","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=5115"},"modified":"2021-09-15T11:21:25","modified_gmt":"2021-09-15T10:21:25","slug":"healthcare-cloud-data-breaches","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches","title":{"rendered":"Healthcare cloud data breaches"},"content":{"rendered":"<p>With many businesses and other organisations opting for cloud storage to hold personal information, there is a new dimension of risk management for data controllers to deal with. Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks, and hospitals\u2019 cloud storage systems can contain a wealth of sensitive data.<\/p>\n<p>When configured and operated correctly, cloud databases should be entirely secure; but user errors can compromise entire systems. Private information can be put at risk by these needless mistakes, leaving the victims vulnerable to data misuse.<\/p>\n<p>Anyone who has had their personal security endangered by a cloud data breach may be able to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim compensation<\/strong><\/a>. There are no excuses for database mismanagement, so companies can be held accountable in accordance with the law. To find out more about making a claim, you can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact our team for free, no-obligation advice.<\/strong><\/a><\/p>\n<p><!--more--><\/p>\n<h3><strong>Data breaches and cloud storage<\/strong><\/h3>\n<p>As a storage tool that is growing in use, cloud databases also present a security challenge for many organisations. Some studies suggest that the majority of companies have accepted that they have suffered at least one cloud data breach in recent times, and security misconfiguration continues to be a major concern that needs to be considered.<\/p>\n<p>Configuration errors can, indeed, leave cloud databases unsecure and vulnerable to unauthorised access. All data controllers must ensure that vulnerabilities are eliminated, as hackers are always ready to take advantage of any holes in their defences, especially the easy ones.<\/p>\n<h3><strong>The risk of healthcare cloud data breaches<\/strong><\/h3>\n<p>As medical records are such valuable resources to cybercriminals, healthcare cloud data breaches have become a significant risk. NHS Digital has migrated huge portions of its digital operations to the cloud in recent years, so the risks in terms of private and sensitive healthcare information are real.<\/p>\n<p>We know that attackers are targeting the cloud. Any vulnerability or even a misconfiguration could be a matter to be exploited. When errors occur, it can cost healthcare providers millions of pounds. For patients, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/nhs-data-breach-compensation\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>healthcare cloud data breaches<\/strong><\/a> could cause their information to be exposed, leaving them vulnerable to manipulation and fraud at the hands of criminals.<\/p>\n<h3><strong>Making a compensation claim<\/strong><\/h3>\n<p>The growing risk of healthcare cloud data breaches is something that must be countered by health services to ensure that patients and employees are not put at risk. If healthcare organisations are seeking to adapt to the technological developments of the digital age, they must also adapt their data protection policies accordingly.<\/p>\n<p>If you have suffered the consequences of a health service data breach, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>NHS compensation pay-outs<\/strong><\/a> could be recovered to account for the damage done. As <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>leading, specialists in data protection breach claims<\/strong><\/a>, we believe that it is unacceptable for healthcare organisations to let their patients down by failing to keep their information safe. We have launched legal action against a number of healthcare organisations for data breaches, including the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/56-dean-street\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>56 Dean Street Clinic<\/strong><\/a>, and the Blackpool Teaching Hospitals Trust.<\/p>\n<p>To find out more about your right to claim compensation, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us today for free, no-obligation advice<\/strong><\/a>, or register your details in the form below for a call-back.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With many businesses and other organisations opting for cloud storage to hold personal information, there is a new dimension of risk management for data controllers to deal with. Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks, and hospitals\u2019 cloud storage systems can contain &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Healthcare cloud data breaches<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1615,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,52,64],"tags":[16,55,10,99,95,37,35,13],"class_list":["post-5115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-healthcare","category-security","tag-compensation","tag-cybersecurity","tag-data-breach","tag-healthcare-sector","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T07:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Healthcare cloud data breaches\",\"datePublished\":\"2021-10-26T07:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cosmetic-institute-website-breach-min.png\",\"keywords\":[\"compensation\",\"cybersecurity\",\"data breach\",\"healthcare sector\",\"medical data breach\",\"medical records\",\"nhs\",\"personal data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Healthcare\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches\",\"name\":\"Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cosmetic-institute-website-breach-min.png\",\"datePublished\":\"2021-10-26T07:00:10+00:00\",\"description\":\"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cosmetic-institute-website-breach-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cosmetic-institute-website-breach-min.png\",\"width\":725,\"height\":250,\"caption\":\"cosmetic institute website breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/healthcare-cloud-data-breaches#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare cloud data breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks","description":"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches","og_locale":"en_GB","og_type":"article","og_title":"Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks","og_description":"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2021-10-26T07:00:10+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Healthcare cloud data breaches","datePublished":"2021-10-26T07:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches"},"wordCount":528,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png","keywords":["compensation","cybersecurity","data breach","healthcare sector","medical data breach","medical records","nhs","personal data"],"articleSection":["Claims","Cybersecurity","Data","Healthcare","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches","name":"Healthcare cloud data breaches - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png","datePublished":"2021-10-26T07:00:10+00:00","description":"Healthcare cloud data breaches can be a particular risk, as the healthcare sector has long been a target of cyberattacks.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cosmetic-institute-website-breach-min.png","width":725,"height":250,"caption":"cosmetic institute website breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/healthcare-cloud-data-breaches#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Healthcare cloud data breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5115"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5115\/revisions"}],"predecessor-version":[{"id":5116,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5115\/revisions\/5116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1615"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}