{"id":5504,"date":"2022-06-15T08:00:40","date_gmt":"2022-06-15T07:00:40","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=5504"},"modified":"2025-11-26T08:18:54","modified_gmt":"2025-11-26T08:18:54","slug":"data-breach-victims-receiving-threats-from-hackers","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers","title":{"rendered":"Data breach victims receiving threats from hackers"},"content":{"rendered":"<p>In some cases, cybercriminals can steal from you directly, using stolen bank details or by hacking your online accounts to make unauthorised payments or transfers. However, there are other cases in which criminals can manipulate their victims by using misleading and fraudulent communication to trick people into handing over private information, or overtly blackmailing them into doing so. When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.<\/p>\n<p>The current state of cybercrime is such that there are very few of us who will have never been targeted with fraudulent messages or calls. Data breach victims can become even more vulnerable to such communication, some of which can be incredibly threatening in nature. As details exposed in data breaches can fall into the hands of criminals, data controllers can be held responsible for any harm caused to victims.<\/p>\n<p>The link between data breaches and cybercrime is clear, which is why companies in possession of personal information must do their utmost to protect it. Where they fail to do so, they can be held liable through <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener\"><strong>data breach compensation claims<\/strong><\/a> made by the victims.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Threats from hackers &#8211; how are victims targeted?<\/strong><\/h3>\n<p>When hackers are in possession of victims\u2019 personal information, it can be easier for them to manipulate their targets, as having private information can provide powerful blackmail fuel. For example, criminals can threaten to publish data online if they believe that would cause distress to the victim, asking them to pay a ransom in return for the promise that they will delete the information. These demands resemble those made in ransomware cyberattacks, in which hackers can take control of entire company systems and promise to reinstate control in exchange for a payment. Such manipulation is particularly effective for victims who have had extremely sensitive information exposed, such as medical records.<\/p>\n<p>Other forms of threats from hackers may be more of the misleading nature. Criminals often fabricate their identities in fraudulent communication, pretending to be reputable organisations as a means of convincing their victims. A recent example is the scammers who have posed as HMRC as a means of convincing victims that they need to settle fines or tax payments, when in fact they owe nothing.<\/p>\n<h3><strong>The liability of data controllers<\/strong><\/h3>\n<p>While data controllers cannot be entirely blamed for the actions of criminals, they can be held responsible where victims have received threats from hackers if they were responsible for exposing personal information.<\/p>\n<p>For example, if a security issue allowed hackers to steal from a company database, victims of this attack could then be targeted with fraud. Those affected could be eligible to recover compensation for any distress caused, and for any financial losses they may also incur.<\/p>\n<h3><strong>Start your compensation claim now<br \/>\n<\/strong><\/h3>\n<p>As expert lawyers, we can help data breach victims who have received threats from hackers to claim the compensation they deserve.<\/p>\n<p>We have launched group actions for some of the most significant data breaches seen in the UK in recent years. This includes victims of the <strong>British Airways data breach<\/strong>, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener\"><strong>Equifax cyberattack<\/strong><\/a> and <a href=\"https:\/\/www.dataleaklawyers.co.uk\/talktalk-customer-data-breach\" target=\"_blank\" rel=\"noopener\"><strong>TalkTalk data breach<\/strong><\/a>, where compensation claims in our lawsuits can provide a route to justice.<\/p>\n<p>To find out more about pursuing a potential No Win, No Fee claim, please do not hesitate to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener\"><strong>contact our team today for free, no-obligation advice.<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In some cases, cybercriminals can steal from you directly, using stolen bank details or by hacking your online accounts to make unauthorised payments or transfers. However, there are other cases in which criminals can manipulate their victims by using misleading and fraudulent communication to trick people into handing over private information, or overtly blackmailing them &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Data breach victims receiving threats from hackers<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2806,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,122,8,64,51],"tags":[120,16,2,26,55,10,14,123,20,13,3,7],"class_list":["post-5504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-group-action","category-hacking-news","category-security","category-technology","tag-british-airways-data-breach","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-group-action","tag-online-security","tag-personal-data","tag-phishing-scams","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T07:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T08:18:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Data breach victims receiving threats from hackers\",\"datePublished\":\"2022-06-15T07:00:40+00:00\",\"dateModified\":\"2025-11-26T08:18:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers\"},\"wordCount\":565,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/councils-lack-cybersecurity.png\",\"keywords\":[\"British Airways Data Breach\",\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"Group Action\",\"online security\",\"personal data\",\"phishing scams\",\"ransomware\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Group Action\",\"Hacking News\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers\",\"name\":\"Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/councils-lack-cybersecurity.png\",\"datePublished\":\"2022-06-15T07:00:40+00:00\",\"dateModified\":\"2025-11-26T08:18:54+00:00\",\"description\":\"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/councils-lack-cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/councils-lack-cybersecurity.png\",\"width\":1200,\"height\":414,\"caption\":\"new report uncovers councils lack of cybersecurity systems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breach-victims-receiving-threats-from-hackers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data breach victims receiving threats from hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks","description":"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers","og_locale":"en_GB","og_type":"article","og_title":"Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks","og_description":"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2022-06-15T07:00:40+00:00","article_modified_time":"2025-11-26T08:18:54+00:00","og_image":[{"width":1200,"height":414,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Data breach victims receiving threats from hackers","datePublished":"2022-06-15T07:00:40+00:00","dateModified":"2025-11-26T08:18:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers"},"wordCount":565,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png","keywords":["British Airways Data Breach","compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","Group Action","online security","personal data","phishing scams","ransomware"],"articleSection":["Claims","Cybersecurity","Data","Group Action","Hacking News","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers","name":"Data breach victims receiving threats from hackers - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png","datePublished":"2022-06-15T07:00:40+00:00","dateModified":"2025-11-26T08:18:54+00:00","description":"When victims receive threats from hackers, they can feel incredibly vulnerable, and it may feel difficult to know what to do.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/councils-lack-cybersecurity.png","width":1200,"height":414,"caption":"new report uncovers councils lack of cybersecurity systems"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breach-victims-receiving-threats-from-hackers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Data breach victims receiving threats from hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5504"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5504\/revisions"}],"predecessor-version":[{"id":9511,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5504\/revisions\/9511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2806"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}