{"id":372,"date":"2023-05-30T16:18:00","date_gmt":"2023-05-30T15:18:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=372"},"modified":"2024-10-23T12:07:42","modified_gmt":"2024-10-23T11:07:42","slug":"a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/","title":{"rendered":"How to Respond and Recover From a Payment Card Breach"},"content":{"rendered":"\n<p>Last year, there were over&nbsp;<a href=\"https:\/\/www.itgovernance.co.uk\/blog\/data-breaches-and-cyber-attacks-in-2022-408-million-breached-records\">408 million breached records<\/a>&nbsp;across 1,063 publicly disclosed security incidents.<\/p>\n\n\n\n<p>Payment card breaches can lead to severe repercussions, from regulatory penalties to long-lasting damage to your company&#8217;s reputation.<\/p>\n\n\n\n<p>If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach and reduce its impact. In this blog post, we take you through a step-by-step guide on how to do just that.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 1 &#8211; Identify and Contain the Breach<\/strong><\/h3>\n\n\n\n<p>As soon as a payment card breach has been discovered, you will need to identify the source and contain the breach to prevent any further damage. If you don\u2019t have in-house resources with the skills to do this, it\u2019s important to bring in an experienced third-party firm that can do this for you. Every step of this process should be documented for analysis and potential legal requirements.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 2 \u2013 Deploy Your Incident Response Plans<\/strong><\/h3>\n\n\n\n<p>Once the breach has been contained, you\u2019ll need to deploy your incident response plans. These plans should have been created prior to the breach, and detail the actions and roles that will be taken following an incident.<\/p>\n\n\n\n<p>If your organisation doesn\u2019t have any incident response plans or skills in-house to manage the breach, they should look to bring in a professional firm. Having a breach handled efficiently and effectively is vital when it comes to containing the impact.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/blog\/incident-response-101-understanding-the-basics\/61\">Find out more about Incident Response Planning &gt;&gt;<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 3 \u2013 Disclosing the Breach<\/strong><\/h3>\n\n\n\n<p>As soon as you become aware of the breach, you will need to make the following bodies aware:<\/p>\n\n\n\n<p>-Your payment processor<\/p>\n\n\n\n<p>&#8211; Your bank<\/p>\n\n\n\n<p>&#8211; Visa or Mastercard<\/p>\n\n\n\n<p>&#8211; The ICO \u2013 where relevant<\/p>\n\n\n\n<p>Under the\u00a0PCI DSS, the timeframe for reporting a payment card breach can depend on the card brand, and your agreement with the acquiring bank or payment processor.\u00a0Visa require breaches to be reported within three working days. MasterCard say \u201cA customer must notify Mastercard immediately when the customer becomes aware of an ADC Event or Potential ADC Event in or affecting any system or environment of the customer or its Agent.\u201d<\/p>\n\n\n\n<p>Under the General Data Protection Regulation (GDPR), in the case of a personal data breach, the controller shall without undue delay and, where feasible, report the breach no later than 72 hours after having become aware of it.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 4 &#8211; Informing Affected Customers<\/strong><\/h3>\n\n\n\n<p>If you want to maintain your customer\u2019s trust, you\u2019ll need to notify them as soon as possible. You should keep them informed on the cause of the breach, what data has or may have been compromised, and any steps they should take to protect themselves (contact their bank, cancel their card, check for suspicious activity).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 5 \u2013 Investigate the Breach<\/strong><\/h3>\n\n\n\n<p>Once the immediate crisis has been handled, you\u2019ll need to conduct a thorough investigation as to how the breach occurred and identify the full extent of the damage.&nbsp;The payment brands may require an independent forensic investigation to be completed by a PCI Forensic Investigator (PFI) listed on the&nbsp;<a href=\"https:\/\/listings.pcisecuritystandards.org\/assessors_and_solutions\/pci_forensic_investigators\">PCI SSC website<\/a>.<\/p>\n\n\n\n<p>A&nbsp;<a href=\"https:\/\/3bdatasecurity.com\/PCI-Forensic-Investigator.php\">PCI Forensic Investigation<\/a>&nbsp;is a specific type of investigation conducted by an approved PFI to determine the cause and extent of a payment card data breach.<br><br>The main objective of a PFI is to identify how the breach occurred, assess the scope of the breach and the volume of card data at risk, and provide recommendations for remediation and prevention of future incidents.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/PCI-Forensic-Investigator.php\">Find out more about PCI Forensic Investigations &gt;&gt;<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 6 &#8211; Implement a Recovery Plan<\/strong><\/h3>\n\n\n\n<p>Using the findings from your investigation, you\u2019ll need to develop and implement a recovery plan. This plan should detail how you will strengthen your security procedures, implement more robust security measures, and improve staff awareness to help identify and prevent any further breaches.<\/p>\n\n\n\n<p>Conducting regular security audits and vulnerability scans is recommended in order to identify any potential weaknesses and vulnerabilities.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 7 \u2013 Continuous Monitoring and Improvement<\/strong><\/h3>\n\n\n\n<p>Following a payment card breach, it\u2019s vital to continuously monitor your environment to ensure that no further breaches occur, and that the measures you have implemented are effective.<\/p>\n\n\n\n<p>Regularly reviewing and improving your security protocols and incident response measures can help you keep on top of the cyber risks you face, and ensure you have effective controls in place when it comes to responding to an incident.<\/p>\n\n\n\n<p><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Incident-Tabletop.php\">Cyber Incident Tabletop Exercises<\/a>&nbsp;are commonly used as a way to test your current incident response procedures, processes and policies.<br><br>By running through scenarios in a controlled environment, these exercises are a great way to identify any gaps or weaknesses in an organisation\u2019s existing incident response plans and develop better strategies for responding to an incident.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Incident-Tabletop.php\">Find out more about Cyber Incident Tabletop Exercises >><\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Effectively Respond and Recover from a Payment Card Breach<\/strong><\/h3>\n\n\n\n<p>A payment card breach can severely affect an organisation\u2019s reputation and bottom line, but by responding effectively and implementing robust incident response measures, businesses can reduce the impact of the breach, protect their customers, and safeguard against future cyber incidents.<\/p>\n\n\n\n<p>3B Data Security are one of only a handful of globally approved PFI companies certified by the&nbsp;<a href=\"https:\/\/listings.pcisecuritystandards.org\/assessors_and_solutions\/pci_forensic_investigators\">PCI SSC<\/a>&nbsp;and payment card brands to help merchants forensically investigate and recover from a compromise of cardholder data.<\/p>\n\n\n\n<p>Our senior consultants have been Qualified Security Assessors (QSA) since 2008, and have been investigating cardholder data compromises for Visa and MasterCard since 2007.<\/p>\n\n\n\n<p>Our expert team have investigated hundreds of cardholder data breach investigations and have the skills and experience to help organisations of any size contain a breach and mitigate future incidents.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/PCI-Forensic-Investigator.php\">Find out more about how we can help you respond and recover from a payment card breach &gt;&gt;<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you think you\u2019ve suffered from a&nbsp;breach<\/strong><strong>&nbsp;and need immediate support, you can get in touch with our team now.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>We operate 24x7x365 across the UK and globally.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Call us on&nbsp;01223 298333&nbsp;or out of hours on&nbsp;01223 298338&nbsp;or email us at&nbsp;IR@3BDataSecurity.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach and reduce its impact. In this blog post, we take you through a step-by-step guide on how to do just that.\u00a0<\/p>\n","protected":false},"author":5,"featured_media":373,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,10],"tags":[31],"class_list":["post-372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-breach","category-pci-dss","tag-payment-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Respond and Recover From a Payment Card Breach<\/title>\n<meta name=\"description\" content=\"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Respond and Recover From a Payment Card Breach\" \/>\n<meta property=\"og:description\" content=\"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T15:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-23T11:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1750\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/\",\"name\":\"Respond and Recover From a Payment Card Breach\",\"isPartOf\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"datePublished\":\"2023-05-30T15:18:00+00:00\",\"dateModified\":\"2024-10-23T11:07:42+00:00\",\"author\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"contentUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"width\":1750,\"height\":525,\"caption\":\"Recover From a Payment Card Breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Respond and Recover From a Payment Card Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Respond and Recover From a Payment Card Breach","description":"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/","og_locale":"en_GB","og_type":"article","og_title":"Respond and Recover From a Payment Card Breach","og_description":"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2023-05-30T15:18:00+00:00","article_modified_time":"2024-10-23T11:07:42+00:00","og_image":[{"width":1750,"height":525,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","type":"image\/jpeg"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/","name":"Respond and Recover From a Payment Card Breach","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","datePublished":"2023-05-30T15:18:00+00:00","dateModified":"2024-10-23T11:07:42+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"If your organisation falls victim to a payment card breach, it\u2019s vital you respond quickly and effectively to contain the breach.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","width":1750,"height":525,"caption":"Recover From a Payment Card Breach"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/a-guide-on-how-to-respond-and-recover-from-a-payment-card-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"How to Respond and Recover From a Payment Card Breach"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":6,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/372\/revisions"}],"predecessor-version":[{"id":518,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/372\/revisions\/518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/373"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}