{"id":380,"date":"2023-05-23T16:26:00","date_gmt":"2023-05-23T15:26:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=380"},"modified":"2024-10-25T11:20:39","modified_gmt":"2024-10-25T10:20:39","slug":"how-to-discover-the-extent-of-a-data-breach","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/","title":{"rendered":"Data Breach: How to Discover the Extent of the Damage"},"content":{"rendered":"\n<p>Last year,&nbsp;<a href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\">83% of organisations<\/a>&nbsp;suffered from more than one data breach.&nbsp;<\/p>\n\n\n\n<p>If you suffer from a data breach, it\u2019s important to act quickly to contain the breach and determine the cause and extent of the damage.<\/p>\n\n\n\n<p>In this blog, we\u2019ll guide you through the steps you need to take when it comes to investigating a data breach, and how to discover the extent of the damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step One: Deploy Your Incident Response Plan<\/strong><\/h3>\n\n\n\n<p>As soon as a data breach has been detected, you will need to activate your incident response plan. This plan should have been created prior to the incident and detail the steps your organisation needs to take in the event of a security incident.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/blog\/incident-response-101-understanding-the-basics\/61\">You can find out more about Incident Response Planning here &gt;&gt;<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step Two: Identify the Source<\/strong><\/h3>\n\n\n\n<p>Next, you\u2019ll need to identify how the data breach occurred, so you can determine how to resolve the incident and prevent it from happening again in the future. There are many ways a breach can occur, including a cyber attack, human error, unpatched vulnerability, or third-party breach.<\/p>\n\n\n\n<p>In order to identify the source of the breach, you may need to perform a digital forensic investigation. This investigation involves analysing system logs, network traffic and other artefacts to detect the source of the breach.<\/p>\n\n\n\n<p>If you don\u2019t have the skills in-house to conduct a digital forensic investigation, you may need to use a third-party company that specialises in these investigations.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/Digital-Forensic-Investigations.php\">Learn more about 3B Data Security\u2019s Digital Forensic Investigation Services >><\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step Three: Assess the Extent of the Breach<\/strong><\/h3>\n\n\n\n<p>Once the source of the breach has been determined, you\u2019ll then need to assess the extent of the damage. To do this, you\u2019ll need to look at what data was accessed, and who was affected.<\/p>\n\n\n\n<p>To obtain this information, you may need to carry out a data inventory.<\/p>\n\n\n\n<p>A data inventory is a comprehensive list of all the data your organisation stores, where it\u2019s stored and who has access to it. Once you have this information, you can compare it to findings from the digital forensic investigation to determine which data was accessed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step Four: Disclose the Breach<\/strong><\/h3>\n\n\n\n<p>If personal data has been breached, under the General Data Protection Regulation (GDPR), you are legally required to notify the Information Commissioners Office (ICO) and the affected parties. You must report a notifiable breach to the ICO no later than 72 hours after becoming aware of the breach.<\/p>\n\n\n\n<p>The ICO has put together a self-assessment to help determine whether your organisation needs to report the breach.&nbsp;<a href=\"https:\/\/ico.org.uk\/for-organisations\/report-a-breach\/personal-data-breach-assessment\/\">Take a look &gt;&gt;<\/a><\/p>\n\n\n\n<p>When reporting a breach to the ICO, you should detail when the breach occurred, how it occurred, what data was accessed, and what actions your organisation is taking to contain and mitigate the damage.<\/p>\n\n\n\n<p>Failure to report a data breach to the ICO can result in fines of up to \u00a317.5 million or 4% of your annual global turnover.<\/p>\n\n\n\n<p>When notifying the affected parties, you should disclose what data was compromised, and reassure them that you are taking all the necessary measures to remedy the incident and prevent any future breaches from occurring.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step Five: Review Your Security Procedures<\/strong><\/h3>\n\n\n\n<p>Following the breach, you should identify where your current security procedures and policies need to be updated to ensure a similar incident doesn\u2019t occur in the future. This could include carrying out staff awareness training, encrypting sensitive data or deploying more security testing.<\/p>\n\n\n\n<p>Security testing such as penetration tests and vulnerability scans can identify weaknesses in your systems and network, giving you the opportunity to patch them before they can be exploited by cyber criminals.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/3bdatasecurity.com\/Penetration-Testing-Security.php\">Find out more about Security Testing >><\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Data Breach Management From the Experts<\/strong><\/h3>\n\n\n\n<p>If your organisation falls victim to a data breach, how you respond can have a massive impact on your business, so it\u2019s vital you have the skills and resources to handle the incident effectively and efficiently.<\/p>\n\n\n\n<p>If you don\u2019t have the skills in-house to effectively respond to and recover from an incident, we recommend getting an expert consultancy service on board to handle the breach for you.<\/p>\n\n\n\n<p>At 3B Data Security, our team of specialist consultants have helped countless organisations of all sizes across various industries handle a data breach.<\/p>\n\n\n\n<p>We offer a range of Cyber Incident Response&nbsp;and Data Breach Management Services to suit your organisation\u2019s needs and budget.<\/p>\n\n\n\n<p>Your organisation will be appointed a dedicated Cyber Incident Manager to work with you whilst our specialist team follow best practice incident response methodology to:<\/p>\n\n\n\n<p>&#8211; Identify and analyse any threats and compromises.<\/p>\n\n\n\n<p>&#8211; Contain the attack and cause of the compromise.<\/p>\n\n\n\n<p>&#8211; Eradicate any threats.<\/p>\n\n\n\n<p>&#8211; Recover your data and systems.<\/p>\n\n\n\n<p>&#8211; Work to get you back to business as usual as soon as possible.<\/p>\n\n\n\n<p>&#8211; Make recommendations on how to prevent future attacks.<\/p>\n\n\n\n<p>Find out more about our Incident Response services, and how the team at 3B Data Security can help your organisation prevent, detect and respond to a data breach.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Incident-Response.php\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png\" alt=\"Find Out More\" class=\"wp-image-257\" style=\"width:227px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>If you suffer from a data breach, it\u2019s important to act quickly to contain the breach and determine the cause and extent of the damage. In this blog, we\u2019ll guide you through the steps you need to take when it comes to investigating a data breach, and how to discover the extent of the damage.<\/p>\n","protected":false},"author":5,"featured_media":381,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[29],"class_list":["post-380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-breach","tag-data-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Discover the Extent of the Damage After a Data Breach<\/title>\n<meta name=\"description\" content=\"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Discover the Extent of the Damage After a Data Breach\" \/>\n<meta property=\"og:description\" content=\"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T15:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T10:20:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1750\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/\"},\"author\":{\"name\":\"Annabelle Ilsley\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"headline\":\"Data Breach: How to Discover the Extent of the Damage\",\"datePublished\":\"2023-05-23T15:26:00+00:00\",\"dateModified\":\"2024-10-25T10:20:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/\"},\"wordCount\":853,\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-13.jpg\",\"keywords\":[\"data breach\"],\"articleSection\":[\"Data Breach and More\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/\",\"name\":\"How to Discover the Extent of the Damage After a Data Breach\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-13.jpg\",\"datePublished\":\"2023-05-23T15:26:00+00:00\",\"dateModified\":\"2024-10-25T10:20:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-13.jpg\",\"contentUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-13.jpg\",\"width\":1750,\"height\":525,\"caption\":\"Investigating a Data Breach: How to Discover the Extent of the Damage\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-discover-the-extent-of-a-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breach: How to Discover the Extent of the Damage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/author\\\/ag3bds\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Discover the Extent of the Damage After a Data Breach","description":"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/","og_locale":"en_GB","og_type":"article","og_title":"How to Discover the Extent of the Damage After a Data Breach","og_description":"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2023-05-23T15:26:00+00:00","article_modified_time":"2024-10-25T10:20:39+00:00","og_image":[{"width":1750,"height":525,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg","type":"image\/jpeg"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/"},"author":{"name":"Annabelle Ilsley","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"headline":"Data Breach: How to Discover the Extent of the Damage","datePublished":"2023-05-23T15:26:00+00:00","dateModified":"2024-10-25T10:20:39+00:00","mainEntityOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/"},"wordCount":853,"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg","keywords":["data breach"],"articleSection":["Data Breach and More"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/","name":"How to Discover the Extent of the Damage After a Data Breach","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg","datePublished":"2023-05-23T15:26:00+00:00","dateModified":"2024-10-25T10:20:39+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"We can guide you through the steps you need to take when investigating a data breach, and how to discover the extent of the damage.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-13.jpg","width":1750,"height":525,"caption":"Investigating a Data Breach: How to Discover the Extent of the Damage"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-discover-the-extent-of-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"Data Breach: How to Discover the Extent of the Damage"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":6,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/380\/revisions"}],"predecessor-version":[{"id":507,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/380\/revisions\/507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/381"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}