{"id":712,"date":"2025-06-26T10:00:00","date_gmt":"2025-06-26T09:00:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=712"},"modified":"2025-10-29T09:05:34","modified_gmt":"2025-10-29T09:05:34","slug":"5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/","title":{"rendered":"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them)"},"content":{"rendered":"\n<p><a href=\"https:\/\/3bdatasecurity.com\/PCI-DSS-Compliance-Services.php\">PCI DSS<\/a> compliance is a non-negotiable for any business that stores, processes, or transmits cardholder data. But despite the abundance of documentation and guidance out there, many organisations still fall short, not because they\u2019re careless, but because the requirements are often misunderstood or misapplied.<\/p>\n\n\n\n<p>And when PCI compliance slips, it\u2019s not just about ticking the wrong box on an audit form. It can lead to regulatory fines, reputational damage, increased cyber risk, and in some cases, a complete loss of payment processing privileges.<\/p>\n\n\n\n<p>To help you stay on the right track, we\u2019ve highlighted five of the most common PCI DSS compliance mistakes, and how you can avoid them with confidence.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Believing PCI DSS Doesn\u2019t Apply Because You Don\u2019t \u201cStore\u201d Card Data<\/strong><\/h3>\n\n\n\n<p>This is one of the most widespread misconceptions. Many businesses assume that because they don\u2019t store card numbers, PCI DSS doesn\u2019t apply to them. But PCI scope is based on storing, processing transmitting OR ability to impact the security of cardholder data &#8211; not just storage.<\/p>\n\n\n\n<p>For example, if you run an ecommerce website that integrates with a payment gateway like Stripe, PayPal, or Braintree, you may not be saving card data on your servers, nor is cardholder data being transmitted into your network, but if your site handles or redirects any part of the transaction, you will be in scope.<\/p>\n\n\n\n<p>Additionally, if you\u2019re a service provider offering hosting services for customers who accept cardholder data, you must demonstrate PCI compliance to meet your customers&#8217; requirements. This is crucial because your services can impact the security of your customers and their cardholder data flows.<\/p>\n\n\n\n<p><strong>How to avoid it:<\/strong><br>Start with a clear PCI DSS scoping exercise. Firstly, identify the card data flow, this will direct you to the potential <a href=\"https:\/\/docs-prv.pcisecuritystandards.org\/SAQ%20(Assessment)\/Instructions%20%26%20Guidance\/SAQ-Instructions-Guidelines-PCI-DSS-v4-0-1-r1.pdf\">Self-Assessment Questionnaire (SAQ),<\/a> then read the SAQ eligibility criteria to determine the appropriate SAQ for which you need to complete.<\/p>\n\n\n\n<p>Secondly, review all your systems which store, process, transmit or could impact the security of the cardholder data, this will help identify the systems directly in scope.<\/p>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Relying on Vulnerability Scanning Alone (Instead of Proper Testing)<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/3bdatasecurity.com\/Vulnerability-Scanning.php\">Vulnerability scanning<\/a> is essential, and required, under PCI DSS depending on your SAQ requirements. But it\u2019s not always enough on its own. Scanners are automated tools that look for known issues. They don\u2019t replicate how a real attacker behaves, and they can\u2019t identify complex, chained vulnerabilities or business logic flaws.<\/p>\n\n\n\n<p>PCI DSS specifically requires <a href=\"https:\/\/3bdatasecurity.com\/Penetration-Testing.php\">penetration testing<\/a> for SAQ D, a manual, scenario-based assessment carried out by experienced professionals who can think and act like an attacker.<\/p>\n\n\n\n<p><strong>How to avoid it:<\/strong><br>Schedule regular penetration tests, ideally with a CREST and CHECK accredited provider like 3B Data Security. You\u2019ll still need to conduct scans, but don\u2019t mistake scanning for penetration testing. Penetration testing is critical for proving your controls are effective in the real world, not just in theory.<\/p>\n\n\n\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Ignoring Documentation and Policy Requirements<\/strong><\/h3>\n\n\n\n<p>Even if your technical controls are perfect, a lack of supporting documentation can still lead to non-compliance. PCI DSS requires written policies, procedures, and evidence that those controls are reviewed and followed.<\/p>\n\n\n\n<p>This can includes things like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A documented information security policy<\/li>\n\n\n\n<li>Role-based <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/role_based_access_control\">access control guidelines<\/a><\/li>\n\n\n\n<li>Change management procedures<\/li>\n\n\n\n<li>An incident response plan<\/li>\n\n\n\n<li>Staff training records<\/li>\n<\/ul>\n\n\n\n<p>Auditors won\u2019t just ask <em>what<\/em> you do, they\u2019ll ask you to prove <em>how<\/em> and <em>when<\/em> you do it.<\/p>\n\n\n\n<p><strong>How to avoid it:<\/strong><br>Establish a policy framework that reflects your real-world environment. Don\u2019t rely on copy-paste templates with no relevance to your operations. At 3B Data Security, we help clients build and maintain policies that are not only compliant but also practical.<\/p>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Weak Access Controls and Poor Authentication Practices<\/strong><\/h3>\n\n\n\n<p>Poor access controls, weak authentication requirements and no account reviews. These are all red flags under, PCI DSS, and yet they\u2019re still surprisingly common in environments undergoing assessment.<\/p>\n\n\n\n<p>PCI DSS requires strict access control, and defines appropriate minimum requirements based on your SAQ eligibility, these could include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unique user IDs<\/strong> for all personnel<\/li>\n\n\n\n<li><strong>Multi-factor authentication<\/strong> (MFA) for all remote access and admin accounts<\/li>\n\n\n\n<li>Regular reviews of <strong>user permissions and account access<\/strong><\/li>\n<\/ul>\n\n\n\n<p>If your access controls aren\u2019t well-defined and enforced, even strong technical controls can be bypassed, either by mistake or malicious intent.<\/p>\n\n\n\n<p><strong>How to avoid it:<\/strong><br>Audit user accounts regularly. Implement access controls that reflect the principle of least privilege, where users only have access to the data and systems they truly need. And enforce strong password policies and MFA across the board.<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Treating PCI DSS as a One-Time Project<\/strong><\/h3>\n\n\n\n<p>Many businesses treat PCI DSS compliance like a milestone: pass the audit, file the paperwork, and forget about it until next year. But compliance isn\u2019t a static achievement, it\u2019s an ongoing effort and should be part of your business as usual processes.<\/p>\n\n\n\n<p>Requirements such as log monitoring, patch management, access reviews, vulnerability scanning, and policy updates are year-round obligations. Falling out of compliance after an audit can be just as risky and damaging as never being compliant at all.<\/p>\n\n\n\n<p><strong>How to avoid it:<\/strong><br>Build PCI DSS into your wider cyber security and risk management programme. Assign internal responsibility for maintaining compliance. Use tools and services (like vulnerability scanning and managed detection) that support continuous improvement. At <em>3B Data Security<\/em>, we work with businesses to embed compliance into their day-to-day operations, not just their annual audit cycle.<\/p>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How 3B Data Security Helps You Get PCI DSS Right<\/strong><\/h3>\n\n\n\n<p>PCI DSS compliance can be complex, but it doesn\u2019t have to be overwhelming. Whether you\u2019re just starting out, preparing for an audit, or recovering from a failed assessment, <a href=\"https:\/\/3bdatasecurity.com\/\">3B Data Security<\/a> can help you navigate the process with confidence.<\/p>\n\n\n\n<p>We offer:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PCI DSS gap analysis and scoping<\/li>\n\n\n\n<li>Remediation planning and documentation support<\/li>\n\n\n\n<li>SAQ and ROC guidance<\/li>\n\n\n\n<li>Penetration testing and vulnerability scanning<\/li>\n\n\n\n<li>Policy development and training<\/li>\n\n\n\n<li>Ongoing support and audit preparation<\/li>\n<\/ul>\n\n\n\n<p>Our team has worked with UK acquiring banks, e-commerce platforms, SaaS providers, public sector bodies, and payment processors, so we know how to tailor solutions to different environments, budgets, and risk profiles.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-base-color has-custom-colour-1-background-color has-text-color has-background has-link-color has-medium-font-size has-text-align-center has-custom-font-size wp-element-button\" href=\"https:\/\/3bdatasecurity.com\/PCI-DSS-Compliance-Services.php\" style=\"border-style:none;border-width:0px;border-radius:0px;padding-top:0;padding-right:var(--wp--preset--spacing--30);padding-bottom:0;padding-left:var(--wp--preset--spacing--30)\">Find out more<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PCI DSS compliance is a non-negotiable for any business that stores, processes, or transmits cardholder data. But despite the abundance of documentation and guidance out there, many organisations still fall short, not because they\u2019re careless, but because the requirements are often misunderstood or misapplied. And when PCI compliance slips, it\u2019s not just about ticking the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":373,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,1,10],"tags":[14,18,11],"class_list":["post-712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-other","category-pci-dss","tag-cyber-security","tag-payment-card-security","tag-pci-dss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide<\/title>\n<meta name=\"description\" content=\"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide\" \/>\n<meta property=\"og:description\" content=\"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-26T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T09:05:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1750\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Elspeth Kennedy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elspeth Kennedy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/\",\"name\":\"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide\",\"isPartOf\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"datePublished\":\"2025-06-26T09:00:00+00:00\",\"dateModified\":\"2025-10-29T09:05:34+00:00\",\"author\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652\"},\"description\":\"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"contentUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg\",\"width\":1750,\"height\":525,\"caption\":\"Recover From a Payment Card Breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652\",\"name\":\"Elspeth Kennedy\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ekennedy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide","description":"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/","og_locale":"en_GB","og_type":"article","og_title":"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide","og_description":"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2025-06-26T09:00:00+00:00","article_modified_time":"2025-10-29T09:05:34+00:00","og_image":[{"width":1750,"height":525,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","type":"image\/jpeg"}],"author":"Elspeth Kennedy","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Elspeth Kennedy","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/","name":"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them) Avoid the Most Common PCI DSS Mistakes | Compliance Guide","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","datePublished":"2025-06-26T09:00:00+00:00","dateModified":"2025-10-29T09:05:34+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652"},"description":"Learn how to avoid 5 critical PCI DSS compliance mistakes that affect businesses. Get clear guidance on scope, testing, access controls, and continuous compliance.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-11.jpg","width":1750,"height":525,"caption":"Recover From a Payment Card Breach"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/5-common-pci-dss-compliance-mistakes-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"5 Common PCI DSS Compliance Mistakes (And How to Avoid Them)"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652","name":"Elspeth Kennedy","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ekennedy\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=712"}],"version-history":[{"count":4,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/712\/revisions"}],"predecessor-version":[{"id":734,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/712\/revisions\/734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/373"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}