{"id":803,"date":"2025-11-04T10:46:07","date_gmt":"2025-11-04T10:46:07","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=803"},"modified":"2025-11-04T10:46:09","modified_gmt":"2025-11-04T10:46:09","slug":"lessons-from-real-world-cyber-incidents","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/","title":{"rendered":"Lessons from Real-World Cyber Incidents"},"content":{"rendered":"\n<p>It began with a harmless email. Employees received a message from a trusted supplier to update their email credentials \u201cfor security compliance.\u201d Everything looked legitimate: the logo, the tone, even the signature. Except it was not from the supplier.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"901\" data-id=\"815\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-160621-1024x901.png\" alt=\"Targeted Phishing email targeted at new joiners\" class=\"wp-image-815\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-160621-1024x901.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-160621-300x264.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-160621-768x676.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-160621.png 1303w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"898\" data-id=\"814\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-155628-2-1024x898.png\" alt=\"Business Email Compromise Targeted Phishing email targeted at new joiners\" class=\"wp-image-814\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-155628-2-1024x898.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-155628-2-300x263.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-155628-2-768x674.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-04-155628-2.png 1297w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>It was a <strong><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/phishing\">targeted phishing campaign<\/a><\/strong>, designed to take advantage of new joiners who were still getting used to company systems and processes. The timing was perfect. Employees in the middle of onboarding process, responding to multiple IT requests. A few clicked unknowingly, getting their credentials compromised. And before long, the attackers were using those same accounts to spread further within the organisation.<\/p>\n\n\n\n<p>When the business reached out to <strong>3B Data Security (3BDS)<\/strong>, our team immediately mobilised. Within hours, we had isolated the affected accounts, blocked malicious domains, and traced the attack\u2019s path. Collaborating with the client\u2019s internal IT and leadership teams, we restored control, analysed the incident, and strengthened their defences so it wouldn\u2019t happen again.<\/p>\n\n\n\n<p>Incidents like these which are fast-moving, human-led, and often preventable are becoming increasingly common. Over the years, we have helped countless organisations face similar challenges. And while every case is different, we have noticed the same obstacles come up time and again.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Challenges We See Most Often<\/h3>\n\n\n\n<h5 class=\"wp-block-heading\">1. Unclear Escalation Paths<\/h5>\n\n\n\n<p>In the chaos of a live cyber incident, every minute matters. Yet, many teams lose precious time figuring out who\u2019s in charge, what to escalate, and when. Those moments of hesitation can turn a small problem into a widespread crisis.<\/p>\n\n\n\n<p><strong>We\u2019ve seen it happen: <\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In one case, a simple alert sat unaddressed for hours because no one knew who was responsible for triggering the response plan. By the time action was taken, the infection had spread across key systems.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>How to fix it: <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\"><blockquote><p><strong>Define your escalation process clearly and make it second nature. <\/strong><\/p><cite>Everyone, from front-line IT staff to executives, should know who to contact and what their role is. Regular <a href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/from-tabletop-to-real-world-testing-the-value-of-cyber-incident-exercises\/\">tabletop exercises<\/a> are the best way to make sure theory translates into action.<\/cite><\/blockquote><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">2. Gaps in Visibility<\/h5>\n\n\n\n<p>You cannot defend what you cannot see. Many organisations still struggle to get a complete picture of what is happening across their networks, endpoints, and cloud environments. That lack of visibility makes it hard to detect threats early or understand how far they have spread.<\/p>\n\n\n\n<p><strong>We\u2019ve seen this first-hand: <\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>A client\u2019s investigation into a data breach stalled because their monitoring tools were not integrated across environments. They had the right data, but it lived in silos.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>How to fix it:<\/strong> <\/p>\n\n\n\n<figure class=\"wp-block-pullquote\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\"><blockquote><p><strong>Invest in centralised threat monitoring that unifies visibility across all platforms. <\/strong><\/p><cite>Regularly test your detection coverage to make sure there are no blind spots. The sooner you can see a problem, the faster you can contain it.<\/cite><\/blockquote><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">3. Communication Breakdowns<\/h5>\n\n\n\n<p>Even the best technical teams can stumble when communication falters. During a cyber incident, leadership needs clear, jargon-free updates to make informed decisions while technical teams need space to act fast without getting lost in red tape.<\/p>\n\n\n\n<p><strong>We\u2019ve seen what happens when that balance breaks down: <\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-default has-small-font-size is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">Inconsistent updates, conflicting messages, and sometimes even unnecessary public confusion.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>How to fix it:<\/strong> <\/p>\n\n\n\n<figure class=\"wp-block-pullquote\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\"><blockquote><p><strong>Build communication into your response plan. <\/strong><\/p><cite>Assign a spokesperson, define update intervals, and ensure executives get the right level of detail. Not too little, not too much. Clarity and calm communication can make or break your response.<\/cite><\/blockquote><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">4. Limited Post-Incident Analysis<\/h5>\n\n\n\n<p>Once the crisis is over, it\u2019s tempting to move on. But skipping the debrief means missing vital lessons. Every cyber incident, big or small, offers insights that can strengthen your defences for the future.<\/p>\n\n\n\n<p><strong>We\u2019ve seen it too often:<\/strong> <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>A company resolves a phishing attack but doesn\u2019t update training or review policies. Months later, a similar attack succeeds exploiting the same gap.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>How to fix it: <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\" style=\"padding-top:24px;padding-right:0;padding-bottom:24px;padding-left:0\"><blockquote><p><strong>Make post-incident reviews part of your culture. <\/strong><\/p><cite>Analyse what went well, what didn\u2019t, and how to improve. Feed those insights into training, policies, and processes. That\u2019s how you turn incidents into opportunities.<\/cite><\/blockquote><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">From Reaction to Readiness<\/h3>\n\n\n\n<p>At 3B Data Security, we believe that resilience is built long before an incident happens. Our work isn\u2019t just to contain vulnerabilities. It\u2019s to help organisations prepare, respond, and recover with confidence.<\/p>\n\n\n\n<p>By putting structure, communication, and learning at the heart of every response plan, we help teams move from panic to precision and from reaction to readiness.<\/p>\n\n\n\n<p>If you\u2019d like to understand how your organisation would handle a real-world incident or how to strengthen your response framework, let\u2019s talk.<\/p>\n\n\n\n<p>&nbsp;<a href=\"https:\/\/3bdatasecurity.com\/contact.php\">Schedule a call with our team to discuss your incident response readiness.<\/a><\/p>\n\n\n\n<p>Because when every minute counts, preparation isn\u2019t optional, it\u2019s everything.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a phishing email disguised as a trusted vendor request slipped into a client\u2019s inbox, it looked routine \u2014 until new joiners began sharing credentials that attackers quickly exploited. At 3B Data Security, we helped the organisation contain the threat within hours and uncover the deeper lessons behind it.<br \/>\nIn this article, we explore the real-world challenges businesses face during cyber incidents \u2014 from unclear escalation paths to communication breakdowns \u2014 and how the right preparation can turn chaos into control.<\/p>\n","protected":false},"author":17,"featured_media":763,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[20,14],"class_list":["post-803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-security","tag-cyber-attack","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Incidents: Hidden Challenges Businesses Face | Insights<\/title>\n<meta name=\"description\" content=\"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Incidents: Hidden Challenges Businesses Face | Insights\" \/>\n<meta property=\"og:description\" content=\"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-04T10:46:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T10:46:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bharti Tudu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bharti Tudu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/\",\"name\":\"Cyber Incidents: Hidden Challenges Businesses Face | Insights\",\"isPartOf\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg\",\"datePublished\":\"2025-11-04T10:46:07+00:00\",\"dateModified\":\"2025-11-04T10:46:09+00:00\",\"author\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/2fae6998841b5bda87c71590a18fb2ee\"},\"description\":\"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.\",\"breadcrumb\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg\",\"contentUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"Cybersecurity dealing with cyber incidents\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons from Real-World Cyber Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/2fae6998841b5bda87c71590a18fb2ee\",\"name\":\"Bharti Tudu\",\"description\":\"Bharti Tudu is a tech writer weaving complex ideas into stories that resonate. She is passionate about cybersecurity, digital transformation and emerging technologies transforming lives.\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/bhartitudu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Incidents: Hidden Challenges Businesses Face | Insights","description":"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Incidents: Hidden Challenges Businesses Face | Insights","og_description":"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2025-11-04T10:46:07+00:00","article_modified_time":"2025-11-04T10:46:09+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg","type":"image\/jpeg"}],"author":"Bharti Tudu","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Bharti Tudu","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/","name":"Cyber Incidents: Hidden Challenges Businesses Face | Insights","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg","datePublished":"2025-11-04T10:46:07+00:00","dateModified":"2025-11-04T10:46:09+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/2fae6998841b5bda87c71590a18fb2ee"},"description":"Learn key lessons from real-world cyber incidents and bolster your defences against cyber-attacks with effective incident response strategies.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/10\/cyber-security-protection-firewall-interface-concept1-scaled.jpg","width":2560,"height":1709,"caption":"Cybersecurity dealing with cyber incidents"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/lessons-from-real-world-cyber-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"Lessons from Real-World Cyber Incidents"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/2fae6998841b5bda87c71590a18fb2ee","name":"Bharti Tudu","description":"Bharti Tudu is a tech writer weaving complex ideas into stories that resonate. She is passionate about cybersecurity, digital transformation and emerging technologies transforming lives.","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/bhartitudu\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=803"}],"version-history":[{"count":7,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/803\/revisions"}],"predecessor-version":[{"id":816,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/803\/revisions\/816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/763"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}