{"id":1016,"date":"2021-03-10T10:18:28","date_gmt":"2021-03-10T16:18:28","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=1016"},"modified":"2021-07-07T10:22:27","modified_gmt":"2021-07-07T16:22:27","slug":"quick-recovery-from-ransomware-attack","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/","title":{"rendered":"Quick Recovery from Ransomware Attack"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-1016\" data-postid=\"1016\" class=\"themify_builder_content themify_builder_content-1016 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg\" class=\"wp-post-image wp-image-1010\" title=\"iDiscovery Solutions Case Study - Ransomware Attack\" alt=\"iDiscovery Solutions Case Study, Ransomware Attack, Case Study, iDiscovery Solutions, malware, iDS cybersecurity team\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-16x8.jpg 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down.<\/strong><\/em><\/p>\n<p>Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data.<\/p>\n<p><strong>iDS was tasked with:<\/strong><\/p>\n<ul>\n<li>Identifying the source and timing of the attack<\/li>\n<li>Isolating the malware, eradicating it from their environment, and restoring systems, applications, and data<\/li>\n<li>Monitoring operations to ensure that the malware did not resurface<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>We brought in a team to identify the source of the attack, pinpoint how the malware got in, contain it, and ensure that the scope of the attack was understood. Then we worked to restore systems and get the business back up and running.<\/strong><\/em><\/p>\n<p>iDS was chosen based on our relationship with the client and our deep experience in assisting clients with similar issues.<\/p>\n<p><strong>A project plan was drawn up which included:<\/strong><\/p>\n<ul>\n<li>Reviewing logs and forensic data to determine the source and extent of the compromise<\/li>\n<li>Wiping compromised systems, reinstalling operating systems, and restoring data from known good backups that we had previously worked to create with the firm<\/li>\n<li>Working with the client to improve defenses against future attacks, including additional user training, network monitoring, and enhanced backup strategies<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>The iDS cybersecurity team conducted an investigation to identify and isolate the malware, restoring operations and preventing the loss of more than $1.5 million in revenue per day. In addition, we prepared a report that allowed our client to get full reimbursement for our services from their cybersecurity insurance policy.<\/strong><\/em><\/p>\n<p>The highly experienced iDS cybersecurity team quickly responded to the client\u2019s needs and got them back to normal operations in a matter of hours. We saved them from losing millions in potential revenue, assisted with insurance recovery for their costs, and took steps to reduce the likelihood that they would need to deal with the same issue in the future.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down. Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data. iDS was tasked with: Identifying the source and timing of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1010,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-1016","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quick Recovery from Ransomware Attack - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Recovery from Ransomware Attack\" \/>\n<meta property=\"og:description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T16:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"name\":\"Quick Recovery from Ransomware Attack - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"datePublished\":\"2021-03-10T16:18:28+00:00\",\"dateModified\":\"2021-07-07T16:22:27+00:00\",\"description\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick recovery from ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quick Recovery from Ransomware Attack - iDiscovery Solutions","description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/","og_locale":"en_GB","og_type":"article","og_title":"Quick Recovery from Ransomware Attack","og_description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2021-07-07T16:22:27+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","url":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","name":"Quick Recovery from Ransomware Attack - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","datePublished":"2021-03-10T16:18:28+00:00","dateModified":"2021-07-07T16:22:27+00:00","description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","width":1200,"height":600,"caption":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Quick recovery from ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<p><em><strong>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down.<\/strong><\/em><\/p> <p>Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data.<\/p> <p><strong>iDS was tasked with:<\/strong><\/p> <ul> <li>Identifying the source and timing of the attack<\/li> <li>Isolating the malware, eradicating it from their environment, and restoring systems, applications, and data<\/li> <li>Monitoring operations to ensure that the malware did not resurface<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<p><em><strong>We brought in a team to identify the source of the attack, pinpoint how the malware got in, contain it, and ensure that the scope of the attack was understood. Then we worked to restore systems and get the business back up and running.<\/strong><\/em><\/p> <p>iDS was chosen based on our relationship with the client and our deep experience in assisting clients with similar issues.<\/p> <p><strong>A project plan was drawn up which included:<\/strong><\/p> <ul> <li>Reviewing logs and forensic data to determine the source and extent of the compromise<\/li> <li>Wiping compromised systems, reinstalling operating systems, and restoring data from known good backups that we had previously worked to create with the firm<\/li> <li>Working with the client to improve defenses against future attacks, including additional user training, network monitoring, and enhanced backup strategies<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<p><em><strong>The iDS cybersecurity team conducted an investigation to identify and isolate the malware, restoring operations and preventing the loss of more than $1.5 million in revenue per day. In addition, we prepared a report that allowed our client to get full reimbursement for our services from their cybersecurity insurance policy.<\/strong><\/em><\/p> <p>The highly experienced iDS cybersecurity team quickly responded to the client\u2019s needs and got them back to normal operations in a matter of hours. We saved them from losing millions in potential revenue, assisted with insurance recovery for their costs, and took steps to reduce the likelihood that they would need to deal with the same issue in the future.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/1016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=1016"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/1016\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/1010"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=1016"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=1016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}