{"id":1021,"date":"2021-03-10T11:18:14","date_gmt":"2021-03-10T17:18:14","guid":{"rendered":"https:\/\/idsinc.com\/?p=1021"},"modified":"2026-03-09T14:53:11","modified_gmt":"2026-03-09T20:53:11","slug":"ransomware-attack-recovery","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/ransomware-attack-recovery\/","title":{"rendered":"Ransomware Attack Recovery"},"content":{"rendered":"<h3 class=\"wp-block-heading\" id=\"h-ransomware-has-come-a-long-way-since-its-beginning-in-1989-and-so-have-the-options-for-recovering-from-a-ransomware-attack-one-of-the-the-first-variants-was-distributed-via-diskettes-to-attendees-at-a-who-conference\"><strong><em>Ransomware has come a long way since its beginning in 1989, and so have the options for recovering from a ransomware attack. One of the the first variants was distributed via diskettes to attendees at a WHO conference.<\/em><\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The popularization of the internet inevitably led criminals to find ways to distribute ransomware attacks using email attachments and links.  These links led to compromised websites injecting malware onto unsuspecting user\u2019s computers and networks. Truth is, this happens more than one might think, and it often happens with the simple opening of an email that looks legitimate to the naked eye.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Both the volume and scale of ransomware attacks have been growing at an exponential rate. Unfortunately no sector of the economy is spared, with countless numbers of businesses and organizations falling prey to ransomware attacks. On average, there are ransomware attacks on US businesses or government agencies about every 11 seconds. These attacks are expected to cause damages of up to $20 billion to US companies and government agencies by the end of this year.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>What to do if your organization is impacted by a ransomware attack, and what options do you have for recovering from an attack?<\/em><\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><em>Identify which systems have been impacted and immediately move to contain the infection<\/em><\/li><li><em>Pull out your incident response plan<\/em><\/li><li><em>Check your backups<\/em><\/li><li><em>See if there are options to recover your files without paying<\/em><\/li><li><em>Evaluate the impact of paying and decide if you want to pay<\/em><\/li><li><em>What Next? After recovery, what should you do?<\/em><\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em><a href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/quick-recovery-from-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">To learn more about Quick Recovery from Ransomware Attacks<\/a>, we invite you to review our case study<\/em><\/strong>.<br>___________________________________________________________________________________________________<br><br><em><strong>iDiscovery Solutions is a strategic consulting, technology, and expert services firm<\/strong><\/em> \u2013 providing<em><strong> customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/strong><\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><a href=\"https:\/\/idsinc.com\/en_gb\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">To speak with someone at iDS, CLICK HERE.<\/a><\/strong><\/p>\n\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1021\" data-postid=\"1021\" class=\"themify_builder_content themify_builder_content-1021 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware has come a long way since its beginning in 1989, and so have the options for recovering from a ransomware attack. One of the the first variants was distributed via diskettes to attendees at a WHO conference. The popularization of the internet inevitably led criminals to find ways to distribute ransomware attacks using email [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":1022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,34],"tags":[15,14,13],"class_list":["post-1021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-privacy","tag-incident-response-plan","tag-ransomware-attack","tag-ransomware-attack-recovery","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Attack Recovery - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/ransomware-attack-recovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attack Recovery\" \/>\n<meta property=\"og:description\" content=\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/ransomware-attack-recovery\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-10T17:18:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T20:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"Ransomware Attack Recovery\",\"datePublished\":\"2021-03-10T17:18:14+00:00\",\"dateModified\":\"2026-03-09T20:53:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"},\"wordCount\":308,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"keywords\":[\"incident response plan\",\"ransomware attack\",\"ransomware attack recovery\"],\"articleSection\":[\"Blog\",\"Privacy + Compliance\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\",\"name\":\"Ransomware Attack Recovery - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"datePublished\":\"2021-03-10T17:18:14+00:00\",\"dateModified\":\"2026-03-09T20:53:11+00:00\",\"description\":\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Ransomware attack recovery, incident response plan, Ransomware, Ransomware attacks, WHO\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Attack Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Attack Recovery - iDiscovery Solutions","description":"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/ransomware-attack-recovery\/","og_locale":"en_GB","og_type":"article","og_title":"Ransomware Attack Recovery","og_description":"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?","og_url":"https:\/\/idsinc.com\/en_gb\/ransomware-attack-recovery\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2021-03-10T17:18:14+00:00","article_modified_time":"2026-03-09T20:53:11+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert Kirtley","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"Ransomware Attack Recovery","datePublished":"2021-03-10T17:18:14+00:00","dateModified":"2026-03-09T20:53:11+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/"},"wordCount":308,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","keywords":["incident response plan","ransomware attack","ransomware attack recovery"],"articleSection":["Blog","Privacy + Compliance"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/ransomware-attack-recovery\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/","url":"https:\/\/idsinc.com\/ransomware-attack-recovery\/","name":"Ransomware Attack Recovery - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","datePublished":"2021-03-10T17:18:14+00:00","dateModified":"2026-03-09T20:53:11+00:00","description":"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?","breadcrumb":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/ransomware-attack-recovery\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","width":2500,"height":1250,"caption":"Ransomware attack recovery, incident response plan, Ransomware, Ransomware attacks, WHO"},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Ransomware Attack Recovery"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Robert Kirtley","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/en_gb\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=1021"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1021\/revisions"}],"predecessor-version":[{"id":9474,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1021\/revisions\/9474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/1022"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=1021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=1021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=1021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}