{"id":249,"date":"2020-11-20T14:35:55","date_gmt":"2020-11-20T20:35:55","guid":{"rendered":"https:\/\/idsinc.com\/?p=249"},"modified":"2021-11-30T14:21:07","modified_gmt":"2021-11-30T20:21:07","slug":"security-in-the-age-of-a-pandemic","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/security-in-the-age-of-a-pandemic\/","title":{"rendered":"Security in the age of the pandemic"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">By: <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/author\/idiscovery-solutions\">iDiscovery Solutions<\/a> on 11\/20\/2020<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When you ask people the necessary elements for good information security, they will often talk about technology \u2013 firewalls, secure servers, identify and access management, network segmentation and other technical dimensions. However, the most common problems we face relate to things that people do as opposed to any lapse in our technical controls.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">One key focus needs to be to ensure that we focus on information security awareness training. The vast majority of issues we face on a day-to-day basis are from:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Business Email Compromise<\/li><li>Ransomware<\/li><li>Malware<\/li><li>Data breach<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The most common cause for virtually all four can be traced back to people. People clicking on bad links or opening suspicious attachments. People using (or reusing) weak passwords. People approving changes to payment destinations and processes on the basis of obviously fraudulent emails or deceitful phone calls.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There are a number of technical solutions that can mitigate each of these risks, such as tools that scan external links or flag attachments coming from an external address. This is not enough. While technology can be used to reduce the likelihood of attacker success, in the end, poor practices can overcome good technology.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So what is the answer? Training and compensating controls. Your people need to understand how bad guys operate and need to understand social engineering. They are being targeted \u2013 they just need to understand what that looks like. Train your team, but test them as well. Reward team members that report suspicious activity and use those reports as a basis for training the rest of the team.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Controls may need to be modified in the world of working at home. If employees in the office would normally have a second set of eyes verify something before they proceed with approving a transaction, translate that secondary check into a process that works while working remotely. Teach them that bad guys often seek to have employees skirt the rules in the name of urgency. It is important to ensure that they understand that compliance with internal controls will not result in disciplinary actions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, review both your training and your control processes and verify that they translate into the new way of working. If you have not already enhanced access control through the use of multi factor authentication, then consider adding that as an additional layer of protection. But above all, remember to keep connected to your employees so that they understand that security is everyone\u2019s job and that we all need to be vigilant even if we are in our sweatpants.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/em><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>By: iDiscovery Solutions on 11\/20\/2020 When you ask people the necessary elements for good information security, they will often talk about technology \u2013 firewalls, secure servers, identify and access management, network segmentation and other technical dimensions. However, the most common problems we face relate to things that people do as opposed to any lapse in [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security in the age of the pandemic - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/security-in-the-age-of-a-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in the age of the pandemic\" \/>\n<meta property=\"og:description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/security-in-the-age-of-a-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T20:35:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:21:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Security in the age of the pandemic\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"name\":\"Security in the age of the pandemic - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"description\":\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security in the age of the pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security in the age of the pandemic - iDiscovery Solutions","description":"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/security-in-the-age-of-a-pandemic\/","og_locale":"en_GB","og_type":"article","og_title":"Security in the age of the pandemic","og_description":"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.","og_url":"https:\/\/idsinc.com\/en_gb\/security-in-the-age-of-a-pandemic\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-20T20:35:55+00:00","article_modified_time":"2021-11-30T20:21:07+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Written by":"iDiscovery Solutions","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Security in the age of the pandemic","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"wordCount":463,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","url":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","name":"Security in the age of the pandemic - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","description":"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.","breadcrumb":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","width":2500,"height":1250,"caption":"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Security in the age of the pandemic"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery Solutions","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/en_gb\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2375"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}