{"id":2801,"date":"2019-07-09T11:15:32","date_gmt":"2019-07-09T17:15:32","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2801"},"modified":"2024-02-06T10:01:16","modified_gmt":"2024-02-06T16:01:16","slug":"gone-phishing-1","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/gone-phishing-1\/","title":{"rendered":"\u2018Gone Phishing\u2019 Blog (Part 1)"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">With the first signs of summer in the air, one\u2019s thoughts may turn to fishing\u2026wait\u2026wrong blog\u2026<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this inaugural iDS cybersecurity blog post, we\u2019ll give a quick overview of phishing attacks and the damage they can cause, frequency of attacks, and some common types of phishing attacks. I<a href=\"\/en_gb\/gone-phishing-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">n the second installment<\/a>, we\u2019ll concentrate primarily on how to prevent and recover from a phishing attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-phishing\">What Is Phishing?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing is a technique employed by cybercriminals to compromise devices and networks by tricking email recipients into clicking on a link or opening a document that contains malware. While Hollywood often depicts hackers as rogue heroes seeking to bring down evil corporations or sinister government agencies, the reality is much more complex.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There are good, ethical hackers, often called white hat hackers, which can help organizations identify weaknesses in their networks, systems, or applications. There are black hat hackers that use their abilities for malicious activity, such as stealing your credit card information or corporate secrets.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the movies, the evil hackers are typically actively engaged in their hacks \u2013 that is, they are going against their foes in real time before our eyes, bypassing security devices, extracting passwords, and finally getting access to their target\u2019s crown jewels all while our heroes attempt to defeat them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The reality is usually very different and much more mundane. The most common vector for data breach in 2018 was a phishing email, according to<a href=\"https:\/\/www.idg.com\/\"> IDG <\/a>in its 2018 U.S. State of Cybercrime, which is conducted in conjunction with CSO magazine, CERT, the Secret Service, and KnowBe4.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The study also found that no organization is immune. Government agencies and large corporations endured an average of 196 security events per year, while the typical small\/medium business faced an average of 24 events per year.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The result of a successful attack depends upon the goal of the attacker. One common attack is to embed malware in an email that allows the attacker to breach the security perimeter, access additional systems, and steal either customer data or login credentials. In this case, you may not even know you\u2019ve been breached until you are contacted by the FBI or the press for a comment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Other attacks are more obvious \u2013 everyone comes in to work only to discover that the data on all of your computers is now encrypted with ransomware. And your real-time disaster recovery backup is also encrypted. You can get the data back for a mere $50,000 worth of Bitcoin, a small price to pay, they tell you.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A data breach can be much worse. Estimates vary, but multiple studies involving a customer data breach have costs for a medium-sized business experiencing a breach of a few thousand customer or employee records pegged at $1.5 million to $5.5 million. The costs can be much higher, and that doesn\u2019t include the reputational damage you may incur as a result of the breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Are Examples Of Phishing Attacks?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing can take many forms. The most famous (infamous?) scam is an unsophisticated phishing email where the sender pretends to be a Nigerian prince (or former government finance official) and simply needs a U.S. bank account to deposit their money in.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This scam, in some form, has been around for more than a century, but has become far more common with the transition from a paper-based to an email based-attack. While most people see the emails for the laughably bad scam they are, you might wonder why we still see them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Well, it\u2019s because, unfortunately, it still works. Millions of dollars flow to criminals from unsophisticated emails that are so common they have their own moniker: a \u201c419\u201d fraud, named after the section of the Nigerian criminal code\u2019s fraud category.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another one of the common types of phishing attack is called spear phishing. Spear phishing is a targeted attack where the bad actor targets a specific individual and gathers information on their target in order to craft a much more believable email.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Social media is a prime source of data used in spear phishing attacks. For example, if you post about staying at a specific hotel, the bad actor can craft an email from the hotel following up to ask you to complete a satisfaction survey. Or they may use your LinkedIn profile to identify that you are an alumnus of a specific school, then generate an email with a document describing an alumni event or a fundraising initiative.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">An even more specialized type of spear phishing attack is called whaling. Whaling involves targeting the most senior executives of an organization to facilitate stealing the organization\u2019s most valuable information or authorize fraudulent funds transfers. Whaling is often a long-term effort with a focus on reconnaissance to enhance the effectiveness of the attack.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another variation that is increasing in frequency is called voice phishing, or vishing. There are a lot of variations of vishing, from very simple to extraordinarily complex. At one end of the spectrum would be a simple phone call to try and persuade someone to give personal details or account information, such as calling the help desk and telling them you were a user who lost their password.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A more complex attack might combine changing the caller ID information, making a call, and following that up with an email. For example, an attacker might make their phone number appear to be a senior company executive\u2019s phone number, making a phone call to the accounts payable specialist to tell them that the firm\u2019s biggest supplier hasn\u2019t been paid and that a wire transfer is needed ASAP.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the phone, the attacker says they will get the information for the payment and send an email with the details. The attacker follows up with a spoofed email to the target that appears to be from that same executive containing the routing and account numbers for a wire transfer.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The attack is completed with another phone call that appears to be from the executive confirming that the AP specialist got the email and the information. And the executive will wait on the line while the transfer is executed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Whatever the attack, in an increasingly digitized world, we are all at risk. <a href=\"\/en_gb\/gone-phishing-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Our next installment<\/a> will focus on how to help your users avoid and your systems prevent, detect, and recover from these attacks. For more information on our services, please contact Robert Kirtley at <a href=\"mailto:rkirtley@idsinc.com\" target=\"_blank\" rel=\"noreferrer noopener\">rkirtley@idsinc.com<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>With the first signs of summer in the air, one\u2019s thoughts may turn to fishing\u2026wait\u2026wrong blog\u2026 In this inaugural iDS cybersecurity blog post, we\u2019ll give a quick overview of phishing attacks and the damage they can cause, frequency of attacks, and some common types of phishing attacks. In the second installment, we\u2019ll concentrate primarily on [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2804,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, &amp; why you should be aware them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/gone-phishing-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Gone Phishing\u2019 Blog (Part 1)\" \/>\n<meta property=\"og:description\" content=\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, &amp; why you should be aware them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/gone-phishing-1\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-09T17:15:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T16:01:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"\u2018Gone Phishing\u2019 Blog (Part 1)\",\"datePublished\":\"2019-07-09T17:15:32+00:00\",\"dateModified\":\"2024-02-06T16:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"},\"wordCount\":1107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\",\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"datePublished\":\"2019-07-09T17:15:32+00:00\",\"dateModified\":\"2024-02-06T16:01:16+00:00\",\"description\":\"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-1.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Phishing attacks can be detrimental to your company. iDS discusses the types of phishing, including spear phishing, and why you should be aware them.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions","description":"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/gone-phishing-1\/","og_locale":"en_GB","og_type":"article","og_title":"\u2018Gone Phishing\u2019 Blog (Part 1)","og_description":"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.","og_url":"https:\/\/idsinc.com\/en_gb\/gone-phishing-1\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-07-09T17:15:32+00:00","article_modified_time":"2024-02-06T16:01:16+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert Kirtley","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"\u2018Gone Phishing\u2019 Blog (Part 1)","datePublished":"2019-07-09T17:15:32+00:00","dateModified":"2024-02-06T16:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/"},"wordCount":1107,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/gone-phishing-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/gone-phishing-1\/","url":"https:\/\/idsinc.com\/gone-phishing-1\/","name":"\u2018Gone Phishing\u2019 Blog (Part 1) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","datePublished":"2019-07-09T17:15:32+00:00","dateModified":"2024-02-06T16:01:16+00:00","description":"Phishing attacks can be detrimental to companys. iDS discusses types of phishing, including spear phishing, & why you should be aware them.","breadcrumb":{"@id":"https:\/\/idsinc.com\/gone-phishing-1\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/gone-phishing-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-1.jpg","width":2500,"height":1250,"caption":"Phishing attacks can be detrimental to your company. iDS discusses the types of phishing, including spear phishing, and why you should be aware them."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/gone-phishing-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"\u2018Gone Phishing\u2019 Blog (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Robert Kirtley","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/en_gb\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2801"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2804"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=2801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=2801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}