{"id":2807,"date":"2019-09-05T09:00:28","date_gmt":"2019-09-05T15:00:28","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2807"},"modified":"2023-12-07T16:50:58","modified_gmt":"2023-12-07T22:50:58","slug":"gone-phishing-2","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/gone-phishing-2\/","title":{"rendered":"\u2018Gone Phishing\u2019 Blog (Part 2)"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><a href=\"\/en_gb\/gone-phishing-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">In our prior post<\/a>, we discussed what phishing attacks are, how they work, and the impact they can have on you and your organization. In this installment, we\u2019ll focus on how to prevent, detect, and recover from phishing attacks with proper cybersecurity training.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With 90% of data breaches originating with a phishing attack, attackers will continue to launch them. In just the last month, phishing attacks resulted in more than a dozen city and other government agencies being paralyzed by ransomware, so it is critical we address the most common vector for attackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Training, Training, Training<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">First, prevention.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Much like real estate agents have the mantra, \u201clocation, location, location\u201d for the three most important factors in a successful real estate sale, your mantra when it comes to preventing phishing should be \u201ctraining, training, training.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Being aware of how phishing email scams are executed is the first step in preventing them. Everyone needs to be able to recognize what the most common clues are in a phishing email, such as typos and referring to you as \u201cDear Customer\u201d in the greeting. Everyone also needs to understand that opening attachments and clicking on links is the most common cause of ransomware compromises and a leading cause of data breaches.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations that don\u2019t take cybersecurity training seriously often pay the price. If your training program is part of an annual event (or worse, only given once to new hires), this is \u201csecurity theater\u201d \u2013 going through the motions so someone can check a box and say, \u201cYup, everyone is trained!\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The belief that new hires come in, start a new job, get their orientation, details on their health insurance options, and information on the 401k plan, fill out their tax forms, etc., AND internalize a one-hour or less cybersecurity training is laughable.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Similarly, having employees go through a compliance training day where they learn about sexual harassment, job interviewing and management compliance guidelines, health and safety training, diversity training, and cybersecurity awareness training is also a \u201ccheck the box\u201d approach to cybersecurity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Of course, every employee will sign the form acknowledging that they have read and understood everything. And by the next day, they will have forgotten everything you\u2019ve taught them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How To Incrementally Change Behavior<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">A better approach is to provide small bits of training several times during the course of the year. Each time there should be a limited or even a single training objective, such as how to recognize suspicious links.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The goal is to incrementally change behavior over time. If I teach you a single thing that you can apply immediately, there is a better chance that you\u2019ll remember it. A month later, I can teach you something else. Lather, rinse, and repeat. If I try to teach you 15 things in the course of an hour once per year, you are likely to remember almost nothing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While cybersecurity training is critical, it is not our only defense. There should be multiple layers beyond improving user behavior. Spam filters are a powerful weapon against broad phishing attacks. They can block emails from known bad sources so that users won\u2019t be as likely to be tempted to do the wrong thing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, the use of email signing certificates can also give you assurance that senders are legitimate by allowing them to digitally sign emails they send you, giving you the ability to validate that signature.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Browser extensions, add-ons, and configuration tools can be configured so that they stop users from going to the multitude of websites that have malicious intent when visitors go to the site, infecting computers with malware, by, for example, suggesting you perform a \u201csecurity scan\u201d of your computer that may actually just install malware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another crucial thing to focus on is applying patches and updates in a timely manner. We can all remember the global WannaCry ransomware attack in May 2017. It disabled more than 200,000 systems in 150 countries, with damage estimates running from the low tens of millions up to potentially billions of dollars. And this was two months AFTER Microsoft had released a patch that could have prevented the outbreak.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A good process for evaluating, testing, and then deploying patches and updates is a very basic step, but a key to having a secure environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-good-backups-are-critical\">Why Good Backups Are Critical<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, I would be remiss if I didn\u2019t bring up backups. While good backups will not prevent any sort of compromise or data breach, they are a critical tool in your arsenal to minimize the damage. In the event of a compromise, good backups will allow your organization to quickly recover and get back to business.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Your backup and restore process should be regularly updated to reflect your hardware environment and, most importantly, tested. If the first time you \u201ctest\u201d your restore process is after a compromise, I can almost guarantee that you will discover a small detail you missed in designing the process that is not obvious until you realize your environment and data cannot be recovered.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>In our prior post, we discussed what phishing attacks are, how they work, and the impact they can have on you and your organization. In this installment, we\u2019ll focus on how to prevent, detect, and recover from phishing attacks with proper cybersecurity training. With 90% of data breaches originating with a phishing attack, attackers will [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2805,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/gone-phishing-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Gone Phishing\u2019 Blog (Part 2)\" \/>\n<meta property=\"og:description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/gone-phishing-2\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T15:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T22:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"wordCount\":872,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"description\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions","description":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/gone-phishing-2\/","og_locale":"en_GB","og_type":"article","og_title":"\u2018Gone Phishing\u2019 Blog (Part 2)","og_description":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.","og_url":"https:\/\/idsinc.com\/en_gb\/gone-phishing-2\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-09-05T15:00:28+00:00","article_modified_time":"2023-12-07T22:50:58+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert Kirtley","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"\u2018Gone Phishing\u2019 Blog (Part 2)","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"wordCount":872,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/gone-phishing-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/gone-phishing-2\/","url":"https:\/\/idsinc.com\/gone-phishing-2\/","name":"\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","description":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.","breadcrumb":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/gone-phishing-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","width":2500,"height":1250,"caption":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"\u2018Gone Phishing\u2019 Blog (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Robert Kirtley","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/en_gb\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2807"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2807\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2805"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=2807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=2807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}