{"id":338,"date":"2020-08-14T16:28:54","date_gmt":"2020-08-14T22:28:54","guid":{"rendered":"https:\/\/idsinc.com\/?p=338"},"modified":"2021-11-30T14:07:08","modified_gmt":"2021-11-30T20:07:08","slug":"finely-tuned-002-puzzle-pieces","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/finely-tuned-002-puzzle-pieces\/","title":{"rendered":"Finely Tuned \u2013 002  Puzzle Pieces \u2026"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">By Bobby R. Williams, Jr.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I admit it. I like puzzles. It\u2019s probably why I enjoy helping people solve problems. During my career, I have seen problems disguised as solutions. Unintended consequences can turn a simple procedure into a puzzle that needs to be solved. Security is one of those items. Data encryption to be more specific.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Organizations want to keep their data safe. So, they encrypt files, folders and hard disks. I have seen very effective encryption protocols deployed with several tools. The data is safe, but what does this mean if the data needs to be collected for investigation?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Often, the security protocol designed to protect your data can prevent you from accessing it when you need to complete a defensible collection. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-is-data-encryptio-significant\"><strong>Why is Data Encryptio significant?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Encryption is great. I am always in favor of more security, balanced with an efficient user experience. Often organizations deploy encryption without considering methods to decrypt the data should it become necessary. Stored keys are disorganized. Key generators are not successfully used. Systems deploy layers of security without understanding how one layer impacts the other. Inevitably, a legal matter or an internal investigation arises. Then the skilled IT professionals who have done a phenomenal job protecting the company\u2019s data cannot provide the necessary information to decrypt and\/or provide a third-party expert access to that data. As a result, data collections are often delayed. Otherwise, an expert may need to deploy an expensive workaround or use a defensible but less optimal collection method.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What\u2019s my takeaway?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When I am scoping out a case, I ask these questions early in the process:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Is there encryption used? If so, where and on which devices?<\/li><li>What type or tool are you using to encrypt?<\/li><li>What is your protocol for decrypting data if needed?<\/li><li>Has it been tested and validated?<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Your organization should make sure these questions can be quickly answered on a scoping call. The answers can impact the speed at which an investigation begins. Not having those answers can completely stall the process. Take the time to test and document the recovery procedure. This will help ensure you are familiar with the process.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Know which keys unlock which doors. It may save you from having to solve a puzzle you didn\u2019t know you made.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><em>iDiscovery Solutions, Inc. (iDS) is an award-winning, global, and expert services firm that delivers customized, innovative solutions for legal and corporate clients\u2019 complex challenges. iDS\u2019 subject matter experts testify and consult in connection with electronic discovery (eDiscovery), digital forensics, data analytics, and cybersecurity\/information governance.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>By Bobby R. Williams, Jr. I admit it. I like puzzles. It\u2019s probably why I enjoy helping people solve problems. During my career, I have seen problems disguised as solutions. Unintended consequences can turn a simple procedure into a puzzle that needs to be solved. Security is one of those items. Data encryption to be [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Finely Tuned \u2013 002 Puzzle Pieces \u2026 - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Data encryption keeps organizations&#039; files, folders and hard disks safe, but what happens if data needs to be collected for investigation?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/finely-tuned-002-puzzle-pieces\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finely Tuned \u2013 002 Puzzle Pieces \u2026\" \/>\n<meta property=\"og:description\" content=\"Data encryption keeps organizations&#039; files, folders and hard disks safe, but what happens if data needs to be collected for investigation?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/finely-tuned-002-puzzle-pieces\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-14T22:28:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:07:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010-1024x512.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bobby R. Williams, Jr.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bobby R. Williams, Jr.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/\"},\"author\":{\"name\":\"Bobby R. Williams, Jr.\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\"},\"headline\":\"Finely Tuned \u2013 002 Puzzle Pieces \u2026\",\"datePublished\":\"2020-08-14T22:28:54+00:00\",\"dateModified\":\"2021-11-30T20:07:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/\"},\"wordCount\":435,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202010.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/\",\"name\":\"Finely Tuned \u2013 002 Puzzle Pieces \u2026 - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202010.jpg\",\"datePublished\":\"2020-08-14T22:28:54+00:00\",\"dateModified\":\"2021-11-30T20:07:08+00:00\",\"description\":\"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202010.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202010.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/de\\\/finely-tuned-002-puzzle-pieces\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finely Tuned \u2013 002 Puzzle Pieces \u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\",\"name\":\"Bobby R. Williams, Jr.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"caption\":\"Bobby R. Williams, Jr.\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/bobby\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Finely Tuned \u2013 002 Puzzle Pieces \u2026 - iDiscovery Solutions","description":"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/finely-tuned-002-puzzle-pieces\/","og_locale":"en_GB","og_type":"article","og_title":"Finely Tuned \u2013 002 Puzzle Pieces \u2026","og_description":"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?","og_url":"https:\/\/idsinc.com\/en_gb\/finely-tuned-002-puzzle-pieces\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-08-14T22:28:54+00:00","article_modified_time":"2021-11-30T20:07:08+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010-1024x512.jpg","type":"image\/jpeg"}],"author":"Bobby R. Williams, Jr.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bobby R. Williams, Jr.","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/"},"author":{"name":"Bobby R. Williams, Jr.","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca"},"headline":"Finely Tuned \u2013 002 Puzzle Pieces \u2026","datePublished":"2020-08-14T22:28:54+00:00","dateModified":"2021-11-30T20:07:08+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/"},"wordCount":435,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/","url":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/","name":"Finely Tuned \u2013 002 Puzzle Pieces \u2026 - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010.jpg","datePublished":"2020-08-14T22:28:54+00:00","dateModified":"2021-11-30T20:07:08+00:00","description":"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?","breadcrumb":{"@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202010.jpg","width":2500,"height":1250,"caption":"Data encryption keeps organizations' files, folders and hard disks safe, but what happens if data needs to be collected for investigation?"},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/de\/finely-tuned-002-puzzle-pieces\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Finely Tuned \u2013 002 Puzzle Pieces \u2026"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca","name":"Bobby R. Williams, Jr.","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","caption":"Bobby R. Williams, Jr."},"url":"https:\/\/idsinc.com\/en_gb\/author\/bobby\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=338"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2388"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}