{"id":3551,"date":"2019-06-07T09:00:00","date_gmt":"2019-06-07T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3551"},"modified":"2022-04-12T14:34:17","modified_gmt":"2022-04-12T20:34:17","slug":"employees-best-defense","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/employees-best-defense\/","title":{"rendered":"Employees: Weakest Link Or Best Defense?"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3551\" data-postid=\"3551\" class=\"themify_builder_content themify_builder_content-3551 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">We hear this piece of conventional wisdom quite a bit: \u201cEmployees are the \u2018weakest link\u2019 in the cyber defense chain.\u201d We understand why we say it. Heck, we\u2019ve been guilty of saying it ourselves.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">And the facts seem to back it up. According to <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-62\/Accenture-2017CostCybercrime-US-FINAL.pdf#zoom=50\" target=\"_blank\" rel=\"noreferrer noopener\">the Ponemon Institute\u2019s 2017 Cost of Cybercrime report<\/a>, \u201cSixty-nine percent of companies experienced phishing and social engineering\u201d attacks in 2017, down just one percent from 2016.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing, social engineering, and insider attacks cost U.S. companies each an average of $2.7M, exceeding the cost of malware ($2.4M) and denial of service ($1.6M). Given the prevalence and the cost of attacks that center around employees, it\u2019s understandable why we feel that our employees are the weak link.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why Words Matter<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Unfortunately, when we allow ourselves to adopt this mindset, where employees are \u201crisks\u201d that need to be \u201cmitigated,\u201d we create an adversarial relationship between ourselves and our community while simultaneously dismissing one of the best chances we have to defend ourselves.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It could be said that we are just arguing semantics, that we\u2019re really saying the same thing, and we\u2019re just using different words. We\u2019ll admit it, there is some truth to it\u2019s just words, but we believe words matter. They matter because words set the stage for our frame of mind and how we interact with the world. Not only that, but they broadcast to the world what and how we think.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The words we use project our attitude, and that attitude can energize and motivate, or it can alienate and demoralize. Take a hypothetical employee \u2013 Joe from Accounting. He\u2019s a model employee; earnest, honest, and hard working. He\u2019s a great accountant, but he\u2019s not all that great with technology, which is fine, because it\u2019s not his job to be great with technology.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Joe\u2019s a prime target for phishing and business email compromise. We can approach Joe as a risk that needs to be mitigated, which sounds reasonable and appropriate. But if our mindset is that Joe himself is the problem, our verbal and non-verbal communication with him and his colleagues will convey that.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019ll end up losing Joe\u2019s heart and likely the hearts of his coworkers. The community will develop a bad taste for the security team and go away thinking that we are condescending, overly impressed with our own importance, and that we see everyone else as \u201cthe problem.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Approach Employees As Partners<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">But what if instead of approaching Joe as a problem, we approach him and his colleagues as partners? This not only allows us to mitigate the immediate risk, which is real, but also gives us the opportunity to create a force multiplier. Approaching our employees as our best chance for creating a secure environment forces a change to the entire organization\u2019s security landscape.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On some level everyone becomes a member of the security team. Everyone asks questions and is aware of risk. Suspicious emails are assumed to be malicious rather than innocent, computers are locked when employees leave their desks, and badges are swiped when entering secure areas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One of the best security questions we\u2019ve ever been asked was by the Chief of Police for Fairfax County, Virginia. He asked our graduate cohort, \u201cWho keeps law and order in Fairfax County?\u201d Now imagine a room full of cyber and policy geeks responding to this question. The conversation was dynamic and enthusiastic, and our responses were all over the map.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When no one provided an adequate answer, he told us, \u201cYou do. Every one of you when you get up in the morning and participate in our community. I\u2019m here for the exceptions; you are responsible for everyday law and order.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">He was telling us that each one of us was a member of his security team. That we are all responsible for the security of our environment. That by locking our homes and cars, we participate in securing the community. By being alert and recognizing danger before it strikes, we participate in securing our community.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-mindset-change-is-needed\"><strong>A Mindset Change Is Needed<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">We believe the same is true in cyber. We can\u2019t do it alone; we need the entire community that we serve to be awake and alert. In the physical world we\u2019ve honed these skills over decades (or more) of life. In the cyber world many of us haven\u2019t learned or been taught these skills. It\u2019s up to us security and cyber experts to help our co-workers build and develop these skills.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At the end of the day, treating employees like problems undermines the culture that we are trying to foster. Employees are not our weakest link; they represent our best chance for a secure future. If we are asking them to change their mindset to incorporate cyber security, it\u2019s only fair that we be willing to reciprocate. We need to change our mindset to see them as partners and defenders, not as problems and risks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage&nbsp; \u2013 both in and out of the courtroom. Our subject matter experts and data&nbsp; strategists specialize in finding solutions to complex data problems \u2013 ensuring data can be leveraged as an asset and not a liability.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>We hear this piece of conventional wisdom quite a bit: \u201cEmployees are the \u2018weakest link\u2019 in the cyber defense chain.\u201d We understand why we say it. Heck, we\u2019ve been guilty of saying it ourselves. And the facts seem to back it up. According to the Ponemon Institute\u2019s 2017 Cost of Cybercrime report, \u201cSixty-nine percent of [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3553,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees: Weakest Link Or Best Defense? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/employees-best-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees: Weakest Link Or Best Defense?\" \/>\n<meta property=\"og:description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/employees-best-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-07T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:34:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Employees: Weakest Link Or Best Defense?\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"wordCount\":893,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"name\":\"Employees: Weakest Link Or Best Defense? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"description\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees: Weakest Link Or Best Defense?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employees: Weakest Link Or Best Defense? - iDiscovery Solutions","description":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/employees-best-defense\/","og_locale":"en_GB","og_type":"article","og_title":"Employees: Weakest Link Or Best Defense?","og_description":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.","og_url":"https:\/\/idsinc.com\/en_gb\/employees-best-defense\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-06-07T15:00:00+00:00","article_modified_time":"2022-04-12T20:34:17+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Written by":"iDiscovery Solutions","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/employees-best-defense\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Employees: Weakest Link Or Best Defense?","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"wordCount":893,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/employees-best-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/employees-best-defense\/","url":"https:\/\/idsinc.com\/employees-best-defense\/","name":"Employees: Weakest Link Or Best Defense? - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","description":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.","breadcrumb":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/employees-best-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","width":2500,"height":1250,"caption":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Employees: Weakest Link Or Best Defense?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery Solutions","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/en_gb\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=3551"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/3553"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=3551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=3551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=3551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}