{"id":3484,"date":"2016-05-16T09:18:18","date_gmt":"2016-05-16T08:18:18","guid":{"rendered":"https:\/\/www.infolaw.co.uk\/newsletter\/?p=3484"},"modified":"2016-05-13T13:03:53","modified_gmt":"2016-05-13T12:03:53","slug":"10-steps-to-becoming-cyber-resilient","status":"publish","type":"post","link":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/","title":{"rendered":"10 steps to becoming cyber resilient"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg\" alt=\"young girl in a horror in front of laptop\"\/><\/p>\n<p>Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then can a legal practice develop and deliver new IT-supported service propositions that can add significant value to services for clients, introducers and business partners.<\/p>\n<h3>The need for cyber resilience<\/h3>\n<p>The increasingly high profile threat of security breaches, such as the attack on Mossack Fonseca and extensive breaches reported more widely in the legal sector, are holding many back from introducing innovative working practices that can improve their performance and future prospects.<\/p>\n<p>It shouldn\u2019t be that way. Law firms need to become confident that they are as safe and secure as they can be, understanding the risks and knowing the boundaries that can\u2019t be crossed, but at the same time, pushing their deployment of IT up to safe margins within those limits.<\/p>\n<p>Unfortunately, many of the fears about potential breaches of data security and confidentiality are justified.<\/p>\n<p>Just like risk management generally, many of the steps needed to minimise risk have to be applied widely across the practice, requiring personal compliance with rules and collaboration across internal departments. This is not just an issue for the IT team, although they have a significant role to play.<\/p>\n<p>Resilience is not just about preventing cyber c<em>rime, <\/em>but encompasses cyber <em>security<\/em> on many fronts.<\/p>\n<p>A cyber-resilient law firm should \u201chave the capacity across the business to maintain their core purpose, operations and integrity in the face of cyber attacks and cyber security breaches. A cyber-resilient practice is one that can prevent, detect, contain and recover from a plethora of serious threats against data, applications and IT infrastructure. It successfully aligns continuity management and disaster recovery with security operations in a holistic fashion.\u201d<\/p>\n<p>The threats are real. Just like the risk of a break-in or a fire, there should be an assumption that it is inevitable. Something serious will happen someday \u2013 so prepare for it now.<\/p>\n<p>The concern is that lawyers are generally just not doing much of what needs to be done to minimise cyber risks when doing this effectively would enable them to be more innovative in their use of IT within defined boundaries.<\/p>\n<p>Many lawyers are not exploring new tools to improve business operations or support new ways of servicing clients because they fear, but don\u2019t fully understand, what cyber risks they face; and how or to what extent they can be managed.<\/p>\n<h3>What are the real cyber risks?<\/h3>\n<p>The challenges here are nothing new. Stand up those of us who have sent at least one email to the wrong person? Not too many people left seated I am guessing! How many firms have innocently sent completion money to the wrong firm or client? Too many, but both of these cyber breaches are generally down to human error.<\/p>\n<p>Feedback from research reported in \u201c<a href=\"http:\/\/bit.ly\/1Try7ZV\">The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats<\/a>\u201d, conducted by Ponemon Institute LLC, in January 2016, reinforces the global picture of the source of risks. Conclusions here apply as much to law firms (with confidential client and transaction data and routine financial transactions at risk) as to other data-sensitive business sectors like banking.<\/p>\n<p>1) Employees and negligence are the leading cause of security incidents but remain the least reported issue. According to research reported in the 2015 Experian Annual Data Breach Industry Forecast, this represented 59 per cent of security incidents in the last year. They conclude that policies and processes to prevent cyber breaches are still not taken seriously enough and that employee training programs to support them have not been high enough on the agenda, suggesting that this will continue to be a source of future breaches.<\/p>\n<p>2) Persistent attacks have the second greatest impact. They are less likely to occur, but frequency is certainly increasing for law firms. Do you have tools to help identify attempts to breach your security?<\/p>\n<p>3) Third-party glitches in software are common but are not perceived as likely to have the highest impact on cyber resiliency. How extensively are your software applications scrutinised for frailties here? To test apps for common vulnerabilities, check out resources like, for example <a href=\"http:\/\/www.owasp.org\">www.owasp.org<\/a>.<\/p>\n<h3>Cyber security in the cloud<\/h3>\n<p>One particular area worth exploring in law firms relates to risks around the increasingly routine use of hosted and cloud-based IT applications. We are keen to help law firms adopt the cloud as they can significantly improve and streamline lawyers\u2019 access to and use of information to help manage and process their work. However, they should only be used if security can be assured.<\/p>\n<p>This warning from the head of a major supplier of cloud-based solutions for law firms in the UK reflects the concerns we hear in the sector: that lawyers just haven\u2019t been paying enough attention to the risks:<\/p>\n<p>\u201cFor law firms, the challenge is that they are trying to weigh up the costs of implementing solutions against the perceived threat and the value the firm will receive. This is difficult for partners to understand, so decisions don\u2019t get made. However, one breach could bring down the whole firm. One of the big areas of concern in my opinion is the education of staff and their understanding of security not only in terms of IT security, but also for Professional Indemnity Insurance \u2013 it is a long road but the journey really does need to start.\u201d<\/p>\n<p>Most firms use some hosted or cloud services, but not many evaluate (and then minimise) the risks involved in using these applications \u2026 all of which we are keen to get lawyers using. Examples of hosted and cloud applications now used routinely in legal practices include business Intelligence, conveyancing searches, online case management, online CRM, web content management systems, VoIP for telephone systems, online HR, performance management, DropBox and online document management extending to fully hosted practice management systems.<\/p>\n<p>Convincing recent research reported in \u201c<a href=\"http:\/\/bit.ly\/1T2bDSc\">Cloud Security Temperature Check: A question of visibility, governance and management<\/a>\u201d a Freeform Dynamics Inside Track Research Note, May 2015 confirms key risks as:<\/p>\n<ul>\n<li>IT teams are not involved early enough to assess security before lawyers start using a cloud service.<\/li>\n<li>Lack of understanding of cyber security issues at top management level \u2013 and by users.<\/li>\n<li>The IT team often don\u2019t even know what users are using, so there is no overall control.<\/li>\n<li>Passwords are shared routinely and treated frivolously.<\/li>\n<li>Policies and procedures are not in place.<\/li>\n<li>IT teams lack the software to monitor usage anyway.<\/li>\n<\/ul>\n<h3>Making it happen<\/h3>\n<p>The first priority is to ensure that the leaders of the business recognise the risks of potential breaches of information security and take those risks seriously. This requires them to set the tone and to take a lead as advocates for discipline in managing information, which they must practice too.<\/p>\n<p>They must deal themselves in; and then introduce the following steps.<\/p>\n<p>1) Plan and prepare for an incident. To contribute to that, evaluate potential for breaches \u2013 confidentiality, integrity, or availability (but apply to on-premise too)<br \/>\n2) Make all your people (including senior management) aware of the dangers involved and then commit to addressing the risks. Give them clear pictures of how they can get it wrong and what they can to do get it right.<\/p>\n<p>3) Give one function or department within the firm responsibility for ensuring resilience. Within that, enable efficient and effective back up procedures and business continuity.<\/p>\n<p>4) Train key people to understand, communicate and police the risks<\/p>\n<p>5) Develop collaboration between teams to ensure good practice is applied widely<\/p>\n<p>6) Know what data is in the Cloud, identify the sensitivity (personal data, price sensitive data etc.) and evaluate risks<\/p>\n<p>7) Establish clear policies on mobile device and communications as technologies that enable control over insecure mobile devices (including BYOD) are critical security hazards. Indeed, it has been said that \u201cthe risks are \u2026 wherever your people are.\u201d<\/p>\n<p>8) Carry out challenging penetration and vulnerability testing.<\/p>\n<p>9) Improve, monitor and enforce routine operations that impact. For example: protect passwords and require effective updates; use https, encrypt data, emails and attachments; and only notify passwords by SMS or letter.<\/p>\n<p>10) Consider formalising systems by implementing <a href=\"http:\/\/bit.ly\/1rxXhjn\">ISO27001<\/a>. A good start would be to buy a copy of the standard itself to see what compliance entails. It would also give good guidance on what steps you should take and whether or not you intend to go for formal certification.<\/p>\n<p><em>Allan Carton is Managing Director at <a href=\"http:\/\/www.inpractice.co.uk\">Inpractice<\/a>, advising lawyers on client-led initiatives to introduce IT to develop the business. Email <a href=\"mailto:acarton@inpractice.co.uk\">acarton@inpractice.co.uk<\/a>. Twitter @<a href=\"https:\/\/twitter.com\/AllanCarton\">AllanCarton<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then can a legal practice develop and deliver new IT-supported service propositions that can add significant value to services for clients, introducers and business partners. The need [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[133],"tags":[],"class_list":["post-3484","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>10 steps to becoming cyber resilient - Internet for Lawyers Newsletter<\/title>\r\n<meta name=\"description\" content=\"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"10 steps to becoming cyber resilient - Internet for Lawyers Newsletter\" \/>\r\n<meta property=\"og:description\" content=\"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Internet for Lawyers Newsletter\" \/>\r\n<meta property=\"article:published_time\" content=\"2016-05-16T08:18:18+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg\" \/>\r\n<meta name=\"author\" content=\"Allan Carton\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@nickholmes\" \/>\r\n<meta name=\"twitter:site\" content=\"@nickholmes\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Allan Carton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/\",\"name\":\"10 steps to becoming cyber resilient - Internet for Lawyers Newsletter\",\"isPartOf\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg\",\"datePublished\":\"2016-05-16T08:18:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/d0bbc41767bd11ce46dc60421d6a8a52\"},\"description\":\"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg\",\"contentUrl\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg\",\"width\":849,\"height\":565},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infolaw.co.uk\/newsletter\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 steps to becoming cyber resilient\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#website\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/\",\"name\":\"Internet for Lawyers Newsletter\",\"description\":\"Edited by Nick Holmes\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infolaw.co.uk\/newsletter\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/d0bbc41767bd11ce46dc60421d6a8a52\",\"name\":\"Allan Carton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/75f51d1b3de2d7cbdaf8b5dfc011c45c3d7528d2b6ea9c54bf82058fce0fb8b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/75f51d1b3de2d7cbdaf8b5dfc011c45c3d7528d2b6ea9c54bf82058fce0fb8b0?s=96&d=mm&r=g\",\"caption\":\"Allan Carton\"},\"description\":\"Allan Carton is a Director at Carton &amp; Co. He is a specialist advisor to professional practices who works with management teams to help businesses develop and deliver better value propositions for clients. Email acarton@cartonconsultants.com. Twitter @AllanCarton.\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/author\/allancarton\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 steps to becoming cyber resilient - Internet for Lawyers Newsletter","description":"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/","og_locale":"en_GB","og_type":"article","og_title":"10 steps to becoming cyber resilient - Internet for Lawyers Newsletter","og_description":"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then","og_url":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/","og_site_name":"Internet for Lawyers Newsletter","article_published_time":"2016-05-16T08:18:18+00:00","og_image":[{"url":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg","type":"","width":"","height":""}],"author":"Allan Carton","twitter_card":"summary_large_image","twitter_creator":"@nickholmes","twitter_site":"@nickholmes","twitter_misc":{"Written by":"Allan Carton","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/","url":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/","name":"10 steps to becoming cyber resilient - Internet for Lawyers Newsletter","isPartOf":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage"},"image":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg","datePublished":"2016-05-16T08:18:18+00:00","author":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/d0bbc41767bd11ce46dc60421d6a8a52"},"description":"Most legal practices have yet to get to grips with the idea of \u201ccyber resilience\u201d but it is a strength that they urgently need to acquire now. Only then","breadcrumb":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#primaryimage","url":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg","contentUrl":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2016\/05\/Shocked-Girl-Cyber-Crime.jpg","width":849,"height":565},{"@type":"BreadcrumbList","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2016\/05\/10-steps-to-becoming-cyber-resilient\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infolaw.co.uk\/newsletter\/"},{"@type":"ListItem","position":2,"name":"10 steps to becoming cyber resilient"}]},{"@type":"WebSite","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#website","url":"https:\/\/www.infolaw.co.uk\/newsletter\/","name":"Internet for Lawyers Newsletter","description":"Edited by Nick Holmes","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infolaw.co.uk\/newsletter\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/d0bbc41767bd11ce46dc60421d6a8a52","name":"Allan Carton","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/75f51d1b3de2d7cbdaf8b5dfc011c45c3d7528d2b6ea9c54bf82058fce0fb8b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/75f51d1b3de2d7cbdaf8b5dfc011c45c3d7528d2b6ea9c54bf82058fce0fb8b0?s=96&d=mm&r=g","caption":"Allan Carton"},"description":"Allan Carton is a Director at Carton &amp; Co. He is a specialist advisor to professional practices who works with management teams to help businesses develop and deliver better value propositions for clients. Email acarton@cartonconsultants.com. Twitter @AllanCarton.","url":"https:\/\/www.infolaw.co.uk\/newsletter\/author\/allancarton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/3484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/comments?post=3484"}],"version-history":[{"count":6,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/3484\/revisions"}],"predecessor-version":[{"id":3528,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/3484\/revisions\/3528"}],"wp:attachment":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/media?parent=3484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/categories?post=3484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/tags?post=3484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}