{"id":2667,"date":"2025-11-12T11:27:37","date_gmt":"2025-11-12T11:27:37","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/uncategorized\/untagged\/how-the-healthcare-industry-can-fight-cybercrime\/"},"modified":"2026-02-10T15:54:44","modified_gmt":"2026-02-10T15:54:44","slug":"how-the-healthcare-industry-can-fight-cybercrime","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/","title":{"rendered":"How The Healthcare Industry Could Combat Cyber Risks"},"content":{"rendered":"<p><strong>The <a href=\"https:\/\/amtivo.com\/uk\/sectors\/healthcare\/\" rel=\"noopener\">healthcare sector<\/a> continues to be a prime target for cyber attacks, and it\u2019s easy to see why.<\/strong><\/p>\r\n<p>The fundamental issue is that healthcare is hugely data-intensive, which results in an \u2018attack surface\u2019 that is both vast and constantly growing as medical monitoring expands.<\/p>\r\n<p>Additionally, existing vulnerabilities such as outdated equipment and a lack of experienced cyber security staff exacerbate risks.<\/p>\r\n<p>With patient demand consistently high and systems under pressure, any disruption can have serious consequences. For ransomware groups, that makes healthcare a high-leverage target. In the worst-case scenario, a network outage could put lives at risk. This is a pressure point that attackers believe increases the chances of a quick payout, before backups can be restored.<\/p>\r\n<p>The targeting of healthcare has a long history. In October 2016, <a href=\"https:\/\/www.nao.org.uk\/wp-content\/uploads\/2017\/10\/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf\" target=\"_blank\" rel=\"noopener\">Northern Lincolnshire and Goole NHS Foundation Trust was hit by ransomware<\/a> \u2013 an early NHS case \u2013 forcing the cancellation of 2,800 appointments.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>The Scale of Cyber Attacks<\/h2>\r\n<p>The scale of cyber attacks on the NHS has continued to intensify.<\/p>\r\n<p>One of the most well-known attacks is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\" rel=\"noopener\">WannaCry ransomware attack<\/a> in 2017, which caused major disruption to hospitals around the world. While not aimed specifically at healthcare, WannaCry showed that large-scale, damaging attacks were possible.<\/p>\r\n<p>The <a href=\"https:\/\/www.england.nhs.uk\/london\/synnovis-ransomware-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">Synnovis ransomware attack<\/a> in June 2024 led to the <a href=\"https:\/\/www.digitalhealth.net\/2025\/01\/synnovis-attack-led-to-at-least-two-cases-of-severe-patient-harm\/\" target=\"_blank\" rel=\"noopener\">postponement of over 10,000 outpatient appointments<\/a> and more than 1,700 elective procedures at London hospitals and resulted in at least two cases of long-term or permanent patient harm.<\/p>\r\n<p>Other cyber attacks have followed, <a href=\"https:\/\/news.sky.com\/story\/nhs-trusts-data-stolen-in-cyberattack-13372770\" target=\"_blank\" rel=\"noopener\">including an incident in May 2025<\/a> when cyber criminals targeted University College London Hospitals NHS Foundation Trust and University Hospital Southampton NHS Foundation Trust. The attack exploited a software vulnerability and led to the theft of NHS data, raising concerns about potential unauthorised access to sensitive patient records.<\/p>\r\n<p>With ransomware in particular a persistent threat to the NHS, senior cyber security leaders from the UK government and NHS have urged technology suppliers\u2019 chief executives to publicly commit to strong security practices by signing <a href=\"https:\/\/digital.nhs.uk\/cyber-and-data-security\/guidance-and-assurance\/cyber-security-charter-for-suppliers-to-the-nhs\/letter-to-ceos-of-suppliers-to-the-nhs?key=8YM7KIaJ934oy55f6ehmKYxSwPYJSLfxa4UjZXg3SOZwGs0au9HfpB4w9dL5PTzd](https:\/\/digital.nhs.uk\/cyber-and-data-security\/guidance-and-assurance\/cyber-security-charter-for-suppliers-to-the-nhs\/letter-to-ceos-of-suppliers-to-the-nhs?key=8YM7KIaJ934oy55f6ehmKYxSwPYJSLfxa4UjZXg3SOZwGs0au9HfpB4w9dL5PTzd\" target=\"_blank\" rel=\"noopener\">a new cyber security charter<\/a> \u2013 a key step in improving security for the healthcare industry.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Cyber Criminals Targeting Healthcare<\/h2>\r\n<p>The WannaCry attack in particular arrived at a time when the sector was already struggling to control widespread data breaches involving large volumes of Personal Health Information (PHI). This type of data remains attractive to cyber criminals for several reasons:<\/p>\r\n<ul>\r\n\t<li>Medical identities and records are the most financially valuable type of personally identifiable information (PII), selling for high prices on dark web markets where they are used to launch sophisticated identity theft.<\/li>\r\n\t<li>An especially high value is attached to the PHI of celebrities and politicians.<\/li>\r\n\t<li>The threat to release data stolen during a ransomware attack is now routinely used to drive up the price of extortion ransoms.<\/li>\r\n<\/ul>\r\n<p>The extensive data generated by healthcare continues to expand the &#8216;attack surface,&#8217; making it a persistent target. According to the UK government\u2019s <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noopener\">Cyber Security Breaches Survey 2025<\/a>, over 40% of health and care organisations reported experiencing a cyber security breach or attack in the past year, with larger organisations facing even higher rates. PHI files can be exposed by human error, equipment misconfiguration, a software vulnerability in medical equipment and IT systems, or theft by insiders.<\/p>\r\n<p>Healthcare organisations also make extensive use of third party and agency workers, which makes oversight harder and increases the chances of credential sharing and errors. Then there are established weaknesses such as migrating from insecure legacy equipment, a lack of experienced cyber security staff, under-investment in security, and dependence on equipment that has not been thoroughly tested for security issues.<\/p>\r\n<p>In 2024 and 2025, NHS Digital issued regular <a href=\"https:\/\/digital.nhs.uk\/cyber-alerts\/year\/2025\" target=\"_blank\" rel=\"noopener\">cyber alerts<\/a> on new vulnerabilities affecting NHS systems \u2013 including critical updates for widely used software and medical devices \u2013 to help trusts and suppliers respond to the evolving threat landscape.<\/p>\r\n<p>The UK government is also responding with the <a href=\"https:\/\/www.digitalhealth.net\/2025\/04\/nhs-suppliers-required-to-meet-robust-measures-under-cyber-bill\/\" target=\"_blank\" rel=\"noopener\">planned Cyber Security and Resilience Bill<\/a>, expected to be introduced to Parliament in 2025.<\/p>\r\n<p>The Bill is intended to raise baseline cyber resilience across critical services, including health. It is expected to strengthen and expand the UK\u2019s NIS framework, introduce clearer and more consistent incident\u2011reporting duties, and give regulators sharper enforcement powers and penalties.<\/p>\r\n<p>For the NHS and its suppliers, expect NCSC CAF\u2011aligned minimum standards, tougher supplier assurance, and stricter logging, MFA, vulnerability management, and patching \u2013 protecting patient data and continuity of care.<\/p>\r\n<p>Some NHS suppliers are <a href=\"https:\/\/www.supplychain.nhs.uk\/news-article\/cyber-security-expectations-of-suppliers\/#:~:text=A%20supplier%20will%20need%20to%20demonstrate%20Cyber,or%20digital%20products%20and%20services%20are%20supplied.\" target=\"_blank\" rel=\"noopener\">required to demonstrate Cyber Essentials Plus compliance<\/a>.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials-plus\/certification\/\" rel=\"noopener\">Discover more about Cyber Essentials Plus.<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>New Medical Devices and Cyber Security<\/h2>\r\n<p>Healthcare is experiencing a major expansion in medical data collection as a bewildering array of new types of monitoring devices \u2013 such as wearable heart rate monitors, glucose sensors, or smart inhalers \u2013 are handed out to patients. Many of these first-generation devices have proven immature in security terms, often in ways that take specialised testing to uncover.<\/p>\r\n<p>Everyone agrees that these sorts of checks should be carried out during development and that patients and healthcare providers should not become unwitting beta testers. The influence of such medical devices will undoubtedly spur a demand by patients to access their own electronic health records (EHRs), something many healthcare providers are not yet able to offer in a secure way.<\/p>\r\n<p>The increasing use of digital health records in the NHS has expanded the attack surface, with legacy technology and isolated data systems <a href=\"https:\/\/newsroom.bt.com\/research-reveals-nhs-cyber-security-perceptions\/\" target=\"_blank\" rel=\"noopener\">cited by 64% of NHS staff<\/a> as a barrier to safe, efficient care.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Resilience Against Cyber Crime<\/h2>\r\n<p>In theory, access control offers a solution, particularly as part of an approach that considers a broader <a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/what-is-an-information-security-management-system-isms\/\" rel=\"noopener\">Information Security Management System (ISMS)<\/a>. While undoubtedly true, healthcare organisations should first analyse their current weaknesses.<\/p>\r\n<p>The <a href=\"https:\/\/health-isac.org\/wp-content\/uploads\/Health-ISAC_2025-Annual-Threat-Report.pdf\" target=\"_blank\" rel=\"noopener\">Health-ISAC 2025 Health Sector Cyber Threat Landscape report<\/a> warns that compromised credentials \u2013 often the result of phishing or poor account hygiene \u2013 remain a leading cause of healthcare breaches, allowing attackers to bypass access controls and move laterally within networks.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/cyber-security-trends\/\" rel=\"noopener\">Read the latest news about cyber security trends.<\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Getting the Basics Right<\/h2>\r\n<p>It\u2019s often the simple things that get lost. For example:<\/p>\r\n<ul>\r\n\t<li>Mandating email security standards such as <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/email-security-and-anti-spoofing\" target=\"_blank\" rel=\"noopener\">Domain-based Message Authentication (DMARC)<\/a> makes it much harder for attacks to spoof email addresses to impersonate genuine contacts.<\/li>\r\n\t<li>Email accounts should be protected not only with rigorous password policies but also by using <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/multi-factor-authentication-online-services\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a> by default for all accounts.<\/li>\r\n\t<li>Access control on data needs to consider the possibility of internal misuse \u2013 another blind spot many healthcare organisations assume is a secondary concern.<\/li>\r\n\t<li>Third-party agencies must be included in any overhaul of data governance with assurance to ensure standards are being met.<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<h2>A Comprehensive Approach<\/h2>\r\n<p>Despite these, organisations only get so far. A comprehensive approach to cyber security in the healthcare industry must also take account of human behaviour, using technical controls as baselines backed up with a long-term commitment to user training to resist common attacks.<\/p>\r\n<p>Many breaches start with relatively simple social engineering and phishing attacks that often go undetected until it is too late. Defending against such attacks requires more than user training and awareness, but without that as a starting point, it is unlikely to succeed.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Clear Roles and Processes<\/h2>\r\n<p>Large-scale cyber security reforms are often slow to happen because they represent a change in culture, which humans resist. Designing a new culture is never straightforward.<\/p>\r\n<p>Organisational complexity doesn\u2019t help \u2013 sometimes even knowing whose job it is to implement certain policies, let alone checking that they have been implemented correctly, can turn into a barrier.<\/p>\r\n<p>As healthcare regulation and governance standards evolve, the sector has begun to recognise the scale of the institutional challenge.<\/p>\r\n<p>Healthcare was built to support patients with physical health needs. Today, that responsibility extends to protecting the confidentiality of their digital information and defending against the growing threat of cyber crime.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Help Protect Your Organisation From Cyber Crime<\/h2>\r\n<p>British Assessment Bureau offers a variety of services to help organisations prepare and protect themselves from the consequences of cyber crime.<\/p>\r\n<p>From <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/training\/\" rel=\"noopener\">training staff on how to spot and avoid cyber security risks<\/a> to formal cyber security certification, such as <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/certification\/\" rel=\"noopener\">Cyber Essentials<\/a>, <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials-plus\/certification\/\" rel=\"noopener\">Cyber Essentials Plus<\/a> and <a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/certification\/\" rel=\"noopener\">ISO 27001<\/a>.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/uk\/contact-us\/\" rel=\"noopener\">Contact our expert team today<\/a> to find out more, or <a href=\"https:\/\/amtivo.com\/uk\/certification-quote\/\" rel=\"noopener\">get a quote<\/a> for your business.<\/p>\r\n<p>British Assessment Bureau provides Cyber Essentials and Cyber Essentials Plus services via our sister company, <a href=\"https:\/\/ascentor.co.uk\/\" target=\"_blank\" rel=\"noopener\">Ascentor<\/a>, part of the Amtivo group.<\/p>","protected":false},"excerpt":{"rendered":"How healthcare fights cyber threats using encryption, training, and risk assessments to protect patient data.","protected":false},"author":24,"featured_media":2170,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-2667","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Crime - How The Healthcare Industry Can Combat Risks<\/title>\n<meta name=\"description\" content=\"Learn how the healthcare industry tackles cybercrime with robust cybersecurity and network security management to protect systems, data, and patients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How The Healthcare Industry Could Combat Cyber Risks\" \/>\n<meta property=\"og:description\" content=\"Learn how the healthcare industry tackles cybercrime with robust cybersecurity and network security management to protect systems, data, and patients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T15:54:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/08\/How-the-healthcare-industry-can-fight-cybercrime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Crime - How The Healthcare Industry Can Combat Risks","description":"Learn how the healthcare industry tackles cybercrime with robust cybersecurity and network security management to protect systems, data, and patients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/","og_locale":"en_GB","og_type":"article","og_title":"How The Healthcare Industry Could Combat Cyber Risks","og_description":"Learn how the healthcare industry tackles cybercrime with robust cybersecurity and network security management to protect systems, data, and patients.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/","og_site_name":"Amtivo UK","article_modified_time":"2026-02-10T15:54:44+00:00","og_image":[{"width":480,"height":240,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/08\/How-the-healthcare-industry-can-fight-cybercrime.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/","name":"Cyber Crime - How The Healthcare Industry Can Combat Risks","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/08\/How-the-healthcare-industry-can-fight-cybercrime.jpg","datePublished":"2025-11-12T11:27:37+00:00","dateModified":"2026-02-10T15:54:44+00:00","description":"Learn how the healthcare industry tackles cybercrime with robust cybersecurity and network security management to protect systems, data, and patients.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/08\/How-the-healthcare-industry-can-fight-cybercrime.jpg","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/08\/How-the-healthcare-industry-can-fight-cybercrime.jpg","width":480,"height":240,"caption":"How the healthcare industry can fight cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-the-healthcare-industry-can-fight-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"How The Healthcare Industry Could Combat Cyber Risks"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":13,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2667\/revisions"}],"predecessor-version":[{"id":10929,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2667\/revisions\/10929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/2170"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=2667"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=2667"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=2667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}