{"id":6267,"date":"2025-08-20T15:07:32","date_gmt":"2025-08-20T14:07:32","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/are-data-breaches-becoming-more-common\/"},"modified":"2025-12-18T13:32:48","modified_gmt":"2025-12-18T13:32:48","slug":"are-data-breaches-becoming-more-common","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/","title":{"rendered":"Understanding Data Breach Causes &amp; Response Strategies"},"content":{"rendered":"<p><em>The number of data breaches has risen in recent years. Some of the most high profile cases in recent times include the <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cwykgrv374eo\" target=\"_blank\" rel=\"noopener\">Marks &amp; Spencer 2025 breach<\/a> that saw hackers access a large amount of customer data and cause the business to halt its online retail options for over a month. The <a href=\"https:\/\/www.gov.uk\/government\/news\/legal-aid-agency-data-breach\" target=\"_blank\" rel=\"noopener\">Legal Aid Agency<\/a> also suffered a data breach in April 2025, which is comprised of personal, financial, and legal data from 2010 onwards.<\/em><\/p>\r\n<p>Data breaches are becoming so common that tools are being built for individuals to check if their information has been compromised. But what exactly is a data breach, how do they occur, and why are they becoming more frequent?<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Is a Data Breach?<\/h2>\r\n<p>A data breach occurs when an unauthorised party manages to access an organisation&#8217;s protected, sensitive or confidential data. This might not always involve stealing the data; in some cases, it can be simply copied or viewed. A breach typically involves three stages:<\/p>\r\n<ol>\r\n\t<li><strong>Probing:<\/strong> The unauthorised party identifies vulnerabilities in an organisation\u2019s security system. Weak passwords and password sharing are common forms of human error that can lead to breaches.<\/li>\r\n\t<li><strong>Penetration:<\/strong> Next, the unauthorised party enters the organisation\u2019s network using one of the vulnerabilities they have discovered. Often, this occurs due to inadequate security measures on routers and other connection devices. Staff could also be exploited or manipulated into providing access using a number of tactics, including extortion.<\/li>\r\n\t<li><strong>Extraction:<\/strong> The final stage is for the criminals to extract the organisation\u2019s data, either digitally or by manually copying it.<\/li>\r\n<\/ol>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Constitutes a Data Breach Under UK GDPR?<\/h2>\r\n<p>A breach is any incident impacting the confidentiality, integrity, or availability of personal data. Under <a href=\"https:\/\/www.legislation.gov.uk\/eur\/2016\/679\/contents\" target=\"_blank\" rel=\"noopener\">UK GDPR<\/a>, all businesses are required to implement appropriate technical and organisational measures to protect personal data. Breaches can be catastrophic for businesses. The theft of company data can lead to crimes such as identity theft, particularly when customer data &#8211; including credit card numbers &#8211; is the subject of the breach. Or corporate espionage, where valuable plans, designs, or types of other intellectual property are accessed. \u00a0<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Types of Data Breaches<\/h2>\r\n<h3><strong>External breaches<\/strong><\/h3>\r\n<p>These are often associated with cyber attacks such as phishing and ransomware, which are among the most common methods used to gain unauthorised access to data from outside an organisation Attackers can exploit third-party services, suppliers, or platforms used by an organisation or its employees. In 2024, a study found that nearly <a href=\"https:\/\/www.independent.co.uk\/news\/uk\/politics\/mps-dark-web-data-leak-b2554623.html\" target=\"_blank\" rel=\"noopener\">450 Members of Parliament had had their personal information exposed<\/a> on the dark web after being exposed through hacks, breaches of third-party services, or other compromise methods, rather than direct attacks on Parliament\u2019s own IT systems.<\/p>\r\n<h3><strong>Internal breaches<\/strong><\/h3>\r\n<p>Internal breaches occur as a result of staff errors or unauthorised internal access. Employees may unknowingly or deliberately access data they are not permitted to see or alter. In some cases, authorised individuals misuse their power to access data and share it with criminals.<\/p>\r\n<h3><strong>Negligence or theft<\/strong><\/h3>\r\n<p>Breaches can occur if a device is left unattended, stolen, or if confidential documents are not secured. If unauthorised individuals access these items, company data can be exposed.<\/p>\r\n<h3><strong>System failures<\/strong><\/h3>\r\n<p>System failures can also result in data breaches. Glitches or failures within systems can unintentionally allow unauthorised access, compromising the security of sensitive information. \u00a0<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>How Do Data Breaches Occur?<\/h2>\r\n<p>According to the <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noopener\">UK Government\u2019s Cyber Security Breaches Survey 2025<\/a> and the <a href=\"https:\/\/ico.org.uk\/action-weve-taken\/complaints-and-concerns-data-sets\/data-security-incident-trends\/\" target=\"_blank\" rel=\"noopener\">Information Commissioner\u2019s Office<\/a> (ICO), the most common ways breaches occur are:<\/p>\r\n<h3><strong>Physical actions<\/strong><\/h3>\r\n<p>Loss or theft of laptops, USB drives, or paperwork containing sensitive data. This can occur if individuals are careless with company data, or after the theft of paperwork or an employee&#8217;s laptop.<\/p>\r\n<h3><strong>Privilege problems<\/strong><\/h3>\r\n<p>Incidents where staff access or share data without proper authorisation. These breaches can happen either accidentally or deliberately. It can also occur when authorised individuals abuse their power to access data and pass it on to criminals.<\/p>\r\n<h3><strong>Social engineering<\/strong><\/h3>\r\n<p>Increasingly, attacks are coming from criminals pretending to be banks, clients, auditing agencies, or even the police. This kind of trick uses the trust of workers to gain entry to networks. It also concerns <a href=\"\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/\" rel=\"noopener\">email and other electronic communications scams such as phishing<\/a>, where people pretend to be a provider that the organisation already uses.<\/p>\r\n<h3><strong>Human error<\/strong><\/h3>\r\n<p>Mistakes such as sending data to the wrong recipient, misconfiguring systems, or using weak passwords can all be down to human error. No matter how many preventative measures are put in place, businesses still suffer from people making mistakes, often unwittingly.<\/p>\r\n<h3><strong>Malware and ransomware<\/strong><\/h3>\r\n<p>Malware attacks use malicious software to steal or lock data, and the internet is full of bots and spyware that can access networks with little-to-no human help. Ransomware has become a popular type of malware, blocking access to data or systems and demanding payment to restore it. Most of these breaches are carried out by hackers or organised cyber criminal groups. They use a mix of technical exploits, malware, and social engineering to gain unauthorised access to sensitive information. Once inside, they can cause serious disruption and damage. The causes of data breaches can be grouped into the three main categories:<\/p>\r\n<table class=\"dcf-table dcf-table-responsive dcf-table-bordered dcf-table-striped dcf-w-100%\" style=\"font-family: Montserrat;\">\r\n<thead>\r\n<tr>\r\n<th scope=\"col\"><span><strong>Category<\/strong><\/span><\/th>\r\n<th scope=\"col\"><span><strong>Specific Causes<\/strong><\/span><\/th>\r\n<th scope=\"col\"><span><strong>Examples<\/strong><\/span><\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">Malicious, Intentional, or Criminal<\/th>\r\n<td data-label=\"Specific Causes\">\r\n<ul>\r\n\t<li>Phishing and social engineering<\/li>\r\n\t<li>Malware and ransomware<\/li>\r\n\t<li>External hacking or unauthorised access<\/li>\r\n\t<li>Deliberate privilege misuse<\/li>\r\n\t<li>Attacks via third-party suppliers<\/li>\r\n<\/ul>\r\n<\/td>\r\n<td data-label=\"Examples\">\r\n<ul>\r\n\t<li>Phishing emails trick employees into revealing credentials<\/li>\r\n\t<li>Ransomware attacks<\/li>\r\n\t<li>Hackers exploiting vulnerabilities<\/li>\r\n\t<li>Employees deliberately leaking data<\/li>\r\n\t<li>Breaches via compromised suppliers<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">System Glitches<\/th>\r\n<td data-label=\"Specific Causes\">\r\n<ul>\r\n\t<li>System failures<\/li>\r\n\t<li>Software bugs<\/li>\r\n\t<li>Misconfigured databases or cloud services<\/li>\r\n<\/ul>\r\n<\/td>\r\n<td data-label=\"Examples\">\r\n<ul>\r\n\t<li>Database misconfiguration exposing records<\/li>\r\n\t<li>Glitches allowing unauthorised access<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Human Error<\/th>\r\n<td data-label=\"Specific Causes\">\r\n<ul>\r\n\t<li>Accidental data sharing<\/li>\r\n\t<li>Sending data to the wrong recipient<\/li>\r\n\t<li>Losing devices or paperwork<\/li>\r\n\t<li>Weak passwords<\/li>\r\n\t<li>Inadvertent privilege misuse<\/li>\r\n<\/ul>\r\n<\/td>\r\n<td data-label=\"Examples\">\r\n<ul>\r\n\t<li>Employees emailing sensitive data to the wrong person<\/li>\r\n\t<li>Leaving laptops or paperwork unsecured<\/li>\r\n\t<li>Using weak passwords<\/li>\r\n\t<li>Employees accidentally accessing or sharing data they shouldn\u2019t<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2>\u00a0<\/h2>\r\n<h2>Trends and Statistics<\/h2>\r\n<p>As technology has advanced and become more crucial to daily operations, the number of data breaches is significant. In 2024, <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025#:~:text=Identification%20of%20cyber%20security%20breaches,medium%20and%2075%25%20large).\" target=\"_blank\" rel=\"noopener\">43% of all UK businesses<\/a> and 30% of charities reported having experienced any kind of cyber security breach or attack in the last 12 months. While this is a slight drop from the previous year, the prevalence of cyber breaches and attacks in medium and large businesses remains high.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Why Are Data Breaches So Common?<\/h2>\r\n<p>The frequency of data breaches could be driven by several factors. The increasing sophistication of cyber criminals plays a significant role, as they continually develop new methods to exploit vulnerabilities. The growing reliance on digital data storage further exacerbates this issue, providing more targets for potential attacks. Human error also remains a persistent factor, with mistakes such as weak passwords and improper data handling creating opportunities for breaches. The expansion of internet-connected devices and remote working has broadened the attack surface over recent years, making it easier for unauthorised parties to gain access to sensitive information. AI is also enhancing criminal activities \u2013 <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/cyber-security-trends\/\" rel=\"noopener\">read about the latest cyber security trends.<\/a> \u00a0<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Are the Consequences of a Data Breach for UK Businesses?<\/h2>\r\n<p>The effects of a data breach are typically damaging for the organisation concerned. Firstly, under the Data Protection Act 2018 and UK GDPR, <a href=\"https:\/\/ico.org.uk\/for-organisations\/law-enforcement\/guide-to-le-processing\/penalties\/\" target=\"_blank\" rel=\"noopener\">the ICO can fine you<\/a> \u2013 the maximum penalty is \u00a317.5 million or 4% of annual global turnover, whichever is higher. When the dust has settled on the fine, the next problem is the reputational damage caused by the breach. Even if the breach is incredibly complex, the perception amongst the public could be that the breached organisation has weak security and inadequate countermeasures. Customers may move away from a business that cannot keep their data safe to avoid the risk of confidential information like addresses and health records being made public. If the bank records and credit card numbers of customers are stolen, then these individuals will have to take rapid action to avoid identity theft, which could destroy any relationship with the organisation.<\/p>\r\n<h3><strong>What do I do if there is a breach?<\/strong><\/h3>\r\n<p>If your organisation has suffered a data breach, there are steps you urgently need to take to protect your customers and your business. Under the UK GDPR and <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\" target=\"_blank\" rel=\"noopener\">Data Protection Act 2018<\/a>, organisations must <a href=\"https:\/\/ico.org.uk\/for-organisations\/report-a-breach\/\" target=\"_blank\" rel=\"noopener\">report personal data breaches<\/a> that pose a risk to individuals to the ICO, typically within 72 hours. <a href=\"\/uk\/standards\/iso-27001\/certification\/\" rel=\"noopener\">ISO 27001<\/a> certification provides a set of requirements for businesses to meet to help manage data breaches efficiently, particularly in complying with UK GDPR. <a href=\"\/uk\/standards\/cyber-essentials\/insights\/when-to-report-a-data-breach-to-the-ico\/\" rel=\"noopener\">Read about when to report a breach to the ICO<\/a> \u00a0<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>How Can ISO Certification Help With Data Breaches?<\/h2>\r\n<p>For organisations looking to enhance their data security, a variety of certifications could help. <a href=\"\/uk\/standards\/cyber-essentials\/\" rel=\"noopener\">Cyber Essentials<\/a> helps businesses protect themselves against common cyber threats, while <a href=\"\/uk\/standards\/cyber-essentials-plus\/\" rel=\"noopener\">Cyber Essentials Plus<\/a> offers hands-on technical verification. Both are backed by the UK Government. <a href=\"\/uk\/standards\/iso-27001\/certification\/\" rel=\"noopener\">ISO 27001<\/a> helps businesses to establish a comprehensive <a href=\"\/uk\/standards\/iso-27001\/insights\/what-is-an-information-security-management-system-isms\/\" rel=\"noopener\">Information Security Management System (ISMS)<\/a> to manage information security risks and structured responses. Adopting these certifications and their requirements can significantly enhance an organisation\u2019s ability to handle data securely and mitigate the risk of breaches. <a href=\"\/uk\/certification-quote\/\" rel=\"noopener\">Get a quote<\/a> for your business or <a href=\"\/uk\/contact-us\/\" rel=\"noopener\">contact our expert team<\/a> for more information about how certification can support your organisation.<\/p>","protected":false},"excerpt":{"rendered":"Protect your organisation and customers from data breaches. Discover breaches happen and why they are on the rise.","protected":false},"author":24,"featured_media":6268,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[91],"class_list":["post-6267","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding Data Breach Causes &amp; Response Strategies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Data Breach Causes &amp; Response Strategies\" \/>\n<meta property=\"og:description\" content=\"Protect your organisation and customers from data breaches. Discover breaches happen and why they are on the rise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T13:32:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/data-breach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"528\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Data Breach Causes &amp; Response Strategies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/","og_locale":"en_GB","og_type":"article","og_title":"Understanding Data Breach Causes &amp; Response Strategies","og_description":"Protect your organisation and customers from data breaches. Discover breaches happen and why they are on the rise.","og_url":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-18T13:32:48+00:00","og_image":[{"width":950,"height":528,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/data-breach.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/","url":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/","name":"Understanding Data Breach Causes &amp; Response Strategies","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/data-breach.jpg","datePublished":"2025-08-20T14:07:32+00:00","dateModified":"2025-12-18T13:32:48+00:00","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/data-breach.jpg","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/data-breach.jpg","width":950,"height":528,"caption":"server array inside a data centre"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/are-data-breaches-becoming-more-common\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"ISO 27001","item":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"Understanding Data Breach Causes &amp; Response Strategies"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":7,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6267\/revisions"}],"predecessor-version":[{"id":10211,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6267\/revisions\/10211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/6268"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=6267"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=6267"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=6267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}