{"id":28469,"date":"2019-02-04T03:08:21","date_gmt":"2019-02-04T03:08:21","guid":{"rendered":"https:\/\/www.legalgeek.co\/?p=28469"},"modified":"2019-02-04T03:08:21","modified_gmt":"2019-02-04T03:08:21","slug":"5-things-you-need-to-know-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/","title":{"rendered":"5 things you need to know about Cybersecurity"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><em>This article was originally published in the 2018 Legal Geek Conference Magazine in October.\u00a0<\/em><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\" wp-image-28471 alignleft\" src=\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2018\/12\/Bryn-Norton_1000px.png\" alt=\"\" width=\"64\" height=\"67\" \/>With data breaches becoming more common, cybersecurity is as important as locking the door of\u00a0<\/span>the office. CenturyLink\u2019s Solutions Architecture and Security Director EMEA, <strong>Bryn Norton<\/strong>, believes effective cybersecurity isn\u2019t just about building ever-more intelligent anti-malware software, it\u2019s about empowering people to take responsibility.<\/p>\n<h2><b>1. What\u2019s the biggest cyber threat to big law firms?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cComplacency. In 2017, the majority of security breaches were executed against vulnerabilities that were already known to the industry well before the breach. It\u2019s a mindset of \u2018I have bought a device, I have plugged it in and therefore I am now safe\u2019 \u2013 but it\u2019s not as simple as that. You need to be cognisant of how to use it properly and how to maintain it. <a href=\"https:\/\/www.legalgeek.co\/news\/legal-geek-on-the-wannacry-global-hack\/\" target=\"_blank\" rel=\"noopener\">The WannaCry hack in 2017<\/a> demonstrates how many organisations are not adhering to very basic security measures. Two months prior to WannaCry, Microsoft released a critical patch to address the specific vulnerability, but many companies still hadn\u2019t deployed the patch and were left vulnerable. What that highlights is that people aren\u2019t always doing the basics well.\u201d<\/span><\/p>\n<div id=\"attachment_28472\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-28472\" class=\"wp-image-28472 size-medium\" src=\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2018\/12\/Centurylink-stand-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><p id=\"caption-attachment-28472\" class=\"wp-caption-text\"><em>The CenturyLink stand at the Legal Geek Conference 2018.<\/em><\/p><\/div>\n<h2><b>2. What is the greatest misconception about cybersecurity?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cThat people don\u2019t play a big role when it comes to cybersecurity, because nothing could be further from the truth. People are the weakest link in any organisation&#8217;s cybersecurity system, and therefore they are the most important. When you apply security controls to a company, you need to take employees on that journey with you. It\u2019s the responsibility of the organisation to empower staff to execute effective cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIn addition, what a lot of organisations do is buy technology and then think about making it secure \u2013 as an afterthought. But the market place is changing and GDPR is having a positive effect. For example, Article 25 shifts the emphasis to security by design, which is how every security structure should be deployed.\u201d<\/span><\/p>\n<p><a href=\"http:\/\/iframe%20src=https:\/\/giphy.com\/embed\/ubuqAjxBZ4fAY%20width=480%20height=368%20frameBorder=0%20class=giphy-embed%20allowFullScreen\/iframepa%20href=https:\/\/giphy.com\/gifs\/computer-look-ubuqAjxBZ4fAYvia%20GIPHY\/a\/p\"><iframe class=\"giphy-embed\" src=\"https:\/\/giphy.com\/embed\/ubuqAjxBZ4fAY\" width=\"480\" height=\"368\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/a><\/p>\n<p><em>Effective cybersecurity requires everyday heroes.<\/em><\/p>\n<h2><b>3. What simple things could everyone here today do to improve cybersecurity at their company?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cWhile it\u2019s important for employers to empower their staff, at the same time individuals also need to use their own initiative to ensure security standards are being met. Each employee should be conscious of how their actions could positively or negatively impact the business. It\u2019s about being mindful of what data is being used, where it is shared, and who with. Does that specific person need to receive all data, just some, or do they even need it at all? Even something as simple as a clear desk policy is effective. Also, with the majority of security breaches still occurring through phishing, enterprises must ensure staff are trained to recognise suspicious emails before opening them.\u201d<\/span><\/p>\n<p><a href=\"http:\/\/iframe%20src=https:\/\/giphy.com\/embed\/l9Jhzwdi09Ve0%20width=480%20height=366%20frameBorder=0%20class=giphy-embed%20allowFullScreen\/iframepa%20href=https:\/\/giphy.com\/gifs\/absents-l9Jhzwdi09Ve0via%20GIPHY\/a\/p\"><iframe class=\"giphy-embed\" src=\"https:\/\/giphy.com\/embed\/l9Jhzwdi09Ve0\" width=\"480\" height=\"366\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/a><\/p>\n<p><em>Even simple strategies like a clear desk policy can make a big difference<\/em><\/p>\n<h2><b>4. Is using the \u2018cloud\u2019 safe?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cCloud\u201d data is stored on third party servers that can be remotely accessed from multiple locations via the internet \u2014 as a result, there is often a perception that it is less secure than data stored on systems you own or control.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cFor example, last year it was reported that Amazon, one of the largest cloud providers, experienced a breach \u2013 but was it the fault of the cloud provider? No, it wasn\u2019t. The breach was caused by a private function being enabled by a user to become public.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThere are cloud solutions which can more securely protect data than if you store it on a server in your own environment, with advanced security features to protect sensitive information. So really, the cloud is as secure as you want to make it. However, every cloud user also needs to take responsibility for managing their data in the cloud. \u201d<\/span><\/p>\n<div id=\"attachment_29292\" style=\"width: 382px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-29292\" class=\"wp-image-29292\" src=\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2018\/12\/Shelfware.jpg\" alt=\"Shelfware\" width=\"372\" height=\"262\" \/><p id=\"caption-attachment-29292\" class=\"wp-caption-text\"><em>&#8216;Shelfware&#8217; is web slang for owning or licensing software that you don&#8217;t actually use<\/em><\/p><\/div>\n<h2><b>5. What do you predict happening in cybersecurity over the next 12 months?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u201cThere is no escaping the fact that cyberattacks are on the rise and enterprises are therefore looking at increasing investment in cybersecurity. Why? Because there are more people becoming digitally connected. Bad actors feed off this growth. The difficulty is that cybercrime presents a relatively low risk of being detected, and returns can be substantial. The entry to market is incredibly low \u2013 you don\u2019t need to be a talented coder, you just need to understand the basics and know where to download the tools required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWhat is complicating the industry\u2019s response to these increased threats is that the cybersecurity marketplace is crowded. Everyone at the Legal Geek conference could go out and buy multiple security technologies to protect themselves, however deciding what is right for your organisation can be a daunting and confusing task. As a result, what you do buy can all too often become &#8216;shelfware&#8217;, something which makes a lot of noise and provides a lot of information but isn\u2019t understood properly. Consequently this acts as a prohibitor to making good decisions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAt CenturyLink, the big thing we are looking at is how our customers can cut through the noise and understand the actionable information. This empowers people to make effective business decisions based on a strategic security policy, and on fact.\u201d<\/span><\/p>\n<p><strong><em>Centurylink is the second largest US communications provider to global enterprise customers. <\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/www.centurylink.com\/\">Keep reading about Centurylink.<\/a><\/em><\/strong><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"99WeWMHLZJ\"><p><a href=\"https:\/\/www.legalgeek.co\/conference\/\">Legal Geek Conference<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Legal Geek Conference&#8221; &#8212; Legal Geek\" src=\"https:\/\/www.legalgeek.co\/conference\/embed\/#?secret=533FtXZgTi#?secret=99WeWMHLZJ\" data-secret=\"99WeWMHLZJ\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was originally published in the 2018 Legal Geek Conference Magazine in October.\u00a0 With data breaches becoming more common, cybersecurity is as important as locking the door of\u00a0the office. CenturyLink\u2019s Solutions Architecture and Security Director EMEA, Bryn Norton, believes effective cybersecurity isn\u2019t just about building ever-more intelligent anti-malware software, it\u2019s about empowering people to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-28469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-read"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 things you need to know about Cybersecurity - Legal Geek<\/title>\n<meta name=\"description\" content=\"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 things you need to know about Cybersecurity - Legal Geek\" \/>\n<meta property=\"og:description\" content=\"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Legal Geek\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/legalgeekco\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-04T03:08:21+00:00\" \/>\n<meta name=\"author\" content=\"Legal Geek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wearelegalgeek\" \/>\n<meta name=\"twitter:site\" content=\"@wearelegalgeek\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Legal Geek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\"},\"author\":{\"name\":\"Legal Geek\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b\"},\"headline\":\"5 things you need to know about Cybersecurity\",\"datePublished\":\"2019-02-04T03:08:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\"},\"wordCount\":919,\"publisher\":{\"@id\":\"https:\/\/www.legalgeek.co\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Read\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\",\"url\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\",\"name\":\"5 things you need to know about Cybersecurity - Legal Geek\",\"isPartOf\":{\"@id\":\"https:\/\/www.legalgeek.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-02-04T03:08:21+00:00\",\"description\":\"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.legalgeek.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 things you need to know about Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.legalgeek.co\/#website\",\"url\":\"https:\/\/www.legalgeek.co\/\",\"name\":\"Legal Geek\",\"description\":\"Legal Geek organises legal technology conferences around the world.\",\"publisher\":{\"@id\":\"https:\/\/www.legalgeek.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.legalgeek.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.legalgeek.co\/#organization\",\"name\":\"Legal Geek\",\"url\":\"https:\/\/www.legalgeek.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png\",\"contentUrl\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png\",\"width\":2550,\"height\":1967,\"caption\":\"Legal Geek\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/legalgeekco\/\",\"https:\/\/x.com\/wearelegalgeek\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b\",\"name\":\"Legal Geek\",\"sameAs\":[\"https:\/\/legalgeek.co\"],\"url\":\"https:\/\/www.legalgeek.co\/author\/lovelegalinfo52\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 things you need to know about Cybersecurity - Legal Geek","description":"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"5 things you need to know about Cybersecurity - Legal Geek","og_description":"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.","og_url":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/","og_site_name":"Legal Geek","article_publisher":"https:\/\/www.facebook.com\/legalgeekco\/","article_published_time":"2019-02-04T03:08:21+00:00","author":"Legal Geek","twitter_card":"summary_large_image","twitter_creator":"@wearelegalgeek","twitter_site":"@wearelegalgeek","twitter_misc":{"Written by":"Legal Geek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/"},"author":{"name":"Legal Geek","@id":"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b"},"headline":"5 things you need to know about Cybersecurity","datePublished":"2019-02-04T03:08:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/"},"wordCount":919,"publisher":{"@id":"https:\/\/www.legalgeek.co\/#organization"},"image":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"","articleSection":["Read"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/","url":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/","name":"5 things you need to know about Cybersecurity - Legal Geek","isPartOf":{"@id":"https:\/\/www.legalgeek.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-02-04T03:08:21+00:00","description":"Bryn Norton from CenturyLink tells Legal Geek why cybersecurity is as important as locking your front door.","breadcrumb":{"@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.legalgeek.co\/5-things-you-need-to-know-about-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.legalgeek.co\/"},{"@type":"ListItem","position":2,"name":"5 things you need to know about Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.legalgeek.co\/#website","url":"https:\/\/www.legalgeek.co\/","name":"Legal Geek","description":"Legal Geek organises legal technology conferences around the world.","publisher":{"@id":"https:\/\/www.legalgeek.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.legalgeek.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.legalgeek.co\/#organization","name":"Legal Geek","url":"https:\/\/www.legalgeek.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/","url":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png","contentUrl":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png","width":2550,"height":1967,"caption":"Legal Geek"},"image":{"@id":"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/legalgeekco\/","https:\/\/x.com\/wearelegalgeek"]},{"@type":"Person","@id":"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b","name":"Legal Geek","sameAs":["https:\/\/legalgeek.co"],"url":"https:\/\/www.legalgeek.co\/author\/lovelegalinfo52\/"}]}},"_links":{"self":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts\/28469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/comments?post=28469"}],"version-history":[{"count":0,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts\/28469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/media?parent=28469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/categories?post=28469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/tags?post=28469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}