{"id":2256,"date":"2019-02-20T12:17:31","date_gmt":"2019-02-20T12:17:31","guid":{"rendered":"https:\/\/socialsimulator.com\/?p=2256"},"modified":"2019-02-20T12:17:31","modified_gmt":"2019-02-20T12:17:31","slug":"cyber-incident-trends-what-can-you-do-to-prepare","status":"publish","type":"post","link":"https:\/\/helpfuldigital.com\/fr\/cyber-incident-trends-what-can-you-do-to-prepare\/","title":{"rendered":"Cyber incident trends: what can you do to prepare?"},"content":{"rendered":"<p>As you can imagine, the last couple of years have seen us get a lot more enquiries from clients looking to stress-test their crisis preparedness. Cyber incidents are especially tricky to handle, for a number of reasons:<\/p>\n<ul>\n<li><strong>The information vacuum is more acute and extended<\/strong><br \/>\nIt can take a while &#8211; days, potentially &#8211; for the facts of the incident to be established, but the shock and concern amongst those potentially affected ramps up as quickly as any other incident-driven crisis.<\/li>\n<li><strong>Mobilizing the internal team is more complex<br \/>\n<\/strong>Depending on the nature of the incident, there can be an especially wide range of internal colleagues to involve, from technical staff to HR, legal to regulator, investor relations to media relations.<\/li>\n<li><strong>Scenario-planning is trickier and understanding &#8211; let alone communicating &#8211; the risks involved is harder<br \/>\n<\/strong>Explaining the nature of the vulnerability that has been exploited is a challenge, compounded by hypotheticals and best\/worst case assumptions with few known facts.<\/li>\n<\/ul>\n<p>Over the last year we&#8217;ve seen a number of emerging and growing trends in real-world cyber incidents which clients are starting to use in their own resilience planning:<\/p>\n<h4>Stronger regulatory muscle<\/h4>\n<p>Last year, we saw <a href=\"http:\/\/www.cityam.com\/267361\/value-average-data-breach-fine-uk-doubles-one-year\">average fines levied by the UK regulator for data breaches double<\/a> to \u00a3146,000, while in the US firms such as Anthem and Uber settled large cases in the tens of hundreds of millions of dollars. The reality is that regulators are getting tougher around the world, backed up by more clear-cut expectations enshrined in law &#8211; such as the requirement in Europe to notify the authorities within 72 hours of the discovery of a personal data breach. Prepare your templates in peacetime, and think ahead of time about when you&#8217;ll disclose.<\/p>\n<h4>State-sponsored attacks and 0days<\/h4>\n<p>Hacker groups such as <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/a-look-into-the-lazarus-groups-operations\">The Lazarus Group<\/a>, believed to be aligned to the North Korean state, have gone after cash targets such as payment systems and bank networks; whereas other state-sponsored attacks have had espionage as the mission, <a href=\"https:\/\/globalnews.ca\/news\/4758977\/marriott-hack-china-trade\/\">as Marriott found to its cost<\/a>. The threats emerging from undisclosed vulnerabilities (&#8216;zero days&#8217;) are some of the most difficult to guard against, and the geopolitical scale to these attacks obviously dwarfs the resources of all but the largest corporations. The best defence is likely to be in preparation and training users to be intelligent users of technology: ultimately, it was a spearphishing attack targeted at an employee that enabled malware to be installed which affected Chile&#8217;s national ATM network.<\/p>\n<h4>Risks exposed by mergers and acquisitions<\/h4>\n<p>As IT becomes the business, not just enables it, cyber due diligence becomes ever more important. Systems integration naturally introduces the complexity of more servers in more datacenters, with more suppliers and more users involved. While the task of auditing and securing those digital empires is one for IT, there&#8217;s a resilience task to make sure the teams managing them have oversight of what there is and who is supporting and maintaining them so vulnerabilities don&#8217;t simply emerge from oversights. In a nutshell: it might be a server you inherited, but when it&#8217;s breached for want of a software patch, customers will blame the brand they recognise.<\/p>\n<h4>Reliance on 3rd parties in the digital supply chain<\/h4>\n<p>British Airways revealed the <a href=\"https:\/\/www.theregister.co.uk\/2018\/09\/11\/british_airways_website_scripts\/\">loss of almost 400,000 customers&#8217; payment information<\/a> when third party code on their online booking portal was compromised. It highlighted the challenge of modern web sites, which aren&#8217;t simply pages of content, but are composed of layers of advertising tracking scripts, third party shopping carts, and libraries that make the rich web experience we expect these days. As with state-sponsored attacks, third party infrastructure is hard to secure definitively, so the resilience task has to be ensure that your monitoring and testing regime, and links to partners in the supply chain &#8211; are strong so that you can respond quickly if code is compromised.<\/p>\n<h4>Shifting perceptions of what constitutes &#8220;fair use&#8221; of data<\/h4>\n<p>Facebook found to its cost that you don&#8217;t necessarily need to lose your users&#8217; data to get the blame (though <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-45686890\">they&#8217;ve done that too<\/a>). <a href=\"https:\/\/abcnews.go.com\/US\/87-million-facebook-users-find-personal-data-breached\/story?id=54334187\">Convoluted data-sharing regimes which flout the spirit of the moral contract users believe they have with you<\/a> can be enough to spark regulatory enquiries, fines, class action suits and customer boycott campaigns. There&#8217;s signs of a shift in perceptions of what &#8216;fair&#8217; looks like as firms start to get more creative\/manipulative in their use of data and users react by choosing services and tools which enable them to encrypt, delete, or block unwanted snooping. Communication has an important role to play here in being clear and frank with people about the basis on which a digital service is being offered, and how their data is used. Transparency build trust, while the drip-drip of revelations about a business model which needlessly infringes privacy can destroy it.<\/p>\n<p>A cyber incident can be managed and trust restored, but lose trust with customers about your fundamental way of operating, and the damage runs much deeper &#8211; into your very licence to operate.<\/p>\n<h3>Your cyber incident stakeholders<\/h3>\n<p>In the dozens of cyber incident scenarios we\u2019ve helped client teams to wargame using our behind-closed-doors software and roleplay service, we\u2019ve identified patterns in the key stakeholders involved \u2013 as well as those overlooked by teams grappling with an incident of unknown scale and severity. We\u2019ve mapped out the key groups you\u2019ll need to have lines of communication with during a cyber incident, to ensure not only that business operations are restored quickly, but that the long term outcomes for customer trust, share price and licence to operate are positive. Take a look at our infographic, and let us know what you think.<\/p>\n<p><a href=\"https:\/\/socialsimulator.com\/wp-content\/uploads\/2019\/01\/Navigating-cyber-stakeholders.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-2262\" src=\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/tss-legacy-images\/2019\/01\/cyber-infographic-1024x744.jpg\" alt=\"\" width=\"1024\" height=\"744\" data-wp-pid=\"2262\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>As you can imagine, the last couple of years have seen us get a lot more enquiries from clients looking to stress-test their crisis preparedness. Cyber incidents are especially tricky to handle, for a number of reasons: The information vacuum is more acute and extended It can take a while &#8211; days, potentially &#8211; for [&hellip;]<\/p>","protected":false},"author":9,"featured_media":2258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[141],"tags":[38],"class_list":["post-2256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-fr","tag-crisis-preparedness"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Helpful Digital - Cyber incident trends: what can you do to prepare?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/helpfuldigital.com\/fr\/cyber-incident-trends-what-can-you-do-to-prepare\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Helpful Digital - Cyber incident trends: what can you do to prepare?\" \/>\n<meta property=\"og:description\" content=\"As you can imagine, the last couple of years have seen us get a lot more enquiries from clients looking to stress-test their crisis preparedness. Cyber incidents are especially tricky to handle, for a number of reasons: The information vacuum is more acute and extended It can take a while &#8211; days, potentially &#8211; for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/helpfuldigital.com\/fr\/cyber-incident-trends-what-can-you-do-to-prepare\/\" \/>\n<meta property=\"og:site_name\" content=\"Helpful Digital\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/helpfulhq\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-20T12:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2021\/06\/Helpful-strapline-purple-OpenGraph.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helpfuldigital\" \/>\n<meta name=\"twitter:site\" content=\"@helpfuldigital\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/\"},\"author\":{\"name\":\"Steph Gray\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353\"},\"headline\":\"Cyber incident trends: what can you do to prepare?\",\"datePublished\":\"2019-02-20T12:17:31+00:00\",\"dateModified\":\"2019-02-20T12:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/\"},\"wordCount\":956,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/helpfuldigital.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Crisis Preparedness\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/\",\"url\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/\",\"name\":\"Helpful Digital - Cyber incident trends: what can you do to prepare?\",\"isPartOf\":{\"@id\":\"https:\/\/helpfuldigital.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-02-20T12:17:31+00:00\",\"dateModified\":\"2019-02-20T12:17:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/helpfuldigital.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber incident trends: what can you do to prepare?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/helpfuldigital.com\/#website\",\"url\":\"https:\/\/helpfuldigital.com\/\",\"name\":\"Helpful Digital\",\"description\":\"Building confidence in a digital world\",\"publisher\":{\"@id\":\"https:\/\/helpfuldigital.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/helpfuldigital.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/helpfuldigital.com\/#organization\",\"name\":\"Helpful Digital\",\"url\":\"https:\/\/helpfuldigital.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png\",\"contentUrl\":\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png\",\"width\":871,\"height\":869,\"caption\":\"Helpful Digital\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/helpfulhq\/\",\"https:\/\/x.com\/helpfuldigital\",\"https:\/\/instagram.com\/helpfuldigital\",\"https:\/\/www.linkedin.com\/company\/helpful-technology\",\"https:\/\/www.youtube.com\/channel\/UC1zSFtjZqozK0aNd6KryN8g\/featured\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353\",\"name\":\"Steph Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g\",\"caption\":\"Steph Gray\"},\"url\":\"https:\/\/helpfuldigital.com\/fr\/author\/lesteph\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Helpful Digital - Cyber incident trends: what can you do to prepare?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/helpfuldigital.com\/fr\/cyber-incident-trends-what-can-you-do-to-prepare\/","og_locale":"fr_FR","og_type":"article","og_title":"Helpful Digital - Cyber incident trends: what can you do to prepare?","og_description":"As you can imagine, the last couple of years have seen us get a lot more enquiries from clients looking to stress-test their crisis preparedness. Cyber incidents are especially tricky to handle, for a number of reasons: The information vacuum is more acute and extended It can take a while &#8211; days, potentially &#8211; for [&hellip;]","og_url":"https:\/\/helpfuldigital.com\/fr\/cyber-incident-trends-what-can-you-do-to-prepare\/","og_site_name":"Helpful Digital","article_publisher":"https:\/\/www.facebook.com\/helpfulhq\/","article_published_time":"2019-02-20T12:17:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2021\/06\/Helpful-strapline-purple-OpenGraph.jpg","type":"image\/jpeg"}],"author":"Steph Gray","twitter_card":"summary_large_image","twitter_creator":"@helpfuldigital","twitter_site":"@helpfuldigital","twitter_misc":{"\u00c9crit par":"Steph Gray","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#article","isPartOf":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/"},"author":{"name":"Steph Gray","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353"},"headline":"Cyber incident trends: what can you do to prepare?","datePublished":"2019-02-20T12:17:31+00:00","dateModified":"2019-02-20T12:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/"},"wordCount":956,"commentCount":0,"publisher":{"@id":"https:\/\/helpfuldigital.com\/#organization"},"image":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage"},"thumbnailUrl":"","keywords":["Crisis Preparedness"],"articleSection":["Uncategorized"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/","url":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/","name":"Helpful Digital - Cyber incident trends: what can you do to prepare?","isPartOf":{"@id":"https:\/\/helpfuldigital.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage"},"image":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-02-20T12:17:31+00:00","dateModified":"2019-02-20T12:17:31+00:00","breadcrumb":{"@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/helpfuldigital.com\/cyber-incident-trends-what-can-you-do-to-prepare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/helpfuldigital.com\/"},{"@type":"ListItem","position":2,"name":"Cyber incident trends: what can you do to prepare?"}]},{"@type":"WebSite","@id":"https:\/\/helpfuldigital.com\/#website","url":"https:\/\/helpfuldigital.com\/","name":"Helpful Digital","description":"Building confidence in a digital world","publisher":{"@id":"https:\/\/helpfuldigital.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/helpfuldigital.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/helpfuldigital.com\/#organization","name":"Helpful Digital","url":"https:\/\/helpfuldigital.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/","url":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png","contentUrl":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png","width":871,"height":869,"caption":"Helpful Digital"},"image":{"@id":"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/helpfulhq\/","https:\/\/x.com\/helpfuldigital","https:\/\/instagram.com\/helpfuldigital","https:\/\/www.linkedin.com\/company\/helpful-technology","https:\/\/www.youtube.com\/channel\/UC1zSFtjZqozK0aNd6KryN8g\/featured"]},{"@type":"Person","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353","name":"Steph Gray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g","caption":"Steph Gray"},"url":"https:\/\/helpfuldigital.com\/fr\/author\/lesteph\/"}]}},"_links":{"self":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts\/2256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/comments?post=2256"}],"version-history":[{"count":0,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts\/2256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/media?parent=2256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/categories?post=2256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/tags?post=2256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}