{"id":563,"date":"2014-09-23T07:04:51","date_gmt":"2014-09-23T07:04:51","guid":{"rendered":"https:\/\/socialsimulator.com\/?p=563"},"modified":"2014-09-23T07:04:51","modified_gmt":"2014-09-23T07:04:51","slug":"shutting-stable-door-handle-data-security-breaches-social-media","status":"publish","type":"post","link":"https:\/\/helpfuldigital.com\/fr\/shutting-stable-door-handle-data-security-breaches-social-media\/","title":{"rendered":"Shutting the stable door: handling data security breaches in social media"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-566\" src=\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/tss-legacy-images\/2014\/09\/horse-in-stable-1024x682.jpg\" alt=\"horse in stable\" width=\"1024\" height=\"682\" \/><\/p>\n<p>Imagine waking up to an expos\u00e9 of your firm&#8217;s supply chain: you&#8217;ve been indirectly responsible for supporting child labour on an industrial scale. NGOs are mobilising a campaign. A leading celebrity has already tweeted her disgust.\u00a0Or the email that pings your BlackBerry on a Sunday morning confirming that environmental regulators have picked up a sustained breach of emissions standards from your production facility, polluting a natural park and triggering a multi-million dollar class action lawsuit.<\/p>\n<p>The stuff of corporate communication nightmares, for sure.<\/p>\n<p>But recently, we&#8217;ve found ourselves <a title=\"Working with agencies\" href=\"https:\/\/socialsimulator.com\/partnering\/\">helping a number of different partners and their clients<\/a> work through a scenario that feels like a simple, technical oversight but research shows, would drive 70% of consumers to actively avoid a brand: data loss.<\/p>\n<p>Data from researchers Ipsos-MORI found that 70% of consumers would seriously consider avoiding a company found to be failing to keep customer data safe &#8211; higher than for a firm discovered to be exploiting workers overseas, (53%), overcharging customers (51%) or causing environmental damage (49%).<\/p>\n<p><iframe loading=\"lazy\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/31081953?startSlide=4\" width=\"597\" height=\"486\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<div style=\"margin-bottom: 5px;\"><strong> <a title=\"Personalisation Versus Privacy\" href=\"https:\/\/www.slideshare.net\/IpsosMORI\/personalisation-versus-privacy\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Personalisation Versus Privacy<\/a> <\/strong> from <strong><a href=\"http:\/\/www.slideshare.net\/IpsosMORI\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ipsos MORI<\/a><\/strong><\/div>\n<p>In practice, organisations which lose data face some real challenges communicating the bad news well. <a href=\"http:\/\/mashable.com\/2014\/09\/21\/home-depot-finally-emails-customers-to-inform-them-of-breach\/\">Home Depot allegedly took several weeks to identify and email the 56m customers<\/a> affected by a hack which targetted customer credit cards. Likewise, it took Sony over a week to publicly acknowledge a massive breach of its PlayStation network in 2011, and years later <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-21160818\">regulators were still criticising the firm<\/a> for &#8216;avoidable&#8217; lapses in password security.<\/p>\n<p>These types of situation demonstrate the speed and power of social media in a crisis, where customers and security bloggers, traditional journalists and regulators come together and stories of this kind are difficult to control.<\/p>\n<p>So, aside from strong IT safeguards and compliance, what can do you to put yourself in the best possible position to protect your reputation in these situations when the proverbial horse has bolted?<\/p>\n<ul>\n<li><strong>Make friends with the stable door.<\/strong> Speed is a particular challenge in these situations, and <a title=\"The Simulator\" href=\"https:\/\/socialsimulator.com\/simulator\/\">practising your links<\/a> with colleagues in IT, audit and legal is vital to ensure the roles are clear and you can mobilise as a team rapidly. You need to be able to establish the facts and &#8211; crucially &#8211; share them with customers, quickly. Colleagues in other functions may have regulatory compliance at front of mind, but that can&#8217;t come at the expense of timely communication with the wider world.<\/li>\n<li><strong>What was the stable door like anyway?<\/strong> Silence goes down badly with the online audience, who invariably fill the void with speculation and amateur sleuthing. Ahead of time, work with your corporate colleagues to identify what you can safely share about your policies and recommended good practice in terms of data security, so that while you&#8217;re establishing the extent and impact of a breach, you have some material to work with for corporate communication. Apply common sense and empathy: there&#8217;s nothing worse than a brand trotting out banalities about \u00a0commitments to customer privacy when Twitter is awash with stories of the opposite. What hard facts and reasons to believe can you share?<\/li>\n<li><strong>What should folks do around loose horses?<\/strong> Home Depot offered affected customers 12 months of free credit protection services and advice on staying safe online. <a href=\"http:\/\/thenextweb.com\/insider\/2014\/09\/13\/wordpress-preemptively-resets-100000-accounts-precaution-recent-gmail-password-leaks\/\">WordPress.com reset 100,000 users&#8217; passwords<\/a> as a pre-emptive step after 5m Gmail passwords surfaced online. Customers will be looking for your frontline social media channels to be helping them establish if they&#8217;ve been affected, providing advice on what they need to do next, and taking pre-emptive steps to protect them &#8211; as well as providing reassurance that the team is dealing with the technical side of the breach itself.<\/li>\n<\/ul>\n<p>There&#8217;s no avoiding the fact it&#8217;s going to be a difficult few weeks for the organisation, but showing humanity and responsiveness though corporate channels could make the difference between retaining loyal customers and suffering a mass exodus and earning the wrong kind of reputation for security and competence.<\/p>","protected":false},"excerpt":{"rendered":"<p>Imagine waking up to an expos\u00e9 of your firm&#8217;s supply chain: you&#8217;ve been indirectly responsible for supporting child labour on an industrial scale. NGOs are mobilising a campaign. A leading celebrity has already tweeted her disgust.\u00a0Or the email that pings your BlackBerry on a Sunday morning confirming that environmental regulators have picked up a sustained [&hellip;]<\/p>","protected":false},"author":9,"featured_media":566,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11],"tags":[38,302],"class_list":["post-563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-crisis-preparedness","tag-crisis-recovery"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Helpful Digital - Shutting the stable door: handling data security breaches in social media<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/helpfuldigital.com\/fr\/shutting-stable-door-handle-data-security-breaches-social-media\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Helpful Digital - Shutting the stable door: handling data security breaches in social media\" \/>\n<meta property=\"og:description\" content=\"Imagine waking up to an expos\u00e9 of your firm&#8217;s supply chain: you&#8217;ve been indirectly responsible for supporting child labour on an industrial scale. NGOs are mobilising a campaign. A leading celebrity has already tweeted her disgust.\u00a0Or the email that pings your BlackBerry on a Sunday morning confirming that environmental regulators have picked up a sustained [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/helpfuldigital.com\/fr\/shutting-stable-door-handle-data-security-breaches-social-media\/\" \/>\n<meta property=\"og:site_name\" content=\"Helpful Digital\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/helpfulhq\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-23T07:04:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2021\/06\/Helpful-strapline-purple-OpenGraph.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helpfuldigital\" \/>\n<meta name=\"twitter:site\" content=\"@helpfuldigital\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/\"},\"author\":{\"name\":\"Steph Gray\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353\"},\"headline\":\"Shutting the stable door: handling data security breaches in social media\",\"datePublished\":\"2014-09-23T07:04:51+00:00\",\"dateModified\":\"2014-09-23T07:04:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/\"},\"wordCount\":666,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/helpfuldigital.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Crisis Preparedness\",\"crisis recovery\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/\",\"url\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/\",\"name\":\"Helpful Digital - Shutting the stable door: handling data security breaches in social media\",\"isPartOf\":{\"@id\":\"https:\/\/helpfuldigital.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2014-09-23T07:04:51+00:00\",\"dateModified\":\"2014-09-23T07:04:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/helpfuldigital.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shutting the stable door: handling data security breaches in social media\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/helpfuldigital.com\/#website\",\"url\":\"https:\/\/helpfuldigital.com\/\",\"name\":\"Helpful Digital\",\"description\":\"Building confidence in a digital world\",\"publisher\":{\"@id\":\"https:\/\/helpfuldigital.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/helpfuldigital.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/helpfuldigital.com\/#organization\",\"name\":\"Helpful Digital\",\"url\":\"https:\/\/helpfuldigital.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png\",\"contentUrl\":\"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png\",\"width\":871,\"height\":869,\"caption\":\"Helpful Digital\"},\"image\":{\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/helpfulhq\/\",\"https:\/\/x.com\/helpfuldigital\",\"https:\/\/instagram.com\/helpfuldigital\",\"https:\/\/www.linkedin.com\/company\/helpful-technology\",\"https:\/\/www.youtube.com\/channel\/UC1zSFtjZqozK0aNd6KryN8g\/featured\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353\",\"name\":\"Steph Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/helpfuldigital.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g\",\"caption\":\"Steph Gray\"},\"url\":\"https:\/\/helpfuldigital.com\/fr\/author\/lesteph\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Helpful Digital - Shutting the stable door: handling data security breaches in social media","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/helpfuldigital.com\/fr\/shutting-stable-door-handle-data-security-breaches-social-media\/","og_locale":"fr_FR","og_type":"article","og_title":"Helpful Digital - Shutting the stable door: handling data security breaches in social media","og_description":"Imagine waking up to an expos\u00e9 of your firm&#8217;s supply chain: you&#8217;ve been indirectly responsible for supporting child labour on an industrial scale. NGOs are mobilising a campaign. A leading celebrity has already tweeted her disgust.\u00a0Or the email that pings your BlackBerry on a Sunday morning confirming that environmental regulators have picked up a sustained [&hellip;]","og_url":"https:\/\/helpfuldigital.com\/fr\/shutting-stable-door-handle-data-security-breaches-social-media\/","og_site_name":"Helpful Digital","article_publisher":"https:\/\/www.facebook.com\/helpfulhq\/","article_published_time":"2014-09-23T07:04:51+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2021\/06\/Helpful-strapline-purple-OpenGraph.jpg","type":"image\/jpeg"}],"author":"Steph Gray","twitter_card":"summary_large_image","twitter_creator":"@helpfuldigital","twitter_site":"@helpfuldigital","twitter_misc":{"\u00c9crit par":"Steph Gray","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#article","isPartOf":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/"},"author":{"name":"Steph Gray","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353"},"headline":"Shutting the stable door: handling data security breaches in social media","datePublished":"2014-09-23T07:04:51+00:00","dateModified":"2014-09-23T07:04:51+00:00","mainEntityOfPage":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/"},"wordCount":666,"commentCount":0,"publisher":{"@id":"https:\/\/helpfuldigital.com\/#organization"},"image":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage"},"thumbnailUrl":"","keywords":["Crisis Preparedness","crisis recovery"],"articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/","url":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/","name":"Helpful Digital - Shutting the stable door: handling data security breaches in social media","isPartOf":{"@id":"https:\/\/helpfuldigital.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage"},"image":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage"},"thumbnailUrl":"","datePublished":"2014-09-23T07:04:51+00:00","dateModified":"2014-09-23T07:04:51+00:00","breadcrumb":{"@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/helpfuldigital.com\/shutting-stable-door-handle-data-security-breaches-social-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/helpfuldigital.com\/"},{"@type":"ListItem","position":2,"name":"Shutting the stable door: handling data security breaches in social media"}]},{"@type":"WebSite","@id":"https:\/\/helpfuldigital.com\/#website","url":"https:\/\/helpfuldigital.com\/","name":"Helpful Digital","description":"Building confidence in a digital world","publisher":{"@id":"https:\/\/helpfuldigital.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/helpfuldigital.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/helpfuldigital.com\/#organization","name":"Helpful Digital","url":"https:\/\/helpfuldigital.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/","url":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png","contentUrl":"https:\/\/helpfuldigital.com\/wp-content\/uploads\/2019\/12\/helpful-h-logo.png","width":871,"height":869,"caption":"Helpful Digital"},"image":{"@id":"https:\/\/helpfuldigital.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/helpfulhq\/","https:\/\/x.com\/helpfuldigital","https:\/\/instagram.com\/helpfuldigital","https:\/\/www.linkedin.com\/company\/helpful-technology","https:\/\/www.youtube.com\/channel\/UC1zSFtjZqozK0aNd6KryN8g\/featured"]},{"@type":"Person","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/a9ed63c77570a51f26fd8a34020b6353","name":"Steph Gray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/helpfuldigital.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d6b7fd848067a566924a124a0661fae?s=96&d=mm&r=g","caption":"Steph Gray"},"url":"https:\/\/helpfuldigital.com\/fr\/author\/lesteph\/"}]}},"_links":{"self":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts\/563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/comments?post=563"}],"version-history":[{"count":0,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/posts\/563\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/media?parent=563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/categories?post=563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/helpfuldigital.com\/fr\/wp-json\/wp\/v2\/tags?post=563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}