{"id":78464,"date":"2022-05-27T03:40:25","date_gmt":"2022-05-27T03:40:25","guid":{"rendered":"https:\/\/www.42gears.com\/?p=78464"},"modified":"2022-06-01T10:00:52","modified_gmt":"2022-06-01T10:00:52","slug":"learn-the-art-of-preventing-data-leaks","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/learn-the-art-of-preventing-data-leaks\/","title":{"rendered":"Learn the Art of Preventing Data Leaks"},"content":{"rendered":"\n<p>The term data leak has been garnering a lot of attention in the cyber space over the last few years. Data leaks expose sensitive business and customer information to the public. This is a dreadful experience that no business wants to go through. Unlike a data breach, which is a planned cyber attack launched by cybercriminals, data leak is an intentional or accidental exposure of confidential business information due to internal errors such as poor configuration, no or weak encryption, weak passwords, or third-party vendor breaches.&nbsp;<\/p>\n\n\n\n<p>According to the<a href=\"https:\/\/www.tessian.com\/blog\/insider-threat-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Tessian research reports<\/a>, there has been a 47% increase in data leak incidents over the last two years; this includes accidental data loss and deliberate data exfiltration by negligent or disgruntled employees or contractors. As the trend of global data leaks continues to increase, let\u2019s understand why data leaks are happening in the first place. Identifying the cause(s) is the first step toward prevention.<\/p>\n\n\n\n<p>Over the past few years, organizations have increasingly shifted their operations completely to the cloud, which has caused security concerns for a few organizations. Along with that, the emerging trend of remote and hybrid work cultures has only added fuel to the fire. Such trends have given rise to several loopholes that cybercriminals are adept at exploiting successfully.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-here-are-some-more-reasons-why-data-leaks-occur\"><strong>Here are some more reasons why data leaks occur:<\/strong><\/h2>\n\n\n\n<p>Unfortunately, one of the major sources of data leaks is not some unknown or forgotten security bug, but it\u2019s human error.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>An Insider\u2019s Error:<\/strong> Imagine a scenario when employees share their devices with other staff who do not have proper authorization (to access such devices). In such cases, the chances of sensitive files being exposed are very high. Even if the access is unintentional, it is considered a breach because it was viewed by an unauthorized person.<\/li><li><strong>A Suspicious Employee:<\/strong> An employee can intentionally access or share data with the intent of causing harm to an individual or company. In such cases, even if the employee<strong> <\/strong>has legitimate authorization to use the data,&nbsp; the purpose is to use the information for nefarious activities.<\/li><li><strong>Lost or Stolen Devices: <\/strong>Data leak may occur<strong> <\/strong>if an unlocked or unprotected laptop or external hard drive or anything that contains sensitive information goes missing.<\/li><li><strong>Malware or Cyber Criminals:<\/strong> Sophisticated criminals may use various attack vectors to gather information from a network or an individual.<\/li><\/ul>\n\n\n\n<p>So, the question that keeps CIOs awake at night is \u201chow to prevent data leaks?\u201d<\/p>\n\n\n\n<p>The most effective method for <a href=\"https:\/\/www.42gears.com\/solutions\/capabilities\/data-loss-prevention\/\">data leak prevention<\/a> (DLP) is to educate everyone at all levels &#8211; from end-users to IT personnel, and everyone in between. While trying to prevent data leaks, it\u2019s important to understand that security is only as strong as the weakest link. Every involved individual who interacts with a system can be a potential vulnerability. Even kids, for that matter, using a tablet on your home network can pose a risk.<\/p>\n\n\n\n<p>Here are a few best practices to avoid data leaks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Educating employees<\/strong> on best security practices and ways to avoid socially engineered attacks<\/li><li><strong>Patching and updating software regularly<\/strong><\/li><li><strong>Opting for high-grade encryption<\/strong> of sensitive data<\/li><li><strong>Upgrading devices<\/strong> when the software is no longer supported by the manufacturer<\/li><li><a href=\"https:\/\/www.42gears.com\/solutions\/offerings\/byod\/\"><strong>Enforcing BYOD security policies<\/strong><\/a> such as ensuring all devices are used in a business-grade and protected VPN environment<\/li><li><strong>Enforcing strong credentials and multi-factor authentication<\/strong> to encourage better user cybersecurity practices &#8211;&nbsp; encouraging users to start using a password manager can help<\/li><li><strong>Deploying robust tools:<\/strong> Data loss prevention (DLP) software allows network administrators to monitor data that is accessed and shared by end-users. It is one of the most effective ways to improve information security and protect business information from data leaks.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-in-conclusion\"><strong>In Conclusion<\/strong><\/h2>\n\n\n\n<p>Data leaks can be detrimental to businesses, but when security managers understand the business environment and follow simple, manageable steps to ensure data security, it becomes easier for them to prevent data leaks from causing damage.&nbsp;<\/p>\n\n\n\n<p>By deploying SureMDM\u2019s DLP, organizations can augment their information security and protect business information from data leaks. Keep your corporate devices protected against data leaks using 42Gears SureMDM.<\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/CTA-5.jpg'); background-position: right; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 22px; color: #fff; margin-top: 0px;\">Looking to improve data security?<\/h2>\n<p style=\"margin-top: 32px; display: inline-block;\"><a href=\"https:\/\/suremdm.42gears.com\/console\/?_ga=2.217154133.2145553284.1653279578-531630290.1648451395\" style=\"min-width: 148px; height: 48px; padding: 0 12px; text-align: center; display: inline-block; background-color: #ffffff; color: #427ab7; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" target=\"_black\" rel=\"noopener noreferrer\">Try SureMDM<\/a>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The term data leak has been garnering a lot of attention in the cyber space over the last few years. Data leaks expose sensitive business and customer information to the public. This is a dreadful experience that no business wants to go through. Unlike a data breach, which is a planned cyber attack launched by&hellip;<\/p>\n","protected":false},"author":7,"featured_media":78471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"new-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-78464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the Effective Ways to Prevent Data Leaks?<\/title>\n<meta name=\"description\" content=\"What makes your data vulnerable to leakage and what are the effective ways to prevent it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn the Art of Preventing Data Leaks\" \/>\n<meta property=\"og:description\" content=\"What makes your data vulnerable to leakage and what are the effective ways to prevent it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-27T03:40:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-01T10:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Learn the Art of Preventing Data Leaks\",\"datePublished\":\"2022-05-27T03:40:25+00:00\",\"dateModified\":\"2022-06-01T10:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\"},\"wordCount\":696,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\",\"url\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\",\"name\":\"What are the Effective Ways to Prevent Data Leaks?\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg\",\"datePublished\":\"2022-05-27T03:40:25+00:00\",\"dateModified\":\"2022-06-01T10:00:52+00:00\",\"description\":\"What makes your data vulnerable to leakage and what are the effective ways to prevent it?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg\",\"width\":1000,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn the Art of Preventing Data Leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are the Effective Ways to Prevent Data Leaks?","description":"What makes your data vulnerable to leakage and what are the effective ways to prevent it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/","og_locale":"nl_NL","og_type":"article","og_title":"Learn the Art of Preventing Data Leaks","og_description":"What makes your data vulnerable to leakage and what are the effective ways to prevent it?","og_url":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2022-05-27T03:40:25+00:00","article_modified_time":"2022-06-01T10:00:52+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Learn the Art of Preventing Data Leaks","datePublished":"2022-05-27T03:40:25+00:00","dateModified":"2022-06-01T10:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/"},"wordCount":696,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","articleSection":["Uncategorized"],"inLanguage":"nl"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/","url":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/","name":"What are the Effective Ways to Prevent Data Leaks?","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","datePublished":"2022-05-27T03:40:25+00:00","dateModified":"2022-06-01T10:00:52+00:00","description":"What makes your data vulnerable to leakage and what are the effective ways to prevent it?","breadcrumb":{"@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","width":1000,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/es\/blog\/learn-the-art-of-preventing-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Learn the Art of Preventing Data Leaks"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/05\/featured-5.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/78464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=78464"}],"version-history":[{"count":5,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/78464\/revisions"}],"predecessor-version":[{"id":78533,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/78464\/revisions\/78533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media\/78471"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=78464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=78464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=78464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}