{"id":1054,"date":"2012-03-20T17:47:38","date_gmt":"2012-03-20T17:47:38","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=1054"},"modified":"2026-01-09T16:20:19","modified_gmt":"2026-01-09T21:20:19","slug":"data-breaches-are-at-an-all-time-high","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/","title":{"rendered":"Data Privacy Breaches at All Time High"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1071 size-full\" title=\"Data Privacy\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/databreaches.jpg\" alt=\"Data Privacy\" width=\"276\" height=\"183\" \/><\/p>\n<p>Data privacy breaches are becoming more and more prevalent and common in the United States today. \u00c2\u00a0 Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. a consumer record with details like name, address, and social security number) occur every day?<\/p>\n<p>Concerns about identity theft have consumers living under constant fear of exposing their credit card or personal information &#8212; especially online.<\/p>\n<p>What&#8217;s so unsettling is the fact that many of these <span style=\"text-decoration: underline;\"><a title=\"Data Privacy Breach Sparks Worry - Wall Street Journal\" href=\"http:\/\/online.wsj.com\/article\/SB10001424052702303816504577313411294908868.html\" target=\"_blank\" rel=\"noopener\">data privacy breaches<\/a><\/span> occur due to negligence or failure to stem procedural errors in the workplace. Beyond bad practices and security lapses, is the fact that many companies simply do not believe they could be affected by data privacy breaches through hacking, theft, or simple data loss.<\/p>\n<p>Many of data privacy breaches of consumer and patient records occur in companies known as &#8220;third-party processors&#8221;. In the financial services industry, this entities work between merchants and banks to handle and\/or analyze credit card transactions. Companies with such access to information are a hackers&#8217; dream, since they will try to get access to the thousands of personal accounts records on line. Until the data loss is detected, identity and\/or credit card theft can occur unchecked.<\/p>\n<p>Data privacy breaches and hacking affect as many as 8 million Americans each year, costing billions of dollars and countless hours to correct the problems it creates. Global Payments Inc., for example, recently reported that as many as 1.5 million card numbers were compromised in a data privacy breach. Besides processing cards in the U.S., this firm serves government agencies and businesses in Canada, Europe and the Asia-Pacific region.<\/p>\n<p>Given the need to prevent data loss of this kind, what are companies with personally identifiable information (PII) doing to protect it? The first step is corporate wide awareness of the problem; employees must not be allowed to think it &#8220;could not happen here.&#8221; Even though <a title=\"Identity Theft Definition Wiki\" href=\"http:\/\/en.wikipedia.org\/wiki\/Identity_theft\" target=\"_blank\" rel=\"noopener\">identity theft<\/a> incidences have been on the rise for years, people are still surprised when it happens and companies have not taken enough data loss prevention steps.<\/p>\n<p>Having strict policies and practices in place doesn&#8217;t seem to be enough given the growing numbers of identity theft in the United States. Hackers and others\u00a0with malicious intent are\u00a0finding more creative ways to purloin\u00a0personal information.<\/p>\n<p>Here are some tips in safeguarding against hacker attacks and data privacy breaches:<\/p>\n<p>1. Assume they will happen to you!<br \/>\n2. Make sure passwords that control access to databases and file systems containing sensitive data sets are routinely changed and encrypted.<br \/>\n3. Deploy\u00a0software that will detect and block attacks from infiltrating your databases.<br \/>\n4. Prevent hacking by an &#8220;insider&#8221; by implementing and enforcing strict procedures and policies across all your networks.<br \/>\n5. Apply data masking functions\u00a0to PII in databases and files with a tool like <a title=\"FieldShield\" href=\"http:\/\/www.iri.com\/products\/FieldShield\" target=\"_blank\" rel=\"noopener\">IRI FieldShield<\/a>\u00a0so that\u00a0if the network is breached, or media is no longer in the company&#8217;s possession, the risk is mitigated or nullified because the data is still protected.<br \/>\n6. Do not share production information with external entities for any activity you cannot monitor, including testing and application development.<br \/>\n7. Eschew the use of\u00a0production data for testing; leverage technology\u00a0like <a title=\"RowGen\" href=\"http:\/\/www.iri.com\/products\/rowgen\" target=\"_blank\" rel=\"noopener\">IRI RowGen<\/a> to create safe test data that&#8217;s generated and\/or selected randomly so there is no possibility of real data being used.<br \/>\n8. Conduct regular audits of systems, and training for employees in the importance of, and procedures for, data loss prevention. DLP should be part of an overall data governance initiative overseen by CISOs or compliance officers.<\/p>\n<p>If you feel you are victim to a data privacy breech, you can visit the <a title=\"Identity Theft Information FTC\" href=\"https:\/\/www.consumer.ftc.gov\/topics\/identity-theft\" target=\"_blank\" rel=\"noopener\">Federal Trade Commission<\/a> (FTC) website for more details.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data privacy breaches are becoming more and more prevalent and common in the United States today. \u00c2\u00a0 Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. a consumer record with details like name, address, and social security number) occur every day? Concerns about identity theft have consumers<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\" title=\"Data Privacy Breaches at All Time High\">Read More<\/a><\/div>\n","protected":false},"author":4,"featured_media":11744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,2255],"tags":[10,14,18,58,13,48,9,59,60,49],"class_list":["post-1054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-archived-articles","tag-data-encryption","tag-data-masking","tag-data-privacy","tag-data-privacy-breach","tag-data-protection-2","tag-de-identifying-data","tag-fieldshield","tag-identity-theft","tag-personal-data","tag-rowgen"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Privacy Breaches at All Time High - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy Breaches at All Time High\" \/>\n<meta property=\"og:description\" content=\"Data privacy breaches are becoming more and more prevalent and common in the United States today. \u00c2\u00a0 Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. a consumer record with details like name, address, and social security number) occur every day? Concerns about identity theft have consumersRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-20T17:47:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T21:20:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lydia Botello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lydia Botello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\"},\"author\":{\"name\":\"Lydia Botello\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5017ea11359aa0ffd8e505011daf00c9\"},\"headline\":\"Data Privacy Breaches at All Time High\",\"datePublished\":\"2012-03-20T17:47:38+00:00\",\"dateModified\":\"2026-01-09T21:20:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\"},\"wordCount\":619,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg\",\"keywords\":[\"data encryption\",\"data masking\",\"data privacy\",\"data privacy breach\",\"data protection\",\"de identifying data\",\"FieldShield\",\"identity theft\",\"personal data\",\"RowGen\"],\"articleSection\":[\"Data Masking\/Protection\",\"Archived Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\",\"name\":\"Data Privacy Breaches at All Time High - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg\",\"datePublished\":\"2012-03-20T17:47:38+00:00\",\"dateModified\":\"2026-01-09T21:20:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg\",\"width\":1024,\"height\":678},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Privacy Breaches at All Time High\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5017ea11359aa0ffd8e505011daf00c9\",\"name\":\"Lydia Botello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb7e04d2edca0d1d6b668858391a4d7b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb7e04d2edca0d1d6b668858391a4d7b?s=96&d=blank&r=g\",\"caption\":\"Lydia Botello\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/lydiab\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Privacy Breaches at All Time High - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/","og_locale":"en_US","og_type":"article","og_title":"Data Privacy Breaches at All Time High","og_description":"Data privacy breaches are becoming more and more prevalent and common in the United States today. \u00c2\u00a0 Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. a consumer record with details like name, address, and social security number) occur every day? Concerns about identity theft have consumersRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/","og_site_name":"IRI","article_published_time":"2012-03-20T17:47:38+00:00","article_modified_time":"2026-01-09T21:20:19+00:00","og_image":[{"width":1024,"height":678,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","type":"image\/jpeg"}],"author":"Lydia Botello","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lydia Botello","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/"},"author":{"name":"Lydia Botello","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5017ea11359aa0ffd8e505011daf00c9"},"headline":"Data Privacy Breaches at All Time High","datePublished":"2012-03-20T17:47:38+00:00","dateModified":"2026-01-09T21:20:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/"},"wordCount":619,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","keywords":["data encryption","data masking","data privacy","data privacy breach","data protection","de identifying data","FieldShield","identity theft","personal data","RowGen"],"articleSection":["Data Masking\/Protection","Archived Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/","name":"Data Privacy Breaches at All Time High - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","datePublished":"2012-03-20T17:47:38+00:00","dateModified":"2026-01-09T21:20:19+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","width":1024,"height":678},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/data-breaches-are-at-an-all-time-high\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Privacy Breaches at All Time High"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5017ea11359aa0ffd8e505011daf00c9","name":"Lydia Botello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb7e04d2edca0d1d6b668858391a4d7b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb7e04d2edca0d1d6b668858391a4d7b?s=96&d=blank&r=g","caption":"Lydia Botello"},"url":"https:\/\/www.iri.com\/blog\/author\/lydiab\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/03\/data-privacy-breach.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1054"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=1054"}],"version-history":[{"count":119,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions"}],"predecessor-version":[{"id":18987,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions\/18987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11744"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=1054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=1054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}