{"id":5922,"date":"2021-06-03T10:09:30","date_gmt":"2023-08-12T08:04:04","guid":{"rendered":"https:\/\/www.millerthomson.com\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/"},"modified":"2026-03-18T13:01:47","modified_gmt":"2026-03-18T17:01:47","slug":"cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/","title":{"rendered":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks"},"content":{"rendered":"\n<p>Over the past twelve months, we have seen more and more clients experiencing a variety of cybersecurity incidents. Most prominently, these have been \u201cbusiness email compromise\u201d incidents as well as malware deployments, such as ransomware attacks. The latter have received increasing media coverage over the past several months, in particular the Colonial Pipeline incident that had a negative impact on the oil supply in North America for a number of days. The very recent reported data breach at Canada Post is a stark reminder of how vulnerable the transportation industry can be to these attacks via their service providers.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.canadapost-postescanada.ca\/cpc\/en\/our-company\/news-and-media\/corporate-news\/news-release\/2021-05-26-canada-post-informs-44-large-business-customers-of-supplier-data-breach-involving-shipping-information\" target=\"_blank\" rel=\"noopener noreferrer\">According to Canada Post<\/a>, it has notified 44 business clients who had customer information at issue. According to the statement, the impacted information contained personal information of approximately 950,000 individual consignees.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What happened?<\/h2>\n\n\n\n<p>A Canada Post vendor, Commport Communications, was attacked by cybercriminals, who deployed ransomware on their systems. During the attack, data was compromised and potentially exfiltrated. This data was mainly shipping information, including names and mailing addresses, and, in some cases, email addresses and phone numbers. The alleged gang behind the attack, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canada-post-hit-by-data-breach-after-supplier-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">the \u201cLorenz\u201d group, is reported to have posted the stolen data on its website<\/a> as proof of the attack and data theft.<\/p>\n\n\n\n<p>While this was an attack against the vendor and not against Canada Post directly, Canadian privacy law puts the onus on the organization who collected and was \u201cin control\u201d of the personal information. Under the federal <em>Personal Information Protection and Electronic Documents Act<\/em>, it is the vendor\u2019s customer \u2013 in this case, Canada Post \u2013 that usually has the primary and sole duty to report the incident to impacted individuals and as well the federal (and\/or provincial) Privacy Commissioner whenever there is a \u201creal risk of significant harm\u201d based on the breach. The vendor\u2019s duty to report, if any, stems from contractual obligations owed to the \u201ccontroller\u201d of the personal information, or it might be based on other commercial or reputational considerations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What should businesses do?<\/h2>\n\n\n\n<p>A supply chain must be managed with the appropriate contractual provisions, including obligations to notify the customer promptly of data security incidents. If a report is received, organizations should take proactive steps to understand the incident and data impacted, and make a determination of the risks involved, what legal obligations and breach reporting requirements are triggered, and whether the incident poses a \u201creal risk of significant harm\u201d to impacted individuals. Vendors should be put to task on showing how the incident was remediated and provide comfort that steps are taken to prevent similar attacks in the future. Depending on the nature of the attack, this may include proof of employee training, patching systems, multi-factor authentication for remote access, or removing service accounts.<\/p>\n\n\n\n<p>Companies must also consider cyber insurance as an important risk management tool. While cyber incident and data breach prevention are the primary goals, insurance provides a safety net. To minimize data breach risks, a transport or logistics company is well advised to conduct due diligence when selecting a service provider to whom it plans to entrust personal information. Lastly, having in place a vendor compliance monitoring system is also a good way to ensure that a service provider is taking all necessary precautions.<\/p>\n\n\n\n<p>If you have any questions regarding your company&#8217;s existing cybersecurity policies or to develop solutions for mitigating and responding to cyber threats, please feel free to reach out to any member of Miller Thomson\u2019s <a href=\"https:\/\/www.millerthomson.com\/en\/our-people\/search\/?filter-industries=33565\">Transportation &amp; Logistics team<\/a> or <a href=\"https:\/\/www.millerthomson.com\/en\/our-services\/focus-areas\/cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity team<\/a> for specific advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past twelve months, we have seen more and more clients experiencing a variety of cybersecurity incidents. Most prominently, these have been \u201cbusiness email compromise\u201d incidents as well as malware deployments, such as ransomware attacks. The latter have received increasing media coverage over the past several months, in particular the Colonial Pipeline incident that [&hellip;]<\/p>\n","protected":false},"author":100,"featured_media":14397,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[544],"insight-format":[416],"class_list":["post-5922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transportation-and-logistics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"Over the past twelve months, we have seen more and more clients experiencing a variety of cybersecurity incidents. Most prominently, these have been \u201cbusiness email compromise\u201d incidents as well as malware deployments, such as ransomware attacks. The latter have received increasing media coverage over the past several months, in particular the Colonial Pipeline incident that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-12T08:04:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T17:01:47+00:00\" \/>\n<meta name=\"author\" content=\"believeco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"believeco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\"},\"author\":{\"name\":\"believeco\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/ae50f6e0b1c66658587aa8d9d9252892\"},\"headline\":\"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks\",\"datePublished\":\"2023-08-12T08:04:04+00:00\",\"dateModified\":\"2026-03-18T17:01:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg\",\"articleSection\":[\"Transportation and Logistics\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\",\"name\":\"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg\",\"datePublished\":\"2023-08-12T08:04:04+00:00\",\"dateModified\":\"2026-03-18T17:01:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg\",\"width\":1776,\"height\":994},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/ae50f6e0b1c66658587aa8d9d9252892\",\"name\":\"believeco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0630e548257b5beb2605be4633af29f897bd2b9a93553a9f26c61b3b65763899?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0630e548257b5beb2605be4633af29f897bd2b9a93553a9f26c61b3b65763899?s=96&d=mm&r=g\",\"caption\":\"believeco\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson","og_description":"Over the past twelve months, we have seen more and more clients experiencing a variety of cybersecurity incidents. Most prominently, these have been \u201cbusiness email compromise\u201d incidents as well as malware deployments, such as ransomware attacks. The latter have received increasing media coverage over the past several months, in particular the Colonial Pipeline incident that [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2023-08-12T08:04:04+00:00","article_modified_time":"2026-03-18T17:01:47+00:00","author":"believeco","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"believeco","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/"},"author":{"name":"believeco","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/ae50f6e0b1c66658587aa8d9d9252892"},"headline":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks","datePublished":"2023-08-12T08:04:04+00:00","dateModified":"2026-03-18T17:01:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/"},"wordCount":592,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg","articleSection":["Transportation and Logistics"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/","name":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg","datePublished":"2023-08-12T08:04:04+00:00","dateModified":"2026-03-18T17:01:47+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Transportation-Logistics_Post-Image.jpg","width":1776,"height":994},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/transportation-and-logistics\/cyberattacks-in-your-supply-chain-canada-post-data-breach-highlights-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberattacks in your supply chain \u2013 Canada Post data breach highlights risks"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/ae50f6e0b1c66658587aa8d9d9252892","name":"believeco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0630e548257b5beb2605be4633af29f897bd2b9a93553a9f26c61b3b65763899?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0630e548257b5beb2605be4633af29f897bd2b9a93553a9f26c61b3b65763899?s=96&d=mm&r=g","caption":"believeco"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=5922"}],"version-history":[{"count":1,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5922\/revisions"}],"predecessor-version":[{"id":47984,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5922\/revisions\/47984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14397"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=5922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=5922"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=5922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}