{"id":6204,"date":"2022-09-30T16:36:44","date_gmt":"2022-09-30T20:36:44","guid":{"rendered":"https:\/\/www.millerthomson.com\/successful-cyber-incident-preparedness\/"},"modified":"2025-12-29T19:09:37","modified_gmt":"2025-12-30T00:09:37","slug":"successful-cyber-incident-preparedness","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/","title":{"rendered":"Tactical and strategic steps for successful cyber incident preparedness"},"content":{"rendered":"\n<p>To kick-off this year\u2019s cyber awareness month, we wanted to present an article that would look back on the past year along with our experience counseling organizations, large and small across all sectors, through the ordeal of cyberattacks, data extortion scenarios and other data security incidents. The intention of this article is to set out some of key measures that could help prevent these attacks from having devastating impacts on the victim organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Growing importance of incident preparedness<\/h2>\n\n\n\n<p>Ransomware attacks that now usually operate on a dual extortion model (data encryption plus data extortion), as well as other cybercrimes such as social engineering and email scams, have been rapidly increasing in Canada. The Canadian Centre for Cybersecurity reported that in the first half of 2021, <a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-ransomware-threat-2021\" target=\"_blank\" rel=\"noopener\">ransomware attacks had increased<\/a> by 151% year over year. According to many sources, this trend seems to be continuing in 2022. It has certainly been our experience that this is the case.<\/p>\n\n\n\n<p>On the regulatory response to this in June of this year, Canada\u2019s Minister of Public Safety introduced Bill C-26 (alongside Bill C-27, which is aimed at updating Canada\u2019s federal private sector privacy legislation). Bill C-26 amended Canada\u2019s Telecommunications Act and introduced the Critical Cyber Systems Protection Act in an effort to bolster cyber security across federally regulated essential infrastructure (telecommunications, finance, energy and transportation sectors). These cyber security programs must implement reasonable steps in detecting and minimizing cyber security incidents, in addition to managing organizational risks, such as risks associated with the supply chain and the use of third-party products and services. While not directly applicable to other sectors, implementation of such programs is important for almost any organization.<\/p>\n\n\n\n<p>CISA, the Cybersecurity and Infrastructure Security Agency of the United States, currently <a href=\"https:\/\/www.cisa.gov\/4-things-you-can-do-keep-yourself-cyber-safe\" target=\"_blank\" rel=\"noopener\">highlights four easy steps<\/a> for anyone to take to enhance cybersecurity.<\/p>\n\n\n\n<p>It is trite to say that it is not<strong><em> if <\/em><\/strong>a cybersecurity issue will emerge, but <strong><em>when<\/em><\/strong>. It is the controls and organizational preparedness that will help manage these incidents with the least amount of detriment.<\/p>\n\n\n\n<p>These measures are not a cure-all that will prevent all breaches, but they are fantastic tools to prevent severe outcomes.&nbsp;They seem straightforward enough, yet their implementation is far from consistent across sectors and across the country. Without organizational will, resources and knowledge, they will either not be implemented successfully or inconsistently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CISA four \u201ceasy\u201d steps<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable Multi-Factor Authentication (MFA);<\/li>\n\n\n\n<li>Use\u00a0Strong Passwords;<\/li>\n\n\n\n<li>Recognize and Report Phishing; and<\/li>\n\n\n\n<li>Update Your Software.<\/li>\n<\/ul>\n\n\n\n<p>Canada\u2019s Centre for Cybersecurity highlights <a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/top-measures-enhance-cyber-security-small-and-medium-organizations-itsap10035\" target=\"_blank\" rel=\"noopener\">six top measures<\/a> organizations can take to protect their systems and prevent attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Developing an incident response plan;<\/li>\n\n\n\n<li>Patching systems;<\/li>\n\n\n\n<li>Strong User Authentication;<\/li>\n\n\n\n<li>Using offline Backups;<\/li>\n\n\n\n<li>Enabling security software; and<\/li>\n\n\n\n<li>Training employees.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Foundational and programmatic measures<\/h2>\n\n\n\n<p>These security measures, both technical and organizational, must be planned, implemented and supported internally. There must be an organizational and leadership buy-in.<\/p>\n\n\n\n<p>For instance, a password policy must be managed and implemented in a way that best protects the organization. Beyond forcing strong password use, employees should be trained on not re-using passwords in their private lives, password retention hygiene and not to share passwords with others.<\/p>\n\n\n\n<p>In order to recognize phishing attempts, employees must be trained and made aware of the risks. In order to report phishing, organizations require an infrastructure and organizational escalation processes to do so. Patching routines must be developed, followed and monitored. &nbsp;In order to implement MFA, organizations require the will, resources and time. These are some examples of why \u201ceasy\u201d to comprehend is not the same as \u201ceasy\u201d to see through and implement in an organization.<\/p>\n\n\n\n<p>For those reasons, a strong cybersecurity program requires these additional steps to succeed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Knowledge and Leadership.<\/strong> Management and a Board that understands and is knowledgeable about the risks and regulatory environment.\u00a0A leader in charge and accountable for data security, who has the backing and resources to meet the risks the organization faces.<\/li>\n\n\n\n<li><strong>Incident preparedness.<\/strong> Incidents will happen; organizations need to have a plan in place that addresses the possible sequence of events, who the internal and external team will consist of and how and when to deploy resources. This includes knowing, assessing and obtaining appropriate insurance coverage and coinciding risk assessment. It also includes considering any unique aspects to your organization or business that could complicate an incident response. For example \u2013 is there a key customer relationship; are their systems that are particularly vulnerable or house particularly sensitive information?<\/li>\n\n\n\n<li><strong>Privacy Awareness<\/strong>. Strong security will help organizations be compliant with privacy laws. Knowledge of and compliance with privacy laws will help organizations manage and protect data according to sensitivity, as well as the incident and prioritize resources.<\/li>\n\n\n\n<li><strong>Vendors and Customers.<\/strong> Provisions in contracts with vendors and customers should reflect the needs of the organizations, including provisions that enable contractual and regulatory compliance.<br><strong>The Data<\/strong>. Know the data you possess. This is part of incident preparedness but goes further. Understanding data is part of risk mitigation and data governance.<\/li>\n\n\n\n<li><strong>Allocating sufficient resources<\/strong>. Once the organization understands the risks, appropriate resource allocation will follow, including assessment of cyber insurance needs.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>To kick-off this year\u2019s cyber awareness month, we wanted to present an article that would look back on the past year along with our experience counseling organizations, large and small across all sectors, through the ordeal of cyberattacks, data extortion scenarios and other data security incidents. The intention of this article is to set out [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-6204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"To kick-off this year\u2019s cyber awareness month, we wanted to present an article that would look back on the past year along with our experience counseling organizations, large and small across all sectors, through the ordeal of cyberattacks, data extortion scenarios and other data security incidents. The intention of this article is to set out [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-30T20:36:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-30T00:09:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1776\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katherine Chan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katherine Chan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\"},\"author\":{\"name\":\"Katherine Chan\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\"},\"headline\":\"Tactical and strategic steps for successful cyber incident preparedness\",\"datePublished\":\"2022-09-30T20:36:44+00:00\",\"dateModified\":\"2025-12-30T00:09:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\"},\"wordCount\":850,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\",\"name\":\"Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2022-09-30T20:36:44+00:00\",\"dateModified\":\"2025-12-30T00:09:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tactical and strategic steps for successful cyber incident preparedness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\",\"name\":\"Katherine Chan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"caption\":\"Katherine Chan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/","og_locale":"en_US","og_type":"article","og_title":"Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson","og_description":"To kick-off this year\u2019s cyber awareness month, we wanted to present an article that would look back on the past year along with our experience counseling organizations, large and small across all sectors, through the ordeal of cyberattacks, data extortion scenarios and other data security incidents. The intention of this article is to set out [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2022-09-30T20:36:44+00:00","article_modified_time":"2025-12-30T00:09:37+00:00","og_image":[{"width":1776,"height":994,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","type":"image\/jpeg"}],"author":"Katherine Chan","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Katherine Chan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/"},"author":{"name":"Katherine Chan","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6"},"headline":"Tactical and strategic steps for successful cyber incident preparedness","datePublished":"2022-09-30T20:36:44+00:00","dateModified":"2025-12-30T00:09:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/"},"wordCount":850,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/","name":"Tactical and strategic steps for successful cyber incident preparedness | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2022-09-30T20:36:44+00:00","dateModified":"2025-12-30T00:09:37+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Tactical and strategic steps for successful cyber incident preparedness"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6","name":"Katherine Chan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","caption":"Katherine Chan"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=6204"}],"version-history":[{"count":0,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6204\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=6204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=6204"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=6204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}