{"id":6226,"date":"2022-10-11T16:00:00","date_gmt":"2022-10-11T20:00:00","guid":{"rendered":"https:\/\/www.millerthomson.com\/incident-response\/"},"modified":"2025-12-29T18:10:10","modified_gmt":"2025-12-29T23:10:10","slug":"incident-response","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/","title":{"rendered":"A to-do list for incident response"},"content":{"rendered":"\n<p>Cybersecurity incidents and data breaches arise without notice. Your organization may have fallen victim to a cyberattack or you may have received notice from a supplier that they have been attacked. Or perhaps a key employee has lost an unencrypted device that may have contained confidential business information or customer data. There are many examples of how an organization may be faced with the daunting task of investigating an incident, communicating with stakeholders, and plugging the holes that led to the situation.<\/p>\n\n\n\n<p>These incidents require swift and decisive action in a context that is often lacking complete information or certainty of any kind. There may be competing interests among your stakeholders, both internally and externally. It is trite to say that cooler heads will prevail, but that has been our experience.<\/p>\n\n\n\n<p>The following is a list of tasks that will help you put together an approach for responding to an incident. We will also highlight some \u201cdon\u2019ts\u201d to stay away from. Some of these workstreams will need to run in parallel; this is not a sequential list of steps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don\u2019t ignore warning signs and escalate any suspicious activity internally<\/h2>\n\n\n\n<p>If you witness signs of suspicious activity or intrusion, do not ignore them. Instead, quickly escalate security concerns internally. This may include your Chief Information Security Officer (CISO), Chief Risk Officer, legal counsel and\/or privacy officer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Put together an incident response team<\/h2>\n\n\n\n<p>An incident response team is made up of key players in your organization as well as external cybersecurity experts and your legal counsel\/breach coach.<\/p>\n\n\n\n<p>If you do not have a playbook or plan to follow, identify the individuals internally that need to be involved in the management of this incident. These may include your CEO, CISO, Chief Risk Officer, in-house legal counsel and\/or privacy officer.<\/p>\n\n\n\n<p>If you have an incident response plan and have triggered the appropriate playbook, follow the steps. It is there for a reason.<\/p>\n\n\n\n<p>Importantly, someone needs to be in charge of managing the incident internally. One cannot outsource accountability in these instances.<\/p>\n\n\n\n<p>If you already retained external cybersecurity experts and legal counsel, reach out as soon as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Engage your insurance provider<\/h2>\n\n\n\n<p>Engage with insurance provider; review insurance policies that may be triggered. Your insurance provider can also help you with qualified cybersecurity experts should you not already have a team and plan in place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Contain and investigate the breach<\/h2>\n\n\n\n<p>External cybersecurity experts will be tasked with identifying how to protect systems and data from further exposure and identifying the security vulnerability that allowed for the attack. They will work to contain and investigate the breach from a cybersecurity lens.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understand your statutory obligations<\/h2>\n\n\n\n<p>Legal counsel will assist in ensuring your organization understands its statutory obligations in federal, provincial, international and sector-specific privacy law. These may include mandatory reporting, notification, and record keeping obligations, among others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Communicate with key stakeholders and employees<\/h2>\n\n\n\n<p>Communication is an important part of incident response \u2013 incidents cannot simply be brushed under the rug with the hope that no one finds out. However, keep in mind that it is important not to jump the gun on detailed communications. Don\u2019t speculate in communications &#8212; it is perfectly acceptable to be transparent about the fact that an investigation is ongoing and will take time to complete.<\/p>\n\n\n\n<p>If you haven\u2019t already, notify the board as appropriate and communicate with employees that an incident occurred.<\/p>\n\n\n\n<p>Identify key external stakeholders, which may include key customers that you want to share this information with before they hear it from another source.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Notify, as appropriate<\/h2>\n\n\n\n<p>Consider notification obligations to notify individuals whose personal information has been compromised.<\/p>\n\n\n\n<p>There may be contractual obligations to notify. These obligations may or may not be triggered by the event and they may or may not contain prescriptive timelines. If these contracts were not reviewed in advance, identify someone who can review and provide legal advice on how this impacts the response.<\/p>\n\n\n\n<p>In addition to contractual obligations, there are legal obligations in federal, provincial, international and sector-specific privacy law. These will depend on whether the information at issue is personal information or personal health information, for example. Privacy legislation may also require notifying privacy commissioners, depending on the risk of harm. Consult with your legal counsel to determine these obligations and notify accordingly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preserve evidence and maintain privilege over communications<\/h2>\n\n\n\n<p>Along the way, it is important to document actions and decisions made during the incident, preserve evidence and maintain privilege over communications. In the event of a law suit or investigation by a privacy commissioner, this will serve your organization well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Monitor<\/h2>\n\n\n\n<p>Cyber incidents often generate media attention that may be harmful for your business. Monitor media and prepare for potential reactive or proactive statements. It will be helpful to work with your breach coach in drafting these statements.<\/p>\n\n\n\n<p>As well, in the case of malicious actors, monitor the web and dark web to ensure stolen information does not find its way onto the internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn for next time and conduct a post-incident assessment<\/h2>\n\n\n\n<p>Once operations are back to normal, reflect on the process. What worked well? What didn\u2019t? Draft an incident response plan or work these into your existing incident response plan to ensure your organization is better equipped in case of another attack.<\/p>\n\n\n\n<p>Review information provided by cybersecurity experts to harden systems and improve security including but not limited to the addition of increased technology safeguards, employee cybersecurity training, and regular system maintenance. Keep track of these improvements.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>If you have any questions about incident response, our <a title=\"Privacy, Data Protection and Cybersecurity\" href=\"https:\/\/www.millerthomson.com\/en\/our-services\/services\/privacy-data-protection-cybersecurity\/\">Privacy, Data Protection and Cybersecurity<\/a> team are here to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity incidents and data breaches arise without notice. Your organization may have fallen victim to a cyberattack or you may have received notice from a supplier that they have been attacked. Or perhaps a key employee has lost an unencrypted device that may have contained confidential business information or customer data. There are many examples [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-6226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A to-do list for incident response | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A to-do list for incident response | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity incidents and data breaches arise without notice. Your organization may have fallen victim to a cyberattack or you may have received notice from a supplier that they have been attacked. Or perhaps a key employee has lost an unencrypted device that may have contained confidential business information or customer data. There are many examples [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-11T20:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-29T23:10:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1776\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katherine Chan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katherine Chan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\"},\"author\":{\"name\":\"Katherine Chan\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\"},\"headline\":\"A to-do list for incident response\",\"datePublished\":\"2022-10-11T20:00:00+00:00\",\"dateModified\":\"2025-12-29T23:10:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\",\"name\":\"A to-do list for incident response | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2022-10-11T20:00:00+00:00\",\"dateModified\":\"2025-12-29T23:10:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A to-do list for incident response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\",\"name\":\"Katherine Chan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"caption\":\"Katherine Chan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A to-do list for incident response | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/","og_locale":"en_US","og_type":"article","og_title":"A to-do list for incident response | Miller Thomson","og_description":"Cybersecurity incidents and data breaches arise without notice. Your organization may have fallen victim to a cyberattack or you may have received notice from a supplier that they have been attacked. Or perhaps a key employee has lost an unencrypted device that may have contained confidential business information or customer data. There are many examples [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2022-10-11T20:00:00+00:00","article_modified_time":"2025-12-29T23:10:10+00:00","og_image":[{"width":1776,"height":994,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","type":"image\/jpeg"}],"author":"Katherine Chan","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Katherine Chan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/"},"author":{"name":"Katherine Chan","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6"},"headline":"A to-do list for incident response","datePublished":"2022-10-11T20:00:00+00:00","dateModified":"2025-12-29T23:10:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/"},"wordCount":940,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/","name":"A to-do list for incident response | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2022-10-11T20:00:00+00:00","dateModified":"2025-12-29T23:10:10+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"A to-do list for incident response"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6","name":"Katherine Chan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","caption":"Katherine Chan"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=6226"}],"version-history":[{"count":0,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6226\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=6226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=6226"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=6226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}