{"id":13891,"date":"2017-08-25T09:45:24","date_gmt":"2017-08-25T08:45:24","guid":{"rendered":"https:\/\/www.policybee.co.uk\/blog\/?p=13891"},"modified":"2025-10-14T14:45:26","modified_gmt":"2025-10-14T13:45:26","slug":"cyber-insurance-for-it-industry","status":"publish","type":"post","link":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry","title":{"rendered":"Cyber insurance for IT industry"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\" alt=\"\" class=\"wp-image-19162\" style=\"width:300px;height:150px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock-300x150.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p>For all the IT good guys out there, there\u2019s an awful lot of bad guys too.<\/p>\n\n\n\n<p>Cyber criminals won\u2019t hesitate to prey on their tech-savvy comrades if there\u2019s a quick buck in it.&nbsp;All it takes is a small chink in the security armour and they&#8217;re crawling across servers, spreading viruses, and doing their worst.<\/p>\n\n\n\n<p>And what if <em>your<\/em> system gets hacked? Embarrassing? Probably. Expensive? Definitely.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Delayed kick-off<\/strong><\/h2>\n\n\n\n<p>Take the case of one software developer with a growing client list and a growing reputation. With the live date looming for a new online ticket system it had developed for a big-name local football club, staff came in to find their system in lockdown.<\/p>\n\n\n\n<p>Criminals had infected it with ransomware after a junior employee had innocently visited a website that had itself been hacked. An unknown vulnerability in its software meant the criminals could access its servers, encrypting files and demanding a bitcoin ransom to unlock them.<\/p>\n\n\n\n<p>Cue panic.<\/p>\n\n\n\n<p>The encrypted files were vital to the work it was doing for the football club. The new ticket system was due to go live that week and, if ticket chaos ensued and word got out to the press, there\u2019d be a lot of unhappy football fans.<\/p>\n\n\n\n<p>More importantly, there\u2019d also be a claim for damages from the club, and the IT company\u2019s reputation could be ruined.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber insurance is the fingertip save for IT&nbsp;<\/strong><\/h2>\n\n\n\n<p>A potential own goal then. Except the company\u2019s IT <a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noopener noreferrer\">cyber insurance<\/a> kicked into action, providing practical help and reassurance.<\/p>\n\n\n\n<p>Here\u2019s what happened:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>First, it paid for a skilled negotiator to make contact with the hackers and to talk to them in their own language. Cost: <strong>\u00a31,500<\/strong><\/li>\n\n\n\n<li>Second, once it became clear there was no other solution to what was an increasingly tense situation, it covered the ransom amount. Cost: <strong>\u00a33,000<\/strong><\/li>\n\n\n\n<li>Third, it provided a forensic expert to trawl through the developer\u2019s systems, finding and fixing the Achilles heel the hackers used as their entry point. Cost: <strong>\u00a33,500<\/strong>.<\/li>\n\n\n\n<li>Finally, because the company had added on optional cyber business interruption insurance, it paid out a carefully calculated sum to cover their loss of income and extra working costs. Cost:<strong> \u00a3500 a day for three days<\/strong>.<\/li>\n<\/ol>\n\n\n\n<p>That\u2019s a hefty <strong>\u00a39,500<\/strong> in total.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Relegation threat<\/strong><\/h2>\n\n\n\n<p>It all could\u2019ve been so much worse, too. Think about a scenario where someone at the software company has to deal with the hackers direct, without any real notion of how to approach the negotiation.<\/p>\n\n\n\n<p>Things could quite easily have gone horribly wrong. And that could have led to the ransom demand being ratcheted up. Or the hackers simply walking away, leaving permanently encrypted files and a ruined project in their wake.<\/p>\n\n\n\n<p>Plus, if the forensic expert hadn\u2019t been on hand to detect and fix the weakness in the system, it would have left the IT company vulnerable to further attacks.<\/p>\n\n\n\n<p>Finally, there\u2019s the question of what would have happened to the IT company\u2019s business prospects had the new ticketing system not been delivered on time. Its reputation would no doubt have taken quite a knock once news of the hack got out, potentially putting paid to lucrative new contracts \u2013 both with the club and others.<\/p>\n\n\n\n<p>All of which goes to show, being match fit and adopting the right tactics goes a long way.<\/p>\n\n\n\n<p>To be covered for things like cyber-attacks, you need to make sure you&#8217;re covered for cybercrime. Check your policy, because it&#8217;s often an added extra. <\/p>\n\n\n\n<p>Read more about <a href=\"https:\/\/www.policybee.co.uk\/blog\/what-is-cyber-insurance-and-what-does-it-cover\" target=\"_blank\" rel=\"noreferrer noopener\">what is cyber insurance<\/a> and what it covers. <\/p>\n\n\n\n<p><br><em>Image used under license from Shutterstock.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For all the IT good guys out there, there\u2019s an awful lot of bad guys too. Cyber criminals won\u2019t hesitate to prey on their tech-savvy comrades if there\u2019s a quick buck in it.&nbsp;All it takes is a small chink in &hellip; <a href=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[288],"tags":[45,300,158,162,161],"class_list":["post-13891","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","tag-claims-2","tag-cyber-insurance-2","tag-cyber-insurance","tag-it-and-technology","tag-it-contractors"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Cyber insurance for IT industry<\/title>\r\n<meta name=\"description\" content=\"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Cyber insurance for IT industry\" \/>\r\n<meta property=\"og:description\" content=\"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry\" \/>\r\n<meta property=\"og:site_name\" content=\"PolicyBee news and risk advice\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-08-25T08:45:24+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-10-14T13:45:26+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"300\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Kate Naqvi\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:site\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Naqvi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry\"},\"author\":{\"name\":\"Kate Naqvi\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/02f6db3fba7701d6c2445913ab17816b\"},\"headline\":\"Cyber insurance for IT industry\",\"datePublished\":\"2017-08-25T08:45:24+00:00\",\"dateModified\":\"2025-10-14T13:45:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry\"},\"wordCount\":608,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\",\"keywords\":[\"claims\",\"cyber insurance\",\"cyber liability insurance\",\"IT and technology\",\"IT contractors\"],\"articleSection\":[\"Cyber insurance\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry\",\"name\":\"Cyber insurance for IT industry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\",\"datePublished\":\"2017-08-25T08:45:24+00:00\",\"dateModified\":\"2025-10-14T13:45:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/02f6db3fba7701d6c2445913ab17816b\"},\"description\":\"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#primaryimage\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg\",\"width\":600,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-for-it-industry#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber insurance for IT industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/\",\"name\":\"PolicyBee news and risk advice\",\"description\":\"Articles and information on professional indemnity insurance, small business news and risk management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/02f6db3fba7701d6c2445913ab17816b\",\"name\":\"Kate Naqvi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g\",\"caption\":\"Kate Naqvi\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber insurance for IT industry","description":"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry","og_locale":"en_GB","og_type":"article","og_title":"Cyber insurance for IT industry","og_description":"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.","og_url":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry","og_site_name":"PolicyBee news and risk advice","article_published_time":"2017-08-25T08:45:24+00:00","article_modified_time":"2025-10-14T13:45:26+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg","type":"image\/jpeg"}],"author":"Kate Naqvi","twitter_card":"summary_large_image","twitter_creator":"@PolicyBee","twitter_site":"@PolicyBee","twitter_misc":{"Written by":"Kate Naqvi","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#article","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry"},"author":{"name":"Kate Naqvi","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/02f6db3fba7701d6c2445913ab17816b"},"headline":"Cyber insurance for IT industry","datePublished":"2017-08-25T08:45:24+00:00","dateModified":"2025-10-14T13:45:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry"},"wordCount":608,"commentCount":0,"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg","keywords":["claims","cyber insurance","cyber liability insurance","IT and technology","IT contractors"],"articleSection":["Cyber insurance"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry","url":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry","name":"Cyber insurance for IT industry","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#primaryimage"},"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg","datePublished":"2017-08-25T08:45:24+00:00","dateModified":"2025-10-14T13:45:26+00:00","author":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/02f6db3fba7701d6c2445913ab17816b"},"description":"Even IT businesses are vulnerable to cybercrime. Cyber insurance for IT could help avoid things going horribly wrong in the event of an attack.","breadcrumb":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#primaryimage","url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg","contentUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/ransomware-concept-computer-laptop_graphic_shutterstock.jpg","width":600,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-for-it-industry#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policybee.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Cyber insurance for IT industry"}]},{"@type":"WebSite","@id":"https:\/\/www.policybee.co.uk\/blog\/#website","url":"https:\/\/www.policybee.co.uk\/blog\/","name":"PolicyBee news and risk advice","description":"Articles and information on professional indemnity insurance, small business news and risk management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policybee.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/02f6db3fba7701d6c2445913ab17816b","name":"Kate Naqvi","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a33feb6cf67ac6e21b99012a2d84120bda44ab9a697ad10265385d5fb819943?s=96&d=mm&r=g","caption":"Kate Naqvi"}}]}},"_links":{"self":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=13891"}],"version-history":[{"count":18,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13891\/revisions"}],"predecessor-version":[{"id":26381,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13891\/revisions\/26381"}],"wp:attachment":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=13891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=13891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=13891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}