{"id":13921,"date":"2024-03-06T14:57:14","date_gmt":"2024-03-06T14:57:14","guid":{"rendered":"https:\/\/www.policybee.co.uk\/blog\/?p=13921"},"modified":"2025-10-14T14:41:00","modified_gmt":"2025-10-14T13:41:00","slug":"cyber-insurance-management-consultants","status":"publish","type":"post","link":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants","title":{"rendered":"Cyber insurance for management consultants"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg\" alt=\"Cyber insurance for management consultants protects you from the outcomes of data breaches, which can be caused by cyber-attacks, like phishing emails\" class=\"wp-image-19169\" style=\"width:300px;height:150px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic-300x150.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p>Data theft. It\u2019s the kind of thing that only hits the big guns, isn\u2019t it? Like the <a href=\"http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/hack-cyber-attack-ukraine-russia-wannacry-petya-security-internet-broken-computer-not-working-a7810626.html\" target=\"_blank\" rel=\"noreferrer noopener\">WPPs and Maersks<\/a> of this world. The kind of mega corporations that might actually have some information worth stealing.<\/p>\n\n\n\n<p>Not a lowly management consultant from the south of England, right?<\/p>\n\n\n\n<p>Wrong, unfortunately. Because it seems these days even the little guys can have their confidential data targeted.<\/p>\n\n\n\n<p>In fact, <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\">cyber-attacks affected almost a third of UK businesses in 2023<\/a>. But why target small businesses? Simple. They\u2019re quick and easy to breach.<\/p>\n\n\n\n<p>That\u2019s why it pays to protect yourself. Like the unfortunate person in our example below should have done\u2026<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Warning signs<\/strong><\/h2>\n\n\n\n<p>In the case of our management consultant, the first she knew of anything being amiss was when she took an irate call from a software client. It seemed their secret strategy for launching a string of new products \u2013 a strategy they\u2019d devised with the help of our consultant \u2013 was suddenly out in the open.<\/p>\n\n\n\n<p>Then came another ear-bashing, this time from a high-profile fashion retailer with a big online presence. A &#8216;<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/white-hat\" target=\"_blank\" rel=\"noreferrer noopener\">white-hat hacker<\/a>&#8216; had contacted them with a tip-off that their business plan for the coming year was up for sale to the highest bidder on the dark web.<\/p>\n\n\n\n<p>A big problem then, because that business plan was also our management consultant\u2019s handiwork \u2013 that meant she was the common link.<\/p>\n\n\n\n<p>The obvious conclusion was that that she\u2019d been the victim of a data breach. A cybercriminal had managed to find a way into her cloud storage, probably via a <a href=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">phishing email or similar social engineering attack<\/a>.<\/p>\n\n\n\n<p>Even more worrying for her, because there were confidential sales figures, pricing strategies, profit projections and all sorts on there. And not just for the clients whose data had already been targeted \u2013 there were plenty of others whose information could be vulnerable too.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The right call<\/strong><\/h2>\n\n\n\n<p>Our beleaguered management consultant began to dread hearing the phone ring again. So she did the sensible thing and used it to call her insurance broker instead. At that point, her <a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance<\/a> for management consultants policy took over:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firstly, a forensic investigation of the management consultant\u2019s laptop revealed that she had fallen for a phishing email. This fake email, made to look like her cloud storage provider, prompted her to enter her account details for security reasons. Once she did this, a cybercriminal had immediate access to her account. From there, they could leak her data. <\/li>\n\n\n\n<li>The forensic expert recommended some training to prevent this happening again in the future. He also installed a password manager for her and instructed her on the best practices of setting strong passwords.<\/li>\n\n\n\n<li>Thankfully, the insurance paid for a replacement laptop while the investigation was ongoing, allowing our management consultant to keep on working. Cost: <strong>\u00a3600<\/strong>.<\/li>\n\n\n\n<li>Once the reason for the leak was traced, the police got involved. They were able to remove the online listings for the data and find out who the cybercriminal was. That meant no other clients were affected, saving our management consultant a potential <strong>\u00a327,000<\/strong> in terms of lost business.<\/li>\n\n\n\n<li>As it was, of the two clients whose data was offered for sale, only one sued. Thanks to the white-hat hacker\u2019s intervention, the fashion retailer\u2019s business plan never ended up in the hands of anyone who could use it. And even though the software client did sue (albeit unsuccessfully), our management consultant\u2019s cyber insurance covered her legal costs \u2013 a total of <strong>\u00a37,500<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>Total saved: <strong>\u00a335,100<\/strong>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Wake up call<\/strong><\/h2>\n\n\n\n<p>In our example, we gave you a total cost of the data breach our unfortunate management consultant suffered. And how much cyber insurance for management consultants saved her.<\/p>\n\n\n\n<p>In reality, the total cost of a data breach for small businesses is difficult to pin down. There are so many different factors involved.<\/p>\n\n\n\n<p>Here\u2019s a more <a href=\"https:\/\/www.policybee.co.uk\/blog\/average-cost-of-data-breach-for-small-business\" target=\"_blank\" rel=\"noreferrer noopener\">in-depth look at the cost of data breaches and cyber-attacks<\/a>, so you can get a better idea of how things are looking.<\/p>\n\n\n\n<p>Looking for some more guidance? The <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Cyber Security Center<\/a> (NCSC) is a great resource for cybersecurity advice.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber insurance for management consultants<\/strong><\/h2>\n\n\n\n<p>Unfortunately, it\u2019s becoming all too common for management consultants and other small businesses to be affected by cybercrime. Being prepared is the best way to protect yourself. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber insurance<\/a> for management consultants is the perfect way to do this. Make sure you have crime cover added to your policy, it doesn&#8217;t always come as standard &#8211; that&#8217;s what you&#8217;ll need to be covered for things like social engineering.<\/p>\n\n\n\n<p>Just like in our example, it\u2019ll pay to help you get your business back on its feet. To talk more about it, give us a call on <strong>0345 222 5391<\/strong>. <br><br><em>Image used under license from Shutterstock.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data theft. It\u2019s the kind of thing that only hits the big guns, isn\u2019t it? Like the WPPs and Maersks of this world. The kind of mega corporations that might actually have some information worth stealing. Not a lowly management &hellip; <a href=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[288,290,132],"tags":[205,45,300,158,237,137],"class_list":["post-13921","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","category-self-employed-and-freelance-advice","category-small-business-advice","tag-business-and-management-consultants","tag-claims-2","tag-cyber-insurance-2","tag-cyber-insurance","tag-freelancers","tag-insurance-explained"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Cyber insurance for management consultants<\/title>\r\n<meta name=\"description\" content=\"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Cyber insurance for management consultants\" \/>\r\n<meta property=\"og:description\" content=\"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants\" \/>\r\n<meta property=\"og:site_name\" content=\"PolicyBee news and risk advice\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-03-06T14:57:14+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-10-14T13:41:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"300\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Pete Warner\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:site\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Warner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants\"},\"author\":{\"name\":\"Pete Warner\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"headline\":\"Cyber insurance for management consultants\",\"datePublished\":\"2024-03-06T14:57:14+00:00\",\"dateModified\":\"2025-10-14T13:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants\"},\"wordCount\":798,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/data-theft-phishing-concept_shutterstock_graphic.jpg\",\"keywords\":[\"business and management consultants\",\"claims\",\"cyber insurance\",\"cyber liability insurance\",\"freelancers\",\"insurance explained\"],\"articleSection\":[\"Cyber insurance\",\"Self-employed &amp; freelance advice\",\"Small business advice\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants\",\"name\":\"Cyber insurance for management consultants\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/data-theft-phishing-concept_shutterstock_graphic.jpg\",\"datePublished\":\"2024-03-06T14:57:14+00:00\",\"dateModified\":\"2025-10-14T13:41:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"description\":\"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#primaryimage\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/data-theft-phishing-concept_shutterstock_graphic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/data-theft-phishing-concept_shutterstock_graphic.jpg\",\"width\":600,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/cyber-insurance-management-consultants#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber insurance for management consultants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/\",\"name\":\"PolicyBee news and risk advice\",\"description\":\"Articles and information on professional indemnity insurance, small business news and risk management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\",\"name\":\"Pete Warner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"caption\":\"Pete Warner\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber insurance for management consultants","description":"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants","og_locale":"en_GB","og_type":"article","og_title":"Cyber insurance for management consultants","og_description":"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.","og_url":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants","og_site_name":"PolicyBee news and risk advice","article_published_time":"2024-03-06T14:57:14+00:00","article_modified_time":"2025-10-14T13:41:00+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg","type":"image\/jpeg"}],"author":"Pete Warner","twitter_card":"summary_large_image","twitter_creator":"@PolicyBee","twitter_site":"@PolicyBee","twitter_misc":{"Written by":"Pete Warner","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#article","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants"},"author":{"name":"Pete Warner","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"headline":"Cyber insurance for management consultants","datePublished":"2024-03-06T14:57:14+00:00","dateModified":"2025-10-14T13:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants"},"wordCount":798,"commentCount":0,"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg","keywords":["business and management consultants","claims","cyber insurance","cyber liability insurance","freelancers","insurance explained"],"articleSection":["Cyber insurance","Self-employed &amp; freelance advice","Small business advice"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants","url":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants","name":"Cyber insurance for management consultants","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#primaryimage"},"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg","datePublished":"2024-03-06T14:57:14+00:00","dateModified":"2025-10-14T13:41:00+00:00","author":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"description":"Find out how cyber insurance for management consultants saved one unlucky person from a tricky data breach. And the costs that came after.","breadcrumb":{"@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#primaryimage","url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg","contentUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2017\/08\/data-theft-phishing-concept_shutterstock_graphic.jpg","width":600,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.policybee.co.uk\/blog\/cyber-insurance-management-consultants#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policybee.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Cyber insurance for management consultants"}]},{"@type":"WebSite","@id":"https:\/\/www.policybee.co.uk\/blog\/#website","url":"https:\/\/www.policybee.co.uk\/blog\/","name":"PolicyBee news and risk advice","description":"Articles and information on professional indemnity insurance, small business news and risk management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policybee.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0","name":"Pete Warner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","caption":"Pete Warner"}}]}},"_links":{"self":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=13921"}],"version-history":[{"count":30,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13921\/revisions"}],"predecessor-version":[{"id":26955,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13921\/revisions\/26955"}],"wp:attachment":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=13921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=13921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=13921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}