{"id":1134,"date":"2025-11-04T11:02:51","date_gmt":"2025-11-04T11:02:51","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=1134"},"modified":"2025-11-05T09:26:29","modified_gmt":"2025-11-05T09:26:29","slug":"how-to-calculate-data-breaches","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/","title":{"rendered":"How to Calculate Data Breaches\u00a0"},"content":{"rendered":"<h1><b>How to Calculate Data Breaches\u00a0<\/b><\/h1>\n<p><b>The cost of a data breach depends on an organization\u2019s size, industry, and readiness &#8211; ranging from minor downtime for a small business to massive losses or fines for larger, data-sensitive organizations.<\/b><\/p>\n<hr \/>\n<h1><b>What is a Data Breach?<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">The <\/span><b>cost of a data breach<\/b><span style=\"font-weight: 400;\"> is shaped by multiple direct and indirect factors that together determine the financial, operational, and reputational impact on an organization. These costs can vary greatly depending on the industry, size of the organization, and how well-prepared it is to respond.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A small HVAC business barely notices and lost nothing but the cost of the owners\u2019 time after a breach. A high end clothing store loses hundreds of thousands from not making sales for a day. A hospital may have huge fines due to data exfiltration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each year, IBM publishes its <\/span><a href=\"https:\/\/www.ibm.com\/security\/data-breach\"><span style=\"font-weight: 400;\">Cost of a Data Breach Report<\/span><\/a><span style=\"font-weight: 400;\">, where, based on analyzed data from companies and organizations in different sectors, it estimates the cost of a data breach per record.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following interesting conclusions, among others, can be drawn from the data in these reports:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>cost of a data breach had the largest increase in 2021<\/b><span style=\"font-weight: 400;\"> from $3.86M in 2020 to $4.24M in 2021.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>cost per register increased 10.3%<\/b><span style=\"font-weight: 400;\"> from 2020 ($146 per registration) to 2021 ($161 per registration), increasing from 14.2% in 2017.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>Top 5 countries\/regions<\/b><span style=\"font-weight: 400;\"> with the highest cost per breach are: USA, Middle East, Canada, Germany and Japan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>By sector, Healthcare is the most affected<\/b><span style=\"font-weight: 400;\"> over the last 11 years, increasing by 29.5% from 2020 to 2021. In the Top 5, followed by Finance, Pharmaceuticals, Technology and Energy.<\/span><\/li>\n<\/ul>\n<hr \/>\n<h1><b>What Are the Top Causes of Data Breaches?<\/b><\/h1>\n<ol>\n<li><b> Human Error<\/b><\/li>\n<li><b> Phishing and Social Engineering<\/b><\/li>\n<li><b> Weak or Stolen Passwords<\/b><\/li>\n<li><b> Malware and Ransomware<\/b><\/li>\n<li><b> Insider Threats<\/b><\/li>\n<li><b> Unpatched Software and System Vulnerabilities<\/b><\/li>\n<li><b> Misconfigured Cloud Services<\/b><\/li>\n<li><b>Third-Party Vendor Compromise<\/b><\/li>\n<li><b>Physical Theft or Loss of Devices<\/b><\/li>\n<li><b>Advanced Persistent Threats (APTs)<\/b><\/li>\n<\/ol>\n<h1><b>Key Factors that Form the Total Cost of a Data Breach<\/b><\/h1>\n<h3 data-start=\"138\" data-end=\"181\"><strong data-start=\"142\" data-end=\"179\">1. Detection and Escalation Costs<\/strong><\/h3>\n<p data-start=\"182\" data-end=\"480\">These are the expenses associated with identifying, investigating, and containing a breach. They include forensic analysis, incident response, and security assessments needed to determine the scope and source of the attack. The longer a breach goes undetected, the higher these costs tend to climb.<\/p>\n<h3 data-start=\"182\" data-end=\"480\"><strong data-start=\"491\" data-end=\"516\">2. Notification Costs<\/strong><\/h3>\n<p data-start=\"519\" data-end=\"795\">Organizations are legally required to inform affected customers, regulators, and sometimes the public about a data breach. Costs include preparing notifications, call centers, legal consultations, and public relations efforts to manage communication and maintain transparency.<\/p>\n<h3 data-start=\"802\" data-end=\"841\"><strong data-start=\"806\" data-end=\"839\">3. Post-Breach Response Costs<\/strong><\/h3>\n<p data-start=\"842\" data-end=\"1121\">After a breach, companies must focus on remediation and support for affected individuals. This includes credit monitoring services, identity theft protection, compensation, and customer retention efforts. These costs aim to rebuild trust and reduce long-term reputational damage.<\/p>\n<h3 data-start=\"1128\" data-end=\"1160\"><strong data-start=\"1132\" data-end=\"1158\">4. Lost Business Costs<\/strong><\/h3>\n<p data-start=\"1161\" data-end=\"1437\">Lost business often represents the largest portion of breach-related expenses. Downtime, disrupted operations, and loss of customer confidence can all result in significant revenue loss. Reputational harm may also lead to decreased customer loyalty and market share over time.<\/p>\n<h3 data-start=\"1444\" data-end=\"1483\"><strong data-start=\"1448\" data-end=\"1481\">5. Regulatory and Legal Costs<\/strong><\/h3>\n<p data-start=\"1484\" data-end=\"1777\">Violations of data protection laws can lead to hefty fines, penalties, and lawsuits. Legal costs include settlements, litigation, and compliance improvements required by regulators. These can escalate quickly, especially in industries with strict privacy standards like healthcare and finance.<\/p>\n<h3 data-start=\"1784\" data-end=\"1816\"><strong data-start=\"1788\" data-end=\"1814\">6. Reputational Damage<\/strong><\/h3>\n<p data-start=\"1817\" data-end=\"2103\">A breach can severely damage public trust and brand reputation. Customers may question an organization\u2019s ability to protect their data, leading to churn and negative publicity. Restoring reputation often requires substantial investment in marketing, transparency, and improved security.<\/p>\n<h3 data-start=\"2110\" data-end=\"2163\"><strong data-start=\"2114\" data-end=\"2161\">7. Security and Infrastructure Improvements<\/strong><\/h3>\n<p data-start=\"2164\" data-end=\"2432\">Following a breach, organizations typically invest heavily in upgrading security systems, training staff, and enhancing monitoring capabilities. While these improvements strengthen resilience, they add to the total cost of recovery and prevention for future incidents.<\/p>\n<h1 data-start=\"2164\" data-end=\"2432\"><strong>Contextual Factors That Influence Total Cost<\/strong><\/h1>\n<hr \/>\n<p><span style=\"font-weight: 400;\">Certain variables significantly affect the magnitude of a breach\u2019s financial impact:<\/span><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><b>Factor<\/b><\/td>\n<td><b>Impact<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Industry<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Heavily regulated sectors (healthcare, finance) face higher costs.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Type of Data Compromised<\/b><\/td>\n<td><span style=\"font-weight: 400;\">PII (personally identifiable info) and financial data cost more than non-sensitive data.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Number of Records Breached<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Costs scale with the number of affected records.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Incident Response Preparedness<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Companies with incident response plans and teams lower total costs.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Use of AI and Automation in Security<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Faster detection and response reduce overall breach impact.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Third-Party Involvement<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Breaches caused by vendors or partners often increase complexity and cost.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Time to Identify and Contain<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Longer detection and containment times correlate with significantly higher costs.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><b>Conclusion<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Calculating a data breach isn\u2019t just technical &#8211; it\u2019s a multidimensional process blending financial, qualitative, and regulatory insights to build stronger, more resilient digital defenses.<\/span><\/p>\n<h1><b>Monitoring Remote Sessions<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Security monitoring is crucial for preventing ransomware attacks as it enables early detection, identification of vulnerabilities, monitoring for anomalies, data protection, and compliance with regulatory requirements.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.tsfactory.com\/\">RecordTS<\/a> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Calculate Data Breaches\u00a0 The cost of a data breach depends on an organization\u2019s size, industry, and readiness &#8211; ranging from minor downtime for a small business to massive losses or fines for larger, data-sensitive organizations. What is a Data Breach? The cost of a data breach is shaped by multiple direct and indirect [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Calculate Data Breaches\u00a0 - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Calculate Data Breaches\u00a0 - Blogs\" \/>\n<meta property=\"og:description\" content=\"How to Calculate Data Breaches\u00a0 The cost of a data breach depends on an organization\u2019s size, industry, and readiness &#8211; ranging from minor downtime for a small business to massive losses or fines for larger, data-sensitive organizations. What is a Data Breach? The cost of a data breach is shaped by multiple direct and indirect [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-04T11:02:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-05T09:26:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/\",\"name\":\"How to Calculate Data Breaches\u00a0 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg\",\"datePublished\":\"2025-11-04T11:02:51+00:00\",\"dateModified\":\"2025-11-05T09:26:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg\",\"width\":1920,\"height\":1282},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Calculate Data Breaches\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Calculate Data Breaches\u00a0 - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"How to Calculate Data Breaches\u00a0 - Blogs","og_description":"How to Calculate Data Breaches\u00a0 The cost of a data breach depends on an organization\u2019s size, industry, and readiness &#8211; ranging from minor downtime for a small business to massive losses or fines for larger, data-sensitive organizations. What is a Data Breach? The cost of a data breach is shaped by multiple direct and indirect [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-11-04T11:02:51+00:00","article_modified_time":"2025-11-05T09:26:29+00:00","og_image":[{"width":1920,"height":1282,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/","name":"How to Calculate Data Breaches\u00a0 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg","datePublished":"2025-11-04T11:02:51+00:00","dateModified":"2025-11-05T09:26:29+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/10\/hacks.jpg","width":1920,"height":1282},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-calculate-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"How to Calculate Data Breaches\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=1134"}],"version-history":[{"count":16,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1134\/revisions"}],"predecessor-version":[{"id":1151,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1134\/revisions\/1151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/1135"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=1134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=1134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=1134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}