{"id":112831,"date":"2024-04-03T08:58:37","date_gmt":"2024-04-03T08:58:37","guid":{"rendered":"https:\/\/www.harnham.com\/?p=112831"},"modified":"2024-04-05T15:59:34","modified_gmt":"2024-04-05T15:59:34","slug":"how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024","status":"publish","type":"post","link":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/","title":{"rendered":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In 2024, the business world is more connected than ever before. Companies of all sizes are leveraging a vast ecosystem of third-party vendors, suppliers, and partners and this interconnectedness, while driving innovation and efficiency, also exposes organisations to a myriad of risks, particularly regarding data security and privacy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to this, controlling data and third-party risk management has become a critical aspect of modern business strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This <\/span><a href=\"https:\/\/www.harnham.com\/\"><span style=\"font-weight: 400;\">Harnham<\/span><\/a><span style=\"font-weight: 400;\"> blog explores the essential steps and considerations for enterprises aiming to effectively manage third-party data risks.<\/span><\/p>\n<h2>Understanding third-party risk management<\/h2>\n<p><span style=\"font-weight: 400;\">Third-party data risks emerge from the potential security threats and privacy breaches that can arise from sharing sensitive information with external entities. These risks can lead to significant financial losses, legal penalties, and damage to an organization&#8217;s reputation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uber, for example, made headlines in early 2023 when several of their third-party vendors were breached, resulting in the leaking of 80,000+ employee data records, employee communications, and invoices.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_112930\" style=\"width: 914px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-112930\" class=\"wp-image-112930 size-full\" src=\"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-03-095726.png\" alt=\"\" width=\"904\" height=\"691\" srcset=\"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-03-095726.png 904w, https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-03-095726-300x229.png 300w, https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-03-095726-768x587.png 768w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\" \/><p id=\"caption-attachment-112930\" class=\"wp-caption-text\">Source: https:\/\/www.diligent.com\/resources\/blog\/third-party-risk-management-lifecycle<\/p><\/div>\n<p><span style=\"font-weight: 400;\">As regulatory frameworks around data privacy continue to tighten globally, with regulations such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States, the need for robust third-party data risk management is more pronounced than ever.<\/span><\/p>\n<h2>How to keep authority and control over your data<\/h2>\n<p>Keeping that authority and control over your data, even when in the hands of an outside party, is crucial.<\/p>\n<p><span style=\"font-weight: 400;\">Waseem Ali, CEO of Rockborne, said: <\/span><span style=\"font-weight: 400;\">\u201cIf using a third party to store confidential personal data, at a bare-minimum I would expect that third party to abide my business\u2019 policies and frameworks. I would hope they would go further than this, but this would be my minimum expectation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWhether your organisation is able store data with a third-party provider will also depend on the industry you are operating in &#8211; certain industries may have specific requirements or frameworks to abide by. For example, in some the storing data with an outside actor will not be allowed and others may not tolerate data being stored anywhere outside of the UK.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAs a data leader, my biggest concern when using third parties is the minute that the data leaves the organisation, because it then falls out of my control. And ultimately, whether it is in or outside of my control, I still retain liability of that data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cTherefore, if a third party requires access because they are working with me as a consulting organisation for example, I would typically enforce a rule where they use our hardware, systems, and infrastructure. I want them to work in our environment using one of our laptops or a remote desktop, so that I retain authority of, and control over, the risk.\u201d<\/span><\/p>\n<h2>Understanding third-party relationships<\/h2>\n<p><span style=\"font-weight: 400;\">In managing third-party relationships, enterprises in 2024 face an evolving landscape that&#8217;s heavily data-driven. The interconnectivity of services means that data flows through various channels, necessitating a robust framework for third-party risk management. A critical aspect is the comprehensive evaluation of data security practices of third-party vendors to ensure they align with the enterprise&#8217;s standards and regulatory requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To foster secure data exchange, enterprises must establish clear data handling and sharing protocols. Implementing stringent data access controls and regular audits can significantly mitigate potential risks. Additionally, the advent of technologies like blockchain and advanced encryption methods offers new avenues for securing data transfers, ensuring integrity and confidentiality.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, in this digital age, the importance of real-time monitoring cannot be overstated. Leveraging advanced analytics and AI-driven tools enables enterprises to detect potential data breaches and vulnerabilities in real-time, enhancing the responsiveness to threats within the third-party ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Understanding the criticality of these relationships, The National Institute of Standards and Technology <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/05\/nist-updates-cybersecurity-guidance-supply-chain-risk-management\">(NIST) provides updates &#038; guidelines<\/a> that serve as a benchmark for third-party risk management, emphasizing the importance of data security in vendor relationships.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similarly, The International Association of Privacy Professionals (IAPP) offers resources and frameworks to help navigate the complexities of data privacy and protection in third-party engagements, ensuring that enterprises stay ahead in the management of third-party risks in 2024.<\/span><\/p>\n<h2>Compliance Risks<\/h2>\n<p><span style=\"font-weight: 400;\">Compliance risks in third-party risk management have also become a critical concern in 2024. As organizations navigate through complex regulatory environments, ensuring third-party compliance is not just about avoiding penalties but is integral to maintaining trust and reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The GDPR and CCPA are examples of regulations that have heightened the focus on data privacy and security, emphasizing the need for <a href=\"https:\/\/www.standardfusion.com\/resources\/available-standards\/\">stringent compliance measures<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By incorporating robust compliance checks and balances in their third-party risk management strategies, businesses can protect themselves against legal ramifications and safeguard their brand integrity. This approach not only aligns with regulatory demands but also fortifies the enterprise&#8217;s commitment to ethical practices and data protection.<\/span><\/p>\n<h2>Navigating Financial &#038; Reputational Risks<\/h2>\n<p><span style=\"font-weight: 400;\">In the wake of stringent regulations like the GDPR and CCPA, the landscape of third-party risk management is becoming increasingly complex, intertwining the need for regulatory compliance with the management of <a href=\"https:\/\/www.prevalent.net\/blog\/third-party-risk-management-the-top-10-predictions-for-2024\/\">financial and reputational risks in 2024<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As businesses strive to adhere to these compliance measures, the emphasis shifts towards a comprehensive approach that extends beyond legalities to encompass the financial and reputational dimensions of third-party engagements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Leveraging advanced technologies for predictive risk assessment and real-time monitoring, organizations aim to uphold ethical standards and data protection, ensuring a robust defense against potential financial setbacks and reputational harm. This nuanced approach not only mitigates the immediate concerns around compliance but also addresses broader implications for an organization&#8217;s financial health and reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the digital ecosystem expands, so does the array of risks, from data breaches impacting customer trust to financial losses from operational disruptions. The integration of technologies like AI and machine learning into risk management strategies offers a proactive stance, enabling businesses to anticipate challenges and adapt swiftly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This dynamic, forward-looking strategy, underpinned by a commitment to ethical practices and data protection, is essential for maintaining competitiveness and integrity in today&#8217;s market.<\/span><\/p>\n<h2>Leveraging Security Ratings<\/h2>\n<p><span style=\"font-weight: 400;\">For third-party risk management in 2024, <a href=\"https:\/\/www.riskrecon.com\/academy\/how-to-utilize-security-ratings-in-third-party-risk-management\">leveraging security ratings<\/a> is pivotal for enhancing organizational security and transparency within vendor networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These ratings provide invaluable insights into the cybersecurity postures of third-party vendors, thereby informing risk assessments, vendor selection, and ongoing monitoring efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The integration of security ratings into third-party risk management frameworks enables businesses to stratify vendors based on their security performance, facilitating a more informed and dynamic approach to managing third-party relationships.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This strategy not only aids in mitigating potential security vulnerabilities but also bolsters compliance with regulatory standards, protecting sensitive data and maintaining the integrity of digital assets in an interconnected business landscape.<\/span><\/p>\n<h2>Managing Operational risk<\/h2>\n<p><span style=\"font-weight: 400;\">In 2024, operational risks in third-party risk management are a critical focus for data-centric businesses like those Harnham partners with.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This shift underscores the heightened importance of maintaining not just the security but the operational integrity of data flows and systems that are increasingly outsourced or managed through third-party relationships.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The convergence of operational risks with third-party engagements necessitates a strategic approach to ensure that these external partnerships do not become the weak link in the data security and compliance chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mitigating these operational risks involves rigorous third-party operational risk management, focusing on ensuring that vendors and suppliers uphold the highest standards of data security and system reliability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This requires comprehensive due diligence and risk assessments tailored to the specific challenges of managing vast amounts of sensitive data, including personal and financial information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By integrating rigorous <a href=\"https:\/\/www.venminder.com\/\">vendor risk management practices<\/a> and adopting a lifecycle approach to third-party engagements, organizations can safeguard against disruptions, data breaches, and system failures that could jeopardize critical data assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, the advent of new regulations and the rapid pace of technological change have made it imperative for companies to continually monitor and reassess their third-party risk strategies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Leveraging advanced risk management solutions that offer real-time insights into vendor performance and potential vulnerabilities is crucial for maintaining operational resilience in the face of evolving threats.<\/span><\/p>\n<hr \/>\n<p><em><strong>Our 2024-25 Data and AI Salary Guide is now live!<\/strong><\/em><\/p>\n<p><em><strong>Take part in the survey today and be in with FIVE chances of winning a \u00a3100 Amazon voucher, as well as an intensive one-day AI course courtesy of Rockborne!<\/strong><\/em><\/p>\n<p><em><strong><a href=\"https:\/\/lnkd.in\/ezaWgc66\">UK Survey<\/a><\/strong><\/em><br \/>\n<em><strong><a href=\"https:\/\/lnkd.in\/eMz2hMJ2\">US Survey<\/a><\/strong><\/em><br \/>\n<em><strong><a href=\"https:\/\/lnkd.in\/eF2ntqn6\">FR Survey<\/a>\u00a0\u00a0<\/strong><\/em><br \/>\n<em><strong><a href=\"https:\/\/lnkd.in\/e9VgGGaJ\">NL Survey<\/a><\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2024, the business world is more connected than ever before. Companies of all sizes are leveraging a vast ecosystem of third-party vendors, suppliers, and partners and this interconnectedness, while driving innovation and efficiency, also exposes organisations to a myriad of risks, particularly regarding data security and privacy.\u00a0 Due to this, controlling data and third-party&hellip;<\/p>\n","protected":false},"author":1,"featured_media":112932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"categories":[932],"tags":[930],"class_list":["post-112831","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data","tag-third-party-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Enterprises Need to Manage Data and Third-Party Risk Management in 2024 - Harnham<\/title>\n<meta name=\"description\" content=\"Discover top strategies for third-party risk management in 2024. Learn how enterprises can effectively manage data and mitigate risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024 - Harnham\" \/>\n<meta property=\"og:description\" content=\"Discover top strategies for third-party risk management in 2024. Learn how enterprises can effectively manage data and mitigate risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Harnham\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T08:58:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T15:59:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Harnham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Harnham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024 - Harnham","description":"Discover top strategies for third-party risk management in 2024. Learn how enterprises can effectively manage data and mitigate risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/","og_locale":"en_US","og_type":"article","og_title":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024 - Harnham","og_description":"Discover top strategies for third-party risk management in 2024. Learn how enterprises can effectively manage data and mitigate risks.","og_url":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/","og_site_name":"Harnham","article_published_time":"2024-04-03T08:58:37+00:00","article_modified_time":"2024-04-05T15:59:34+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png","type":"image\/png"}],"author":"Harnham","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Harnham","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#article","isPartOf":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/"},"author":{"name":"Harnham","@id":"https:\/\/www.harnham.com\/#\/schema\/person\/0e373eb7fe12c1c1cad81e41a074442c"},"headline":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024","datePublished":"2024-04-03T08:58:37+00:00","dateModified":"2024-04-05T15:59:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/"},"wordCount":1374,"commentCount":0,"publisher":{"@id":"https:\/\/www.harnham.com\/#organization"},"image":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png","keywords":["third party risk management"],"articleSection":["Data"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/","url":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/","name":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024 - Harnham","isPartOf":{"@id":"https:\/\/www.harnham.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png","datePublished":"2024-04-03T08:58:37+00:00","dateModified":"2024-04-05T15:59:34+00:00","description":"Discover top strategies for third-party risk management in 2024. Learn how enterprises can effectively manage data and mitigate risks.","breadcrumb":{"@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#primaryimage","url":"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png","contentUrl":"https:\/\/www.harnham.com\/wp-content\/uploads\/2024\/04\/Untitled-design-6.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.harnham.com\/how-enterprises-need-to-manage-data-and-third-party-risk-management-in-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.harnham.com\/"},{"@type":"ListItem","position":2,"name":"How Enterprises Need to Manage Data and Third-Party Risk Management in 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.harnham.com\/#website","url":"https:\/\/www.harnham.com\/","name":"Harnham","description":"","publisher":{"@id":"https:\/\/www.harnham.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.harnham.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.harnham.com\/#organization","name":"Harnham","url":"https:\/\/www.harnham.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.harnham.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.harnham.com\/wp-content\/uploads\/2023\/04\/harnham-squarelogo-1522068491765.png","contentUrl":"https:\/\/www.harnham.com\/wp-content\/uploads\/2023\/04\/harnham-squarelogo-1522068491765.png","width":200,"height":200,"caption":"Harnham"},"image":{"@id":"https:\/\/www.harnham.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.harnham.com\/#\/schema\/person\/0e373eb7fe12c1c1cad81e41a074442c","name":"Harnham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.harnham.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/161ff7a3adfb1369e822f7e3eec07391dd0fb12af850006a924a775c125c4b71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/161ff7a3adfb1369e822f7e3eec07391dd0fb12af850006a924a775c125c4b71?s=96&d=mm&r=g","caption":"Harnham"}}]}},"_links":{"self":[{"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/posts\/112831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/comments?post=112831"}],"version-history":[{"count":0,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/posts\/112831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/media\/112932"}],"wp:attachment":[{"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/media?parent=112831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/categories?post=112831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.harnham.com\/wp-json\/wp\/v2\/tags?post=112831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}