{"id":85,"date":"2025-10-08T08:04:09","date_gmt":"2025-10-08T07:04:09","guid":{"rendered":"https:\/\/www.cardonet.co.uk\/insights\/?p=85"},"modified":"2025-10-16T11:28:39","modified_gmt":"2025-10-16T10:28:39","slug":"new-era-nursery-school-cyber-security","status":"publish","type":"post","link":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/","title":{"rendered":"After Kidi: A New Era for Nursery School Cyber Security"},"content":{"rendered":"\n<p><strong>How well are nursery school leaders and boards protecting children\u2019s sensitive data in the face of escalating cyber threats, and is the status quo truly enough? The answers to these questions are, unfortunately, not yet and no.<\/strong><\/p>\n\n\n\n<p>A genuinely effective defense against cyber criminals <strong>demands a governance-led strategy<\/strong>. That means u<strong>niversal multi-factor authentication, zero trust controls, comprehensive data mapping, sector-specific cyber insurance, and rigorous incident response rehearsals<\/strong>.&nbsp;<\/p>\n\n\n\n<p>However, with more than 40% of UK education providers now reporting cyber incidents annually, too many nurseries still fall short of these standards, increasing risks to both business continuity and community trust.<\/p>\n\n\n\n<p>When the Kidi nursery chain was hit by a&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c62ldyvpwv9o\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">major cyberattack in September 2025<\/a>, leaders throughout the early-years education sector watched on in horror.&nbsp;<\/p>\n\n\n\n<p>Sensitive, identifiable details of more than 8,000 children and staff were posted online for the world \u2013 and potential abusers \u2013 to see. In the aftermath of the attack hackers leaked photos and addresses and threatened parents with extortion.<\/p>\n\n\n\n<p>Until then, nurseries had seen themselves as too small or \u201ccommunity-based\u201d to be major targets. This is clearly no longer the case.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyberattacks on education<\/h2>\n\n\n\n<p>Cyberattacks on education have surged year-on-year. Nurseries not only hold addresses and contact details but sometimes medical notes, safeguarding files, and passport scans of very young and vulnerable children. This makes every breach both a GDPR issue and a genuine safeguarding event.<a><\/a><\/p>\n\n\n\n<p>In Kidi\u2019s case, hackers used real children\u2019s details to extort parents, posting screenshots and profile data on the dark web. This rapidly became a media and regulatory firestorm: every nursery was suddenly a potential next victim, and every parent began to ask, \u201cwhat are you doing to keep my child safe?\u201d<a><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why are nursery schools so vulnerable?<\/h2>\n\n\n\n<p>Part of the risk can be attributed to the fact that nurseries operate on thin margins, with limited in-house technical skills. They gather information digitally but lack the resources to consolidate or professionally manage it.&nbsp;<\/p>\n\n\n\n<p>National surveys show that only just over half of early years providers have a named cyber-security lead, and even fewer have had their contracts, data maps, or platforms externally audited in the past year.<a><\/a><\/p>\n\n\n\n<p>Staff regularly work off-site to update records or communicate with parents, multiplying the attack surface. A blend of cloud-based management platforms with local spreadsheets and paper files makes data theft, unauthorized access, and accidental leakage all too probable.&nbsp;<\/p>\n\n\n\n<p><strong>Key reasons for sector exposure include<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Large volumes of sensitive child\/family data<\/strong><\/li>\n\n\n\n<li><strong>Inconsistent policies on storage and device use<\/strong><\/li>\n\n\n\n<li><strong>Limited training budgets<\/strong><\/li>\n\n\n\n<li><strong>Multi-site operations with weak technical oversight<\/strong><\/li>\n\n\n\n<li><strong>Pressure to restore normal service quickly \u2013 often before a true forensic assessment is complete<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Knowing Your Data Landscape<\/h2>\n\n\n\n<p>Leadership and clarity is needed before technical fixes can be made. Every manager or board must be able to answer the following questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Where is our data<\/li>\n\n\n\n<li>Who touches it<\/li>\n\n\n\n<li>When?&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The shift to cloud-based services can be seen as a positive development as long as the data is stored in the UK or EU and compliance guarantees are in force.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Old tech, new risks<\/h2>\n\n\n\n<p>Relying on a patchwork of local PCs, USB sticks, and unsecured cloud accounts for \u201coperational convenience\u201d<a><\/a>&nbsp;is no longer acceptable in the face of these new threats which escalate dramatically when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Legacy devices store unencrypted information<\/li>\n\n\n\n<li>Staff share logins, or fail to log out\/lock systems<\/li>\n\n\n\n<li>Data is accessed on personal or unpatched devices<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Modern Security Practices<\/h2>\n\n\n\n<p>We advocate a <strong>zero-trust model<\/strong> where no device or user is trusted by default. Every session must be checked, and users must only be able to see what is essential for their role. If a login is detected from an unexpected country or device, alerts, and even automatic lockouts, should be immediately issued.&nbsp;<\/p>\n\n\n\n<p>Mapping every data flow and storage point is the foundation for creating strong, GDPR-compliant policies and implementing Data Loss Prevention (DLP) protocols will spot mass file movements or suspicious downloads before it\u2019s too late<a><\/a><\/p>\n\n\n\n<p><strong>Cyber security cannot be seen as one big fix \u2013 it has to be a living process that adapts to evolving threats.&nbsp;<\/strong><\/p>\n\n\n\n<p>Evidence shows that using multi-factor authentication (MFA) for all users and not just admins prevents the majority of brute-force attacks. In practice, enabling MFA across cloud systems blocks over 99% of unauthorized logins according to both Microsoft and the UK\u2019s NCSC.&nbsp;<\/p>\n\n\n\n<p>Conversely, attacks can happen when basics get ignored. Incomplete rollouts, shared accounts, and the non-enforcement of conditional access create fertile ground for bad actors.<\/p>\n\n\n\n<p>Limiting who uses a system, when, and from which devices should be standard and only a limited number of verified and vetted staff should have out-of-hours access to sensitive records.<\/p>\n\n\n\n<p>Many nurseries that survived cyber incidents or simply avoided them have a common thread:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Annual, independent audits \u2013 and rapid response to all findings<\/li>\n\n\n\n<li>Cyber insurance tailored to childcare settings, and their particular safeguarding responsibilities, should be deployed rather than generic business coverage<\/li>\n\n\n\n<li>Regular crisis response exercises, ensuring every staff member knows how to spot a phishing attempt or respond to a suspected breach<\/li>\n\n\n\n<li>Transparent communication, both internally and with parents will make data safety part of the setting\u2019s visible culture<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The human element: training and culture<\/h2>\n\n\n\n<p>Phishing and messaging scams remain the number one source of data breaches in childcare and education. Studies from the NCSC and UK government show over 80% of successful attacks in this sector relied on staff mistakes or lack of awareness.<a><\/a><a><\/a><\/p>\n\n\n\n<p><strong>Ongoing cyber education is as vital as technology<\/strong>. Nurseries must run simulated phishing campaigns (and share the outcomes in staff meetings), keep parents in the loop about recent threats and what\u2019s being done to counter them, and make it simple and \u201csafe\u201d for staff to report suspicious messages or accidental clicks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Legal, contracts, and the regulator<\/h2>\n\n\n\n<p>Even the best technical setup is incomplete without up-to-date contracts and compliance measures. Under GDPR, all data processors and controllers must be able to demonstrate best practice and continuous monitoring. Article 28 specifically covers childcare suppliers \u2013 requiring written breach notification procedures and third-party audit rights.<a><\/a><\/p>\n\n\n\n<p>Ask yourself:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Are all your software and IT providers GDPR compliant?<\/li>\n\n\n\n<li>Have you formalized what happens (and who\u2019s responsible) in the event of a breach?<\/li>\n\n\n\n<li>Do you have cyber insurance? Is it tailored for the volume and sensitivity of data you hold?<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What if the worst happens? You need a recovery plan<\/h2>\n\n\n\n<p>If you are breached:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Notify the ICO and the police within 72 hours as required by law<\/li>\n\n\n\n<li>Engage any cyber insurance providers and forensic IT partners immediately to limit damage<\/li>\n\n\n\n<li>Retain every communication and incident log; regulators and parents will ask for evidence<\/li>\n\n\n\n<li>Communicate early and honestly with parents; explain what was accessed, what it means, and what\u2019s changing going forward<\/li>\n\n\n\n<li>Plug any technical, procedural, or contractual holes fast \u2013 and review staff access and permissions<\/li>\n<\/ul>\n\n\n\n<p>After the breach:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Share post-breach audits and recovery investments with parents<\/li>\n\n\n\n<li>Build data protection into your public brand<\/li>\n\n\n\n<li>Empower staff and families to report concerns and ask questions year-round<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The real value of prevention<\/h2>\n\n\n\n<p>Setting aside the very real risks of massive fines by the regulator and legal action from parents, a full-fledged breach can mean weeks \u2013 or months \u2013 of lost business, during which time families will have moved on with their precious children. Insurance premiums can rocket after even a single claim.<a><\/a><\/p>\n\n\n\n<p>In comparison, the costs of properly-scoped technology solutions, regular audits, up-to-date insurance, and staff training are modest.&nbsp;<\/p>\n\n\n\n<p>Prevention is not just less expensive \u2013 it\u2019s the only rational choice for a sector that trades on trust and word of mouth.<\/p>\n\n\n\n<p>The 2025 Kidi hack was a reset moment: a reminder that cyber risk is a board-level problem and child protection now has to include digital defense. Those nurseries \u2013 and boards \u2013 that step up today will protect not only their own sustainability, but the trust of every parent and child they serve.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQ: Five Essential Safeguarding Answers<\/h2>\n\n\n\n<p><strong>1. How do I know if my nursery tech is secure enough?<br><\/strong>Strong digital safety means annual third-party audits, real-time data loss monitoring, and penetration tests. Parents, the ICO, and Ofsted increasingly expect clear evidence.<a><\/a><a><\/a><\/p>\n\n\n\n<p><strong>2. How soon should I enable MFA and conditional access?<br><\/strong>Without delay \u2013 these two controls block over 90% of account hacks, as confirmed in multiple UK and international studies.<a><\/a><a><\/a><\/p>\n\n\n\n<p><strong>3. Is cloud hosting safer than local servers for nursery data?<br><\/strong>In almost all cases \u2013 as long as the provider is reputable and data is stored in the UK\/EU, and you keep ironclad audit and access controls. Beware of vendors without clear certifications or breach protocols.<a><\/a><\/p>\n\n\n\n<p><strong>4. What should I do about legacy systems and paper records?<br><\/strong>Review and migrate data whenever feasible, patch or segment legacy systems, and take appropriate measures on anything high-risk or unavoidable.<a><\/a><\/p>\n\n\n\n<p><strong>5. How can I reassure parents after a data breach?<br><\/strong>Be direct, transparent, and factual. Share recovery steps, remediation investments, and make it clear how things will be safer in future \u2013 trust depends on visible, ongoing improvements.<a><\/a><a><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>The time to protect your young learners and your reputation is now. Contact me on \u00a0+44 203 034 2244\u00a0or <a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\">online<\/a>\u00a0to start your cyber security journey to a more cyber secure future. <\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How well are nursery school leaders and boards protecting children\u2019s sensitive data in the face of escalating cyber threats, and is the status quo truly enough? The answers to these questions are, unfortunately, not yet and no. A genuinely effective defense against cyber criminals demands a governance-led strategy. That means universal multi-factor authentication, zero trust<\/p>\n","protected":false},"author":5,"featured_media":86,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6],"class_list":["post-85","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guidance","category-it-consultancy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nursery School Cyber Security<\/title>\n<meta name=\"description\" content=\"A genuinely effective defense for nursery schools against cyber criminals demands a governance-led strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nursery School Cyber Security\" \/>\n<meta property=\"og:description\" content=\"A genuinely effective defense for nursery schools against cyber criminals demands a governance-led strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Insight\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cardonet\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-08T07:04:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T10:28:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Raphael Waller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cardonetit\" \/>\n<meta name=\"twitter:site\" content=\"@cardonetit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raphael Waller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nursery School Cyber Security","description":"A genuinely effective defense for nursery schools against cyber criminals demands a governance-led strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/","og_locale":"en_GB","og_type":"article","og_title":"Nursery School Cyber Security","og_description":"A genuinely effective defense for nursery schools against cyber criminals demands a governance-led strategy.","og_url":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/","og_site_name":"Insight","article_publisher":"https:\/\/www.facebook.com\/Cardonet","article_published_time":"2025-10-08T07:04:09+00:00","article_modified_time":"2025-10-16T10:28:39+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png","type":"image\/png"}],"author":"Raphael Waller","twitter_card":"summary_large_image","twitter_creator":"@cardonetit","twitter_site":"@cardonetit","twitter_misc":{"Written by":"Raphael Waller","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/"},"author":{"name":"Raphael Waller","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/person\/8998914de1a4059d033213086f869fbb"},"headline":"After Kidi: A New Era for Nursery School Cyber Security","datePublished":"2025-10-08T07:04:09+00:00","dateModified":"2025-10-16T10:28:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/"},"wordCount":1522,"commentCount":0,"publisher":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png","articleSection":["Guidance","IT Consultancy"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/","url":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/","name":"Nursery School Cyber Security","isPartOf":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png","datePublished":"2025-10-08T07:04:09+00:00","dateModified":"2025-10-16T10:28:39+00:00","description":"A genuinely effective defense for nursery schools against cyber criminals demands a governance-led strategy.","breadcrumb":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#primaryimage","url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png","contentUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2025\/10\/new-era-nursery-school-education-cyber-security-cardonet.png","width":600,"height":334,"caption":"Nursery School Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cardonet.co.uk\/insights\/new-era-nursery-school-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cardonet.co.uk\/insights\/"},{"@type":"ListItem","position":2,"name":"After Kidi: A New Era for Nursery School Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cardonet.co.uk\/insights\/#website","url":"https:\/\/www.cardonet.co.uk\/insights\/","name":"Insight","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cardonet.co.uk\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization","name":"Cardonet IT Support","url":"https:\/\/www.cardonet.co.uk\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2022\/06\/cardonet-it-support-logo.svg","contentUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2022\/06\/cardonet-it-support-logo.svg","width":1,"height":1,"caption":"Cardonet IT Support"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Cardonet","https:\/\/x.com\/cardonetit","https:\/\/www.linkedin.com\/company\/cardonet"]},{"@type":"Person","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/person\/8998914de1a4059d033213086f869fbb","name":"Raphael Waller","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/comments?post=85"}],"version-history":[{"count":2,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/85\/revisions"}],"predecessor-version":[{"id":92,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/85\/revisions\/92"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/media\/86"}],"wp:attachment":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/media?parent=85"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/categories?post=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}