{"id":14620,"date":"2024-08-02T13:38:46","date_gmt":"2024-08-02T13:38:46","guid":{"rendered":"https:\/\/trustpair.com\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/"},"modified":"2025-02-04T10:45:55","modified_gmt":"2025-02-04T10:45:55","slug":"have-you-been-cyber-attacked-via-a-supplier-yet","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/","title":{"rendered":"Have you been cyber-attacked via a supplier yet?"},"content":{"rendered":"<p>In today&#8217;s complex and rapidly evolving business landscape, <strong>procurement teams are facing unprecedented challenges<\/strong> that extend far beyond their traditional cost-saving role. The emergence of new and sophisticated cyber threats, coupled with geopolitical tensions and reputational risks, has put procurement leaders into the forefront of risk management and operational resilience. Read on to get more details about these trends and challenges.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/white-paper\/procurement-teams-adapting-to-an-evolving-landscape\/\">Download our entire white paper on the topic for more information!<\/a><\/p>\n<h2>Cyber Risks: A Persistent and Evolving Threat<\/h2>\n<p>Cyber risks have become a <strong>critical preoccupation for businesses across all sector<\/strong>s. Fraudsters are increasingly sophisticated, exploiting vulnerabilities in supplier networks as entry points to access sensitive data, systems, and funds. One common method of <a href=\"https:\/\/trustpair.com\/blog\/cyber-fraud\/\">cyber-fraud<\/a> is <a href=\"https:\/\/trustpair.com\/blog\/vendor-fraud\/\">vendor fraud<\/a>, where fraudsters infiltrate supplier communications and request changes to banking information, resulting in substantial financial losses and strained business relationships.<\/p>\n<p>To mitigate these risks, procurement teams must rigorously assess their suppliers&#8217; cybersecurity measures and implement robust protocols to verify the authenticity of requests and transactions. Additionally, businesses are now requiring suppliers to obtain security certifications, such as SOC 2 or ISO 27001, or even cyber insurance, as a prerequisite for establishing business relationships.<\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-bda0ce33-c370-4f31-a65d-0bf9b1cb6642\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-bda0ce33-c370-4f31-a65d-0bf9b1cb6642\" class=\"hs-cta-node hs-cta-bda0ce33-c370-4f31-a65d-0bf9b1cb6642\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/bda0ce33-c370-4f31-a65d-0bf9b1cb6642\"><img decoding=\"async\" id=\"hs-cta-img-bda0ce33-c370-4f31-a65d-0bf9b1cb6642\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/bda0ce33-c370-4f31-a65d-0bf9b1cb6642.png\" alt=\"New call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'bda0ce33-c370-4f31-a65d-0bf9b1cb6642', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>Geopolitical Tensions: Diversifying Supplier Networks<\/h2>\n<p>The volatile geopolitical climate, characterized by <strong>conflicts and tensions<\/strong> between major economies like the United States and China, has added another layer of complexity to procurement operations. Events such as the ongoing war in Ukraine have disrupted supply chains, leading to soaring raw material prices and inflation.<\/p>\n<p>In response, procurement teams are diversifying their supplier networks, reducing reliance on a limited number of suppliers in specific regions. This approach increases supply chain resilience and enables organizations to anticipate and respond swiftly to operational disruptions caused by geopolitical events.<\/p>\n<h2>Reputational Risks: Safeguarding Brand Integrity<\/h2>\n<p>Suppliers can have a <strong>significant impact on the reputation of their business partners,<\/strong> and procurement teams must be vigilant in <a href=\"https:\/\/trustpair.com\/blog\/supplier-risk-management\/\">managing this risk.<\/a> Historical incidents, such as the Rana Plaza collapse in Bangladesh, have exposed the consequences of neglecting ethical and regulatory standards within supply chains. These events have highlighted the importance of carefully vetting suppliers to avoid reputational damage.<\/p>\n<p>Moreover, crises or scandals involving suppliers, whether related to employee misconduct, environmental violations, or human rights issues, can have cascading effects on their partners&#8217; reputations and business operations. Procurement teams must proactively assess potential reputational risks associated with their supplier network and ensure alignment with their organization&#8217;s values and ethical standards.<\/p>\n<p><strong>To conclude<\/strong><\/p>\n<p>As procurement teams navigate the evolving landscape of global supply chains, they must embrace a holistic approach that integrates <a href=\"https:\/\/trustpair.com\/blog\/risk-management\/\">risk management<\/a>, operational resilience, and sustainability considerations. By leveraging advanced technologies, fostering collaboration with cross-functional teams, and cultivating a deep understanding of potential vulnerabilities, procurement leaders can position their organizations to thrive in the face of emerging challenges, ensuring business continuity and long-term success.<\/p>\n<p>To protect your entire procure-to-pay process, <a href=\"https:\/\/trustpair.com\/demo\/\">request a demo<\/a>! Trustpair secures your entire payment chain thanks to continuous account validation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s complex and rapidly evolving business landscape, procurement teams are facing unprecedented challenges that extend far beyond their traditional cost-saving role. The emergence of new and sophisticated cyber threats, coupled with geopolitical tensions and reputational risks, has put procurement leaders into the forefront of risk management and operational resilience. Read on to get more [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14622,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[138],"tags":[],"class_list":["post-14620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-procurement-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New White Paper: Emerging Procurement Risks - Trustpair<\/title>\n<meta name=\"description\" content=\"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New White Paper: Emerging Procurement Risks - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-04T10:45:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"582\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Have you been cyber-attacked via a supplier yet?\",\"datePublished\":\"2024-08-02T13:38:46+00:00\",\"dateModified\":\"2025-02-04T10:45:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg\",\"articleSection\":[\"Procurement\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\",\"name\":\"New White Paper: Emerging Procurement Risks - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg\",\"datePublished\":\"2024-08-02T13:38:46+00:00\",\"dateModified\":\"2025-02-04T10:45:55+00:00\",\"description\":\"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg\",\"width\":800,\"height\":582,\"caption\":\"supplier risks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have you been cyber-attacked via a supplier yet?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New White Paper: Emerging Procurement Risks - Trustpair","description":"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/","og_locale":"en_GB","og_type":"article","og_title":"New White Paper: Emerging Procurement Risks - Trustpair","og_description":"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!","og_url":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:46+00:00","article_modified_time":"2025-02-04T10:45:55+00:00","og_image":[{"width":800,"height":582,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Have you been cyber-attacked via a supplier yet?","datePublished":"2024-08-02T13:38:46+00:00","dateModified":"2025-02-04T10:45:55+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/"},"wordCount":493,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg","articleSection":["Procurement"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/","url":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/","name":"New White Paper: Emerging Procurement Risks - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg","datePublished":"2024-08-02T13:38:46+00:00","dateModified":"2025-02-04T10:45:55+00:00","description":"Cyber threats, geopolitical tensions, reputational risks... Procurement teams are faced with an increasingly complex environment. Learn more!","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2472173199.jpg","width":800,"height":582,"caption":"supplier risks"},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/have-you-been-cyber-attacked-via-a-supplier-yet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Have you been cyber-attacked via a supplier yet?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14620"}],"version-history":[{"count":1,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14620\/revisions"}],"predecessor-version":[{"id":15989,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14620\/revisions\/15989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14622"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}