{"id":18330,"date":"2021-08-25T00:52:11","date_gmt":"2021-08-25T04:52:11","guid":{"rendered":"https:\/\/quantumlifecycle.com\/staging\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/"},"modified":"2021-08-25T00:52:11","modified_gmt":"2021-08-25T04:52:11","slug":"the-staggering-costs-of-data-breaches-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/","title":{"rendered":"The Staggering Costs of Data Breaches &#038; How to Prevent Them"},"content":{"rendered":"<p>The Digital Age has accelerated business in every industry. Yet, with digital advancements come new risks, including the potentially devastating impact of a data breach. These cyber events can affect any business, though there are several tactics organizations can deploy to decrease their vulnerability. Here\u2019s what to know about the potential implications of a data breach and how to control your risk.<\/p>\n<h2>The Far-Reaching Impact of Data Breaches<\/h2>\n<p>Data breaches can affect a company in several ways. For one, they may encounter permanent reputational damage. Both existing and potential customers lose trust in a business when personal data is exposed. This damage can be costly and cut deep into a business\u2019s profits, with lost business accounting for <a href=\"https:\/\/www.csoonline.com\/article\/3434601\/what-is-the-cost-of-a-data-breach.html\">40%<\/a> of the total cost of a data breach on average.<\/p>\n<p>The other costs associated with data breaches can overwhelm businesses, too. Regulatory violations can add up: <a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/\">PIPEDA<\/a>, the Canadian federal law that governs the collection and use of personal data, carries fines of <a href=\"https:\/\/www.privacypolicies.com\/blog\/costs-non-compliance-privacy-laws\/\">up to $100,000 per violation<\/a>. Insurance companies impose their own penalties, too. Premiums for business insurance can increase up to <a href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/finance\/articles\/cfo-insights-seven-hidden-costs-cyberattack.html\">200%<\/a> for the same coverage after personal data is leaked. When we factor in the loss of intellectual property and competitive advantage and operational downtime, the total cost of a data breach can climb exponentially.<\/p>\n<p>While it can vary based on the industry and size of the company, the average total cost of a data breach is <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">$3.86 million<\/a>. For healthcare, the industry in which data breaches are most expensive, the cost is nearly double that figure, at <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">$7.13 million<\/a>. These losses are significant for large companies, but they could bankrupt a smaller organization.<\/p>\n<h2>The Newest Wave of Data Breaches: Ransomware Attacks<\/h2>\n<p>As technology evolves, so do cybercriminals. Ransomware is an increasingly popular tactic, consisting of a specific type of malware that encrypts data and renders it unusable to businesses. In exchange for decryption and access to data, hackers request a specific ransom value.<\/p>\n<p>Ransomware attacks are becoming larger in scale and are happening at an increasing rate. The cybercrime is quickly becoming one of the world\u2019s most pressing data security concerns, and 2021 has already seen a number of attacks:<\/p>\n<ul>\n<li>In March, computer manufacturer Acer was targeted by notorious hacker group REvil who demanded the largest known cybercrime ransom of $50 million. Acer originally offered to pay <a href=\"https:\/\/www.secureworld.io\/industry-news\/acer-hit-with-highest-ransomware-demand-ever\">$10 million<\/a>, but REvil has since appeared to go offline and it\u2019s <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/07\/13\/revil-ransomware-hackers-disappear\/?sh=b71a8937c636\">unclear whether any payment was made<\/a>.<\/li>\n<li>In May, the world\u2019s largest meat packer JBS had to stop operations in North America and Australia after an attack impacted their IT systems. The company paid <a href=\"https:\/\/www.wsj.com\/articles\/jbs-paid-11-million-to-resolve-ransomware-attack-11623280781\">$11 million<\/a> to regain control of their data and restore operations.<\/li>\n<li>The U.S.\u2019s Colonial Pipeline was also attacked in May as a result of a compromised password. The CEO of the project paid <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\">$4.4 million<\/a> in ransom to a Russian cybercrime group to resume operations.<\/li>\n<li>The Washington D.C. Police Department was another victim in late spring. A ransomware gang seized <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/05\/13\/ransomware-hackers-claim-to-leak-250gb-of-washington-dc-police-data-after-cops-dont-pay-4-million-ransom\/?sh=13da2d2958d0\">250GB<\/a> of files and threatened to release them if a ransom of $4 million wasn\u2019t paid. Ultimately, the files were released, and the volume and sensitivity of the data appear to have been exaggerated.<\/li>\n<\/ul>\n<h2>A Common Vulnerability: Poor Data Destruction Policies<\/h2>\n<p>All businesses should have a robust data security program that encompasses employee training, routine backups, and a strong IT infrastructure. Beyond that, there\u2019s a very simple threat that\u2019s often overlooked: what happens to devices once companies are done with them.<\/p>\n<p>Cybercriminals seek out organizations that may lack sound data destruction policies. Data that\u2019s at rest in a low-security warehouse or in transit without proper protocols is vulnerable to cybercrime. As such, data security and data destruction cannot be viewed as separate issues. They are inextricably linked, and all companies should have data security policies that ensure the prompt, effective data destruction for devices that are no longer in use by a certified, experienced ITAD company.<\/p>\n<p>No matter your company\u2019s size or industry, Quantum offers options for data destruction for your unneeded IT assets. Whether you choose to have your equipment refurbished or recycled, processed onsite or picked up, our team can safely eliminate any trace of data from your devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Digital Age has accelerated business in every industry. Yet, with digital advancements come new risks, including the potentially devastating impact of&#8230;<\/p>\n","protected":false},"author":3,"featured_media":18331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[77],"tags":[],"class_list":{"0":"post-18330","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Staggering Costs of Data Breaches &amp; How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Staggering Costs of Data Breaches &amp; How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling\" \/>\n<meta property=\"og:description\" content=\"The Digital Age has accelerated business in every industry. Yet, with digital advancements come new risks, including the potentially devastating impact of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Quantum | ITAD &amp; E-Waste Recycling\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T04:52:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Quantum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Quantum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/\"},\"author\":{\"name\":\"Quantum\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\"},\"headline\":\"The Staggering Costs of Data Breaches &#038; How to Prevent Them\",\"datePublished\":\"2021-08-25T04:52:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-CR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/\",\"name\":\"The Staggering Costs of Data Breaches & How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"datePublished\":\"2021-08-25T04:52:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#breadcrumb\"},\"inLanguage\":\"en-CR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CR\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/blog\\\/the-staggering-costs-of-data-breaches-how-to-prevent-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Staggering Costs of Data Breaches &#038; How to Prevent Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#website\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/\",\"name\":\"Quantum | ITAD & E-Waste Recycling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#organization\",\"name\":\"Quantum Lifecycle Partners LP\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CR\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"width\":2700,\"height\":848,\"caption\":\"Quantum Lifecycle Partners LP\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CR\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\",\"name\":\"Quantum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"caption\":\"Quantum\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Staggering Costs of Data Breaches & How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/","og_locale":"en_US","og_type":"article","og_title":"The Staggering Costs of Data Breaches & How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling","og_description":"The Digital Age has accelerated business in every industry. Yet, with digital advancements come new risks, including the potentially devastating impact of...","og_url":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/","og_site_name":"Quantum | ITAD &amp; E-Waste Recycling","article_published_time":"2021-08-25T04:52:11+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","type":"image\/jpeg"}],"author":"Quantum","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Quantum","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/"},"author":{"name":"Quantum","@id":"https:\/\/quantumlifecycle.com\/en_CR\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda"},"headline":"The Staggering Costs of Data Breaches &#038; How to Prevent Them","datePublished":"2021-08-25T04:52:11+00:00","mainEntityOfPage":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/"},"wordCount":707,"publisher":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/#organization"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","articleSection":["Blog"],"inLanguage":"en-CR"},{"@type":"WebPage","@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/","url":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/","name":"The Staggering Costs of Data Breaches & How to Prevent Them - Quantum | ITAD &amp; E-Waste Recycling","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","datePublished":"2021-08-25T04:52:11+00:00","breadcrumb":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#breadcrumb"},"inLanguage":"en-CR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-CR","@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#primaryimage","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2021\/08\/The-Staggering-Costs-of-Data-Breaches-How-to-Prevent-Them.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/quantumlifecycle.com\/en_CR\/blog\/the-staggering-costs-of-data-breaches-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quantumlifecycle.com\/en_CR\/"},{"@type":"ListItem","position":2,"name":"The Staggering Costs of Data Breaches &#038; How to Prevent Them"}]},{"@type":"WebSite","@id":"https:\/\/quantumlifecycle.com\/en_CR\/#website","url":"https:\/\/quantumlifecycle.com\/en_CR\/","name":"Quantum | ITAD & E-Waste Recycling","description":"","publisher":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quantumlifecycle.com\/en_CR\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CR"},{"@type":"Organization","@id":"https:\/\/quantumlifecycle.com\/en_CR\/#organization","name":"Quantum Lifecycle Partners LP","url":"https:\/\/quantumlifecycle.com\/en_CR\/","logo":{"@type":"ImageObject","inLanguage":"en-CR","@id":"https:\/\/quantumlifecycle.com\/en_CR\/#\/schema\/logo\/image\/","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","width":2700,"height":848,"caption":"Quantum Lifecycle Partners LP"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CR\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/quantumlifecycle.com\/en_CR\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda","name":"Quantum","image":{"@type":"ImageObject","inLanguage":"en-CR","@id":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","caption":"Quantum"}}]}},"_links":{"self":[{"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/posts\/18330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/comments?post=18330"}],"version-history":[{"count":0,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/posts\/18330\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/media\/18331"}],"wp:attachment":[{"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/media?parent=18330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/categories?post=18330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CR\/wp-json\/wp\/v2\/tags?post=18330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}