{"id":36989,"date":"2026-04-10T01:53:03","date_gmt":"2026-04-10T08:53:03","guid":{"rendered":"https:\/\/cowbell.insure\/au\/?p=36989"},"modified":"2026-04-10T01:53:03","modified_gmt":"2026-04-10T08:53:03","slug":"a-sound-approach-to-supply-chain-and-double-extortion-risks","status":"publish","type":"post","link":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/","title":{"rendered":"A Sound Approach to Supply Chain and Double Extortion Risks"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The cyber landscape is shifting. The days of &#8220;simple&#8221; ransomware attacks (where a hacker locks a screen and demands a payout) are fading, but for seasoned brokers and underwriters, this is simply the signal to adapt. <\/span><span style=\"font-weight: 400\">At Cowbell, we are big believers that better intelligence leads to better decisions, and recently looked into the threats specifically targeting small to medium-sized (SMB) insurance organisations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Here is some clarity on the three trends shaping our market right now.<\/span><\/p>\n<h5><span style=\"font-weight: 400\">From Encryption to &#8220;Double Extortion&#8221;<\/span><\/h5>\n<p><span style=\"font-weight: 400\">We can see a shift in tactics from ransomware groups like Medusa, 8Base, and RansomHub. Rather than simply locking data, these actors are increasingly exfiltrating it.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For clients, this changes the nature of recovery. It is no longer only about restoring operations. It is about protecting confidential information and managing the impact if that data is exposed. Incidents involving firms like R.H. Clarkson Insurance Group, where more than 100GB of sensitive data was reportedly taken, and Young Consulting, which saw approximately one million individuals affected, reinforce a clear reality. Sensitive data has become the primary target.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is why precision matters. Effective cyber protection means securing data itself, not just getting systems back online.<\/span><\/p>\n<h5><span style=\"font-weight: 400\">Clarity on Supply Chain Risks and Evolving Extortion<\/span><\/h5>\n<p><span style=\"font-weight: 400\">For a long time, the threat was primarily operational: a criminal encrypted your files, and you paid to get the key. But in the UK, businesses have become more resilient. By adopting offline and immutable backups, organisations removed the criminals&#8217; leverage &#8211; if you can restore your systems yourself, there is no need to pay the ransom.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As payouts dropped, threat actors were forced to evolve. They have moved from locking you out, to <\/span><i><span style=\"font-weight: 400\">locking you in<\/span><\/i><span style=\"font-weight: 400\"> a regulatory nightmare.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Today, the primary weapon isn&#8217;t just encryption; it is data exfiltration. Criminals are stealing sensitive data before triggering an attack, knowing that while backups can restore your operations, they cannot undo a data breach.\u00a0<\/span><span style=\"font-weight: 400\">This shift moves the pressure point from business interruption to privacy liability, reputational damage, and regulatory scrutiny under the GDPR.<\/span><\/p>\n<p><span style=\"font-weight: 400\">What this means for your clients:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Resilience is more than recovery<\/b><span style=\"font-weight: 400\">: Being able to restore servers is excellent, but it is no longer a &#8220;get out of jail free&#8221; card if sensitive data has been stolen.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>The supply chain is the new backdoor<\/b><span style=\"font-weight: 400\">: Attackers are increasingly targeting smaller, less secure vendors in a supply chain to access these larger data pools.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Protection must evolve<\/b><span style=\"font-weight: 400\">: We need to ensure clients aren&#8217;t just prepared to recover, but are actively monitoring data movement and securing the perimeter to prevent the theft in the first place.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">This isn&#8217;t about fear; it&#8217;s about the economics of crime. As businesses get smarter, criminals get desperate. Our job is to help you stay one step ahead of their next pivot.<\/span><\/p>\n<p><em><span style=\"font-weight: 400\">&#8220;You cannot effectively protect a modern business using static data alone. A vendor\u2019s vulnerability can quickly become the insured\u2019s challenge, which is why tools &#8211; such as Cowbell Factors &#8211; provide a precise view of risk that <\/span><span style=\"font-weight: 400\">includes<\/span><span style=\"font-weight: 400\"> the supply chain. We use AI to bring these hidden dependencies to the surface, giving brokers and policyholders the confidence that their coverage is tuned to their actual reality.&#8221;\u00a0<\/span><\/em><\/p>\n<p style=\"text-align: right\"><strong>&#8211; Rajeev Gupta, Co-founder and Chief Product Officer, Cowbell<\/strong><\/p>\n<h5><span style=\"font-weight: 400\">The Human Element: Staying Ahead of Social Engineering<\/span><\/h5>\n<p><span style=\"font-weight: 400\">Finally, we noticed a rise in sophisticated &#8220;vishing&#8221; (voice phishing) and campaigns like StrelaStealer targeting our sector, and with the help of AI, these attempts are becoming more convincing. <\/span><span style=\"font-weight: 400\">However, this isn\u2019t cause for alarm, it\u2019s a reason for having better tools. While threats evolve, so too must our ability to manage them.<\/span><\/p>\n<h5><span style=\"font-weight: 400\">A Partnership Built on Resilience<\/span><\/h5>\n<p><span style=\"font-weight: 400\">For brokers, this intelligence is an opportunity to strengthen your client partnerships. We don&#8217;t add to the noise; we help you make sense of it. <\/span><span style=\"font-weight: 400\">We urge you to use these findings to have practical, focused conversations with your clients about their vendors and authentication protocols.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By combining the market expertise of our underwriting teams with the clarity of Cowbell Factors\u2122, we deliver the quiet assurance that comes from systems designed to make you stronger.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyber landscape is shifting. The days of &#8220;simple&#8221; ransomware attacks (where a hacker locks a screen and demands a payout) are fading, but for seasoned brokers and underwriters, this is simply the signal to adapt. At Cowbell, we are big believers that better intelligence leads to better decisions, and recently looked into the threats [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":36994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[2939],"tags":[2942],"class_list":["post-36989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cowbell-australia","tag-supply-chain"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Sound Approach to Supply Chain and Double Extortion Risks - Cowbell AUS<\/title>\n<meta name=\"description\" content=\"The cyber landscape is shifting. The days of &quot;simple&quot; ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Sound Approach to Supply Chain and Double Extortion Risks\" \/>\n<meta property=\"og:description\" content=\"The cyber landscape is shifting. The days of &quot;simple&quot; ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cowbell AUS\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-10T08:53:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Claud Bilbao\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claud Bilbao\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\"},\"author\":{\"name\":\"Claud Bilbao\",\"@id\":\"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d\"},\"headline\":\"A Sound Approach to Supply Chain and Double Extortion Risks\",\"datePublished\":\"2026-04-10T08:53:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\"},\"wordCount\":698,\"image\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png\",\"keywords\":[\"Supply Chain\"],\"articleSection\":[\"Cowbell Australia\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\",\"url\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\",\"name\":\"A Sound Approach to Supply Chain and Double Extortion Risks - Cowbell AUS\",\"isPartOf\":{\"@id\":\"https:\/\/cowbell.insure\/au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png\",\"datePublished\":\"2026-04-10T08:53:03+00:00\",\"author\":{\"@id\":\"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d\"},\"description\":\"The cyber landscape is shifting. The days of \\\"simple\\\" ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.\",\"breadcrumb\":{\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage\",\"url\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png\",\"contentUrl\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cowbell.insure\/au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Sound Approach to Supply Chain and Double Extortion Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cowbell.insure\/au\/#website\",\"url\":\"https:\/\/cowbell.insure\/au\/\",\"name\":\"Cowbell AUS\",\"description\":\"The Sound Approach to Risk\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cowbell.insure\/au\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d\",\"name\":\"Claud Bilbao\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png\",\"url\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png\",\"contentUrl\":\"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png\",\"caption\":\"Claud Bilbao\"},\"description\":\"Claud Bilbao is Cowbell\u2019s RVP and Underwriting &amp; Distribution Director for the UK and Australia. He most recently served as a Senior Underwriter at CNA, where he managed the London Specialty Cyber and Technology portfolios on both their Company and Lloyd\u2019s platforms.\",\"url\":\"https:\/\/cowbell.insure\/au\/blog\/author\/claud\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Sound Approach to Supply Chain and Double Extortion Risks - Cowbell AUS","description":"The cyber landscape is shifting. The days of \"simple\" ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/","og_locale":"en_US","og_type":"article","og_title":"A Sound Approach to Supply Chain and Double Extortion Risks","og_description":"The cyber landscape is shifting. The days of \"simple\" ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.","og_url":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/","og_site_name":"Cowbell AUS","article_published_time":"2026-04-10T08:53:03+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png","type":"image\/png"}],"author":"Claud Bilbao","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claud Bilbao","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#article","isPartOf":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/"},"author":{"name":"Claud Bilbao","@id":"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d"},"headline":"A Sound Approach to Supply Chain and Double Extortion Risks","datePublished":"2026-04-10T08:53:03+00:00","mainEntityOfPage":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/"},"wordCount":698,"image":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png","keywords":["Supply Chain"],"articleSection":["Cowbell Australia"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/","url":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/","name":"A Sound Approach to Supply Chain and Double Extortion Risks - Cowbell AUS","isPartOf":{"@id":"https:\/\/cowbell.insure\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage"},"image":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png","datePublished":"2026-04-10T08:53:03+00:00","author":{"@id":"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d"},"description":"The cyber landscape is shifting. The days of \"simple\" ransomware attacks are fading, but for brokers and underwriters, this is simply the signal to adapt.","breadcrumb":{"@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#primaryimage","url":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png","contentUrl":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2026\/04\/CB-Blog-Threats-260409-0155.png","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/cowbell.insure\/au\/blog\/a-sound-approach-to-supply-chain-and-double-extortion-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cowbell.insure\/au\/"},{"@type":"ListItem","position":2,"name":"A Sound Approach to Supply Chain and Double Extortion Risks"}]},{"@type":"WebSite","@id":"https:\/\/cowbell.insure\/au\/#website","url":"https:\/\/cowbell.insure\/au\/","name":"Cowbell AUS","description":"The Sound Approach to Risk","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cowbell.insure\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cowbell.insure\/au\/#\/schema\/person\/55c65c4affa9fa9ffc610f0ceb7ae97d","name":"Claud Bilbao","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png","url":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png","contentUrl":"https:\/\/cowbell.insure\/au\/wp-content\/uploads\/sites\/17\/2024\/11\/Claud-Bilbao-96x96.png","caption":"Claud Bilbao"},"description":"Claud Bilbao is Cowbell\u2019s RVP and Underwriting &amp; Distribution Director for the UK and Australia. He most recently served as a Senior Underwriter at CNA, where he managed the London Specialty Cyber and Technology portfolios on both their Company and Lloyd\u2019s platforms.","url":"https:\/\/cowbell.insure\/au\/blog\/author\/claud\/"}]}},"_links":{"self":[{"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/posts\/36989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/comments?post=36989"}],"version-history":[{"count":3,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/posts\/36989\/revisions"}],"predecessor-version":[{"id":36993,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/posts\/36989\/revisions\/36993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/media\/36994"}],"wp:attachment":[{"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/media?parent=36989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/categories?post=36989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cowbell.insure\/au\/wp-json\/wp\/v2\/tags?post=36989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}