{"id":24010,"date":"2025-08-20T09:04:38","date_gmt":"2025-08-20T08:04:38","guid":{"rendered":"https:\/\/www.sage.com\/en-gb\/blog\/?p=24010"},"modified":"2025-08-20T11:19:13","modified_gmt":"2025-08-20T10:19:13","slug":"phishing-why-trusting-your-gut-matters","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-gb\/blog\/phishing-why-trusting-your-gut-matters\/","title":{"rendered":"Phishing: Why trusting your gut matters"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-gb\/blog\/category\/technology-innovation\/\" class=\"entry-header__link\">Technology &amp; Innovation<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tPhishing: Why trusting your gut matters\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2025-08-20T09:04:38+01:00\">20 August, 2025<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"Phishing: Why trusting your gut matters\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-gb\/blog\/phishing-why-trusting-your-gut-matters\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-gb\/blog\/author\/keirthomasbryant\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2025\/06\/keir-short-hair-350x350.jpg\" class=\"entry-author__image\" alt=\"\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2025\/06\/keir-short-hair-350x350.jpg 350w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2025\/06\/keir-short-hair.jpg 760w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>\t\t\t\t<span class=\"entry-author__name\">Keir Thomas-Bryant<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n\n<p>You might think <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/improve-cyber-security-small-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber security<\/a> is a sophisticated cat and mouse game between criminals and IT professionals. Hackers sit hunched in dark rooms, staring at screens of green text and trying to penetrate the latest defences.<\/p>\n\n\n\n<p>But that\u2019s no longer true for the vast majority of cybercrime. At an epidemic level, criminals are targeting people. That means you, your colleagues, your family, and your friends.<\/p>\n\n\n\n<p>95% of all successful cyberattacks have a human element involved.<\/p>\n\n\n\n<p>What can be done? Put simply, you need to trust your gut so that, when phishing is attempted, you know instinctively something isn\u2019t right.<\/p>\n\n\n\n<p>Getting to that point involves understanding the threat, and how to respond. That\u2019s what this article is about. <\/p>\n\n\n\n<p>Here\u2019s what we discuss:<\/p>\n\n\n<?xml encoding=\"utf-8\" ?><div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-businesses-are-ripe-for-phishing\" data-level=\"2\">Businesses are ripe for phishing<\/a><\/li><li><a href=\"#h-what-is-phishing\" data-level=\"2\">What is phishing?<\/a><\/li><li><a href=\"#h-why-phishing-is-so-effective\" data-level=\"2\">Why phishing is so effective<\/a><\/li><li><a href=\"#h-what-a-phishing-scam-looks-like\" data-level=\"2\">What a phishing scam looks like<\/a><\/li><li><a href=\"#h-advice-for-avoiding-phishing-scams-for-business\" data-level=\"2\">Advice for avoiding phishing scams for business<\/a><\/li><\/ul><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.sage.com\/en-gb\/trust-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Visit Sage&#8217;s Trust and Security Hub<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-businesses-are-ripe-for-phishing\">Businesses are ripe for phishing<\/h2>\n\n\n\n<p>Businesses are an increasingly popular target for phishing.<\/p>\n\n\n\n<p>The government\u2019s Cyber Security Breaches Survey 2025 revealed that in 2024, 20% of businesses and 14% of charities had been victims of at least one cybercrime in the past year.<\/p>\n\n\n\n<p>The survey found phishing was the most prevalent cybercrime, with 93% of affected businesses and 95% of affected charities encountering it.<\/p>\n\n\n\n<p>The government\u2019s <a href=\"https:\/\/www.actionfraud.police.uk\/campaign\/phishing-awareness\">Suspicious Email reporting Service (SERS)<\/a> has received over 41 million reports since its inception in April 2020.<\/p>\n\n\n\n<p>And this is probably scratching the surface. According to the CIFAS Global Anti-Scam Alliance report, 71% of victims do not tell the police. Often this is out of shame: \u201cHow could I have been so ignorant to fall for it?\u201d<\/p>\n\n\n\n<p>Consumers lose \u00a31,400 per scam on average, the CIFAS report continues, with \u00a311.4 billion being stolen in the 12 months up to November 2024.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-phishing\">What is phishing?<\/h2>\n\n\n\n<p>Phishing is best understood as <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/get-savvy-social-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>: criminals manipulate you into doing something you wouldn\u2019t choose to do otherwise.<\/p>\n\n\n\n<p>This might be clicking a link, opening an attachment, sharing a password, providing a one-time authentication code, or moving money out of your account and into that of the scammer. Often it&#8217;s all of these!<\/p>\n\n\n\n<p>Phishing attempts can arrive by text, social media messaging, emails, or even actual physical letters that arrive at your address.<\/p>\n\n\n\n<p>You might think you would never fall for anything like this. After all, you\u2019re nobody\u2019s fool, right?<\/p>\n\n\n\n<p>The UK Information Commissioner\u2019s Office (ICO) explains that phishing relies on your belief that the message comes from someone you trust. That familiar branding is weaponised to lower your guard.<\/p>\n\n\n\n<p>A friend texting you having lost their mobile. Your boss messaging you on WhatsApp, having setup a new account. Your bank calling you out of the blue to say your account has been hacked. Microsoft emailing to say your computer needs a vital security update. <\/p>\n\n\n\n<p>In other words, phishing is fundamentally an exercise in extremely effective deception, rather than code-breaking.<\/p>\n\n\n\n<p>Therefore, the most effective defences are human ones: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Slowing down.<\/li>\n\n\n\n<li>Noticing inconsistencies.<\/li>\n\n\n\n<li>Listening to that \u201cthis feels off\u201d sensation.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-phishing-is-so-effective\">Why phishing is so effective<\/h2>\n\n\n\n<p>Phishing isn\u2019t new. It\u2019s been around since the mid-1990s, when scams like AOHell targeted AOL users by impersonating staff. That\u2019s when it got its name \u2013 it took the <em>ph-<\/em> prefix from an earlier form of cybercrime known as phreaking, where hackers targeted the telephone infrastructure to get free calls.<\/p>\n\n\n\n<p>The goal back in the mid-1990s was to harvest login passwords.<\/p>\n\n\n\n<p>What\u2019s changed since <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/how-to-create-psychological-safety-for-employees-google\/\" target=\"_blank\" rel=\"noreferrer noopener\">isn\u2019t the psychology<\/a>, but the scale and polish: spoofed websites involving flawless copycat branding, urgent pretexts, and \u2013 increasingly nowadays \u2013 AI-generated voice, text, images, or even video (including live video calls). These are known as deepfakes, and scammers are always quick to exploit the very latest technologies.<\/p>\n\n\n\n<p>The site they send you to will look exactly like your bank. The voicemail message you get will sound exactly like your colleague, family member or friend. The text message will seem to authentically have come from your bank, with the correct spoofed name or number.<\/p>\n\n\n\n<p>Sometimes the scammers won&#8217;t request money directly but will request you buy online giftcards, and share the codes with them. <\/p>\n\n\n\n<p>But the core pitch is the same, and has been since those AOL days: \u201cAct now before something bad happens.\u201d Recognising that pattern is half the battle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-a-phishing-scam-looks-like\">What a phishing scam looks like<\/h2>\n\n\n\n<p>Here\u2019s a real-world, worked through example of what a phishing attempt on a business looks like.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-the-phishing-hook\">1. The phishing hook<\/h3>\n\n\n\n<p>You get a text claiming to be from your business banking: \u201cWe\u2019ve detected a suspicious payment. To secure your account, confirm here.\u201d<\/p>\n\n\n\n<p>There\u2019s a link that looks right at a glance (e.g. santander-secure-bank.net).<\/p>\n\n\n\n<p>Moments later, your phone rings. Caller ID displays your bank\u2019s name. The caller calmly references the text and quotes a \u201ccase ID.\u201d They may even tell you some personal details like your address or date of birth \u2013 all harvested from vast hacker databases that are easily accessible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-applying-the-pressure\">2. Applying the pressure<\/h3>\n\n\n\n<p>The caller says funds are moving right now, and they need to \u201csecure\u201d your account.<\/p>\n\n\n\n<p>They may steer you to a very professional login page that\u2019s a perfect clone of the bank.<\/p>\n\n\n\n<p>Once you login, your phone pings \u2013 even though you\u2019re still on the phone to the &#8220;bank&#8221; \u2013 and you find a one-time passcode has arrived.<\/p>\n\n\n\n<p>You\u2019re asked to read it out to them, \u201cto verify security\u201d.<\/p>\n\n\n\n<p>Alternatively, you might be asked simply to login to your banking using your usual link or app, and transfer money to a special \u201cholding account\u201d where it\u2019ll be \u201csecure\u201d until the bank can fix the issue.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-the-compromise\">3. The compromise<\/h3>\n\n\n\n<p>If you enter credentials on the fake site, they\u2019re captured instantly. If you read out a passcode (or approve a push notification) the scammers use it in real time.<\/p>\n\n\n\n<p>And just like that, they have control of your bank account. It&#8217;s that easy.<\/p>\n\n\n\n<p>If you transfer money yourself from your bank account to the scammer&#8217;s account, that\u2019s authorised push payment (APP) fraud. This is where victims are manipulated into sending funds and it&#8217;s easily one of the UK\u2019s most prevalent types of fraud.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-the-exit\">4. The exit<\/h3>\n\n\n\n<p>The caller \u201cends the case\u201d and thanks you for your vigilance.<\/p>\n\n\n\n<p>You hang-up and wipe a little sweat from your brow. Wow, that was close. Glad it&#8217;s sorted, though.<\/p>\n\n\n\n<p>Minutes or hours later you see unauthorised transactions, or find that the \u201csafe\u201d account was the criminal\u2019s.<\/p>\n\n\n\n<p>Needless to say, if this happens in real life then you should call your bank immediately. Keep reading to find out how to do so.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-could-ve-done\">What you could\u2019ve done<\/h3>\n\n\n\n<p>The right move at the first sign of doubt \u2013 that feeling in your gut that something isn&#8217;t quite right \u2013 is to disconnect and dial 159 from a phone. <\/p>\n\n\n\n<p>Dialling 159 routes you to an official automated service by which you can say the name of your bank. You\u2019ll then be routed straight to them.<\/p>\n\n\n\n<p>If you worry about remembering that number, think of it as a diagonal slash, from top left to bottom right on the phone keypad.<\/p>\n\n\n\n<p>Ideally, dial it from a separate phone from the one you were called on. Scammers can keep the line open on landlines, for example, making you think you\u2019ve hung up when you haven\u2019t. They even play fake dial tones to make you think the line is free.<\/p>\n\n\n\n<p>If there is genuine suspicious activity then, great news: by dialing 159, you\u2019re now speaking to the correct people to fix it.<\/p>\n\n\n\n<p>There\u2019s also a service for suspicious texts and emails \u2013&nbsp;forward emails to report@phishing.gov.uk and texts to 7726. Although this won&#8217;t provide instant feedback, it can help authorities close down the scammer accounts. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-advice-for-avoiding-phishing-scams-for-business\">Advice for avoiding phishing scams for business<\/h2>\n\n\n\n<p>Here\u2019s some tips for keeping yourself and your business safe from phishing:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Pause for thought<\/strong>: Urgency is a red flag. If it\u2019s really your bank, it\u2019ll still be true after a five-minute pause while you verify through your app or by dialling 159.<\/li>\n\n\n\n<li><strong>Channel switch to verify<\/strong>: Don\u2019t reply. Don\u2019t click their link. To investigate, use a trusted route you ordinarily use, such as your banking app, your usual online baking bookmark, or the bank\u2019s official phone number (e.g. the one on the back of debit and credit cards \u2013&nbsp;but definitely not the one in the email you might&#8217;ve received!). <\/li>\n\n\n\n<li><strong>Never, ever share a one-time passcode<\/strong>: One-time passcodes you receive through text messages or retrieve from an authenticator app should never, ever be shared \u2013 or even spoken aloud! It\u2019s a prime way scammers authorise their frauds. If someone\u2019s asking for one, stop. Nobody legitimate would ever do so. Similarly, if you get an authentication request out of the blue then don&#8217;t approve it. <\/li>\n<\/ol>\n\n\n\n<p>Ensure you and your colleagues are educated with the government&#8217;s <a href=\"https:\/\/www.ncsc.gov.uk\/section\/advice-guidance\/small-medium-sized-organisations\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber security advice for small to medium sized organisations<\/a>. It&#8217;s an excellent and accessible resource.<\/p>\n\n\n\n<p>But above all, never forget: We are all equipped with gut feelings, and when we listen they are a powerful defence mechanism.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Final thoughts<\/h3>\n\n\n\n<p>The online world is an amazing place, but increasingly, it\u2019s a wild-west frontier where scammers exploit victims on a minute-by-minute basis. <\/p>\n\n\n\n<p>Staying vigilant is key and, while this shouldn\u2019t get in the way of your online activities, it should always be present.<\/p>\n\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Explore Sage trust and security<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>Trust is the foundation of good security and our customer relations. Learn how we safeguard your security, value your privacy, and uphold the highest standards of data ethics.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.sage.com\/en-gb\/trust-security\/\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\tid=\"cta-id-24055\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-button-location=\"cta_box\"\n\t\t\t\t\t\t\t\t\t\t\t>Learn more<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2025\/08\/tandshubcta.jpg\" class=\"single-cta__image\" alt=\"A man in an office exploring the Sage trust and security hub\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2025\/08\/tandshubcta.jpg 800w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Subscribe to the Sage Advice newsletter<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>Join more than 500,000 UK readers and get the best business admin strategies and tactics, as well as actionable advice to help your company thrive, in your inbox every month.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-b1a63862-3fa0-4a5e-bb67-c76b88bbc6b8\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Subscribe now<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Phishing remains the most prevalent cyber threat targeting businesses. Trusting your instincts and staying vigilant are key defenses. Education can help prevent falling victim to these scams, as we discuss in this blog<\/p>\n","protected":false},"author":280,"featured_media":16430,"menu_order":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"footnotes":""},"categories":[11],"tags":[52],"business_type":[4,3,115],"lilypad":[],"context":[],"industry":[],"persona":[67,70,71,72,73,74,75],"imagine_tag":[267],"coauthors":[369],"class_list":["post-24010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-innovation","tag-security-fraud","business_type-small-business","business_type-medium-sized-business","business_type-accountants"],"sage_meta":{"region":"en-gb","author_name":"Keir Thomas-Bryant","featured_image":"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2023\/09\/GettyImages-1488918938.jpg","imagine_tags":{"267":"Security Fraud"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice UK","distributor_original_site_url":"https:\/\/www.sage.com\/en-gb\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/24010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/users\/280"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/comments?post=24010"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/24010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media\/16430"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media?parent=24010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/categories?post=24010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/tags?post=24010"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/business_type?post=24010"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/lilypad?post=24010"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/context?post=24010"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/industry?post=24010"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/persona?post=24010"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/imagine_tag?post=24010"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/coauthors?post=24010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}