{"id":21477,"date":"2026-05-11T09:59:29","date_gmt":"2026-05-11T09:59:29","guid":{"rendered":"https:\/\/www.restore.co.uk\/datashred\/?p=21477"},"modified":"2026-05-11T10:00:40","modified_gmt":"2026-05-11T10:00:40","slug":"strengthening-your-physical-access-security","status":"publish","type":"post","link":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/","title":{"rendered":"Strengthening Your Physical Access Security"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-there-s-no-end-to-the-deviousness-of-data-thieves-when-it-comes-to-their-will-to-steal-and-damage-business-reputations-and-access-cards-and-badges-are-among-their-prime-data-bearing-targets-time-to-batten-down-on-your-security-measures\">There\u2019s no end to the deviousness of data thieves when it comes to their will to steal and damage business reputations, and access cards and badges are among their prime data-bearing targets. Time to batten down on your security measures.<\/h3>\n\n\n\r\n<section id=\"block--block_36c30a7a515eec0b707872f6bd4b9560\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_981182412-scaled.jpg\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Many of us are now in lockstep with data protection legislation when it comes to the secure destruction of obsolete paper and digital information and even other company assets such as old uniforms, counterfeit and prototype products. All items that may reveal information that\u2019s confidential to your colleagues, customers and business secrets, in fact.<\/p>\n<p>But how much do you recognise the threat posed by physical access items, such as ID badges, cards and digital keys? According to the Mayweather Group<strong>*<\/strong>, up to 10% of malicious data breaches are caused by compromises to physical access defence lines, and around 60% of companies have reported this type of breach in the past five years. That\u2019s a high failure rate for what is frequently the first wall in a business\u2019 security set-up.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<a class=\"nav-link btn-default\" href=\"https:\/\/mwgroup.io\/case-studies\/physical-security-breaches\/#:~:text=Tailgating%20(also%20called%20\u201cpiggybacking\u201d,nights%20when%20staffing%20is%20minimal.\"\r\n\t\t\t\t\t\t\ttarget=\"\"><span>Facts about physical security breaches<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_7b7b1045dabfeae0d54e69ff1fb9264e\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0\">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>With off-the-shelf kit, a data thief can scan and produce a clone of an RFID (Radio Frequency Identification Card) or NFC (Near Field Communication) card without even needing to take the original card. Once the info from the chip embedded in the card is copied, the perpetrator enjoys the same access as an authorised employee. The more sophisticated the access item, the more the layers contained within it can pose a problem. For example, with a stolen card, hackers can follow you through secured access doors (called \u2018tailgating\u2019) and gain entry to locations such as server rooms or into office spaces where they can install malware and steal hardware. Through cloning or theft, these data robbers can use individuals\u2019 personal information \u2013 even just a name and job title will do \u2013 to infiltrate your company hierarchy and launch phishing scams or falsify identities.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<a class=\"nav-link btn-default\" href=\"https:\/\/www.restore.co.uk\/datashred\/services\/product-textile-shredding\/\"\r\n\t\t\t\t\t\t\ttarget=\"\"><span>Our services<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n\r\n<section id=\"block--block_12aff23553451d7b301e0b04a5725def\" class=\"inform-sec bullets-and-quote-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-7\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2>What methods of protection are there?<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"service-list\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Employee education about the risks<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Systems and processes for reducing those data protection risks<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Strict visitor policies<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Anti-tailgating entry points<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Encrypted RFID\/NFC cards<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Tracking and monitoring access use<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Managing access technologies for obsolescence.<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-lg-5 mt-lg-0 mt-5\">\r\n\t\t\t\t\t<div class=\"text-lg-start text-center img-prov-main\">\r\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_2014007627-scaled-e1778492931599.jpeg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_6f5d169c9f55ed4c3c99462c76c8466f\" class=\"driving-sec blocknumfig-6103 hasbgimg full-width-text-with-background-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2025\/03\/Document-Retention-Restore-Datashred-Medium.jpg);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"mb-3\">You can take all these measures, but there should, in truth, be one further point. <\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 style=\"font-family: var(--museo-light);\">Ensuring secure disposal and destruction of redundant access items.<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">In our opinion, you can have all the company policies and fully educated, compliant employees possible, and yet a poorly executed disposal method for old or no-longer-needed access items could expose your organisation to bad actors just the same. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_660d10b2866026ed3c772351efdf9024\" class=\"content-block \">\r\n\t<h2><strong>The Restore Datashred solution<\/strong><\/h2>\n<p>At Datashred, \u2018security\u2019 is our middle name, and our solution is simple: don\u2019t let access item disposal become your weakest link.<\/p>\n<p>Use our professional secure collection and shredding services to ensure your business\u2019 confidentiality and reputation throughout your systems and processes.<\/p>\n<p>Our range of adaptable shredding and disposal services for businesses is built on meeting the standards laid down by legislation such as the <a href=\"https:\/\/www.restore.co.uk\/datashred\/about-restore-datashred\/our-accreditations\/\">UK GDPR<\/a> and Data Protection Act 2018, as well as sector-specific regulations from the FCA and NHS Information Governance standards, and the Freedom of Information Act 2000. In addition, our ISO 27001 and ISO 14001 accreditations, among others, ensure every item we destroy is done so securely and ethically.<\/p>\n<p>In short, you can trust us to meet, and exceed, the security and environmental requirements of any sector. Here\u2019s how.<\/p>\n<\/section>\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_33e4061dd2eaf1d1bc19ac26e3e1d47f\" class=\"why-sec info-cards-block info-cards-grid  \" style=\"\">\r\n\r\n\t<div class=\"container\">\r\n\r\n\t\t<div class=\"row\">\r\n\r\n\t\t\t<div class=\"col-md-12\">\r\n\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t<h2>At Restore Datashred, we provide:<\/h2>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t<div class=\"row top-space\">\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/03\/lorry.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \"> On-site and off-site shredding<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Which we design around you and your security needs.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/03\/Secure.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Secure on-site storage<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Featuring collection bins ranging from under-desk Shred Boxes and lockable cabinets to secured wheelie bins and, if necessary, fortress level containers. All designed to be part of your business\u2019 data protection set-up, keeping old, no-longer-needed cards, badges, and so on, safe until collected by one of our team.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/03\/driver.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Trained security operatives<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Professionals working to BS5878 standard to ensure the safety and privacy of your data from your place to our shredding blades.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/03\/award.png\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \"> State-of-the-art shredding<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Whether in one of our high-speed mobile shredding trucks or at one of our modern high-security facilities, our machines reduce your access assets to 2mm shreds in seconds.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/07\/tracking.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Complete audit trail<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Which includes e-audited, barcoded shredding bins and sacks, GPS-tracked vehicles and a certificate of destruction to close the loop and provide peace of mind after each transaction.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/02\/icon_Datashred_CCTV-01-1.png\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Monitored destruction centres<\/h5>\r\n\r\n\t\t\t\t\t\t<p>With passworded entry protocols and 24\/7 CCTV.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\r\n\t<\/div>\r\n\r\n<\/section>\r\n\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_8a4963ce66f84c5b0a1db1d6168360bc\" class=\"driving-sec blocknumfig-9251 hasbgimg full-width-text-with-background-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/02\/DATASHRED_CUSTOMERSERVICE-FEMALE-DESK-HEADSHOT-002.JPG-scaled-e1772105299150.jpg);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"\">Don\u2019t let what is supposed to be a security check item become a hazard to your data protection and integrity. <\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Give one of our Customer Service Hub team a call directly on 0330 029 7538 or contact them through the online customer form and find out how to seal your organisation\u2019s protective ringfence with the missing piece of the security jigsaw: secure shredding and responsible disposal of your obsolete access items.\r\n<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white mx-auto mt-4\" href=\"https:\/\/www.restore.co.uk\/datashred\/contact-us\/get-in-touch-customer-services\/\">Get in touch<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_d07ffbc8ba032a17872656340c641ac7\"\r\n\tclass=\"studies-sec featured-posts-grid-block   \">\r\n\t<div class=\"container\">\r\n\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t<h3>Recent news<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/datashred\/are-your-paper-shredding-services-compliant-with-uk-data-laws\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/04\/Legal-sector-scales.png\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\tAre Your Paper Shredding Services Compliant with UK Data Laws?<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tRestore Datashred provides certified, GDPR-compliant shredding solutions that protect your business, prevent costly breaches, and promote sustainable data disposal practices.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/datashred\/are-your-paper-shredding-services-compliant-with-uk-data-laws\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/datashred\/document-shredding-best-practices-the-dos-and-donts\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/03\/DATASHRED_VEHICLES_ROTOPRESS-REAR-VEHICLE-WITH-DOORS-CLOSED-004.JPG-1.jpg\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\tDocument shredding best practices: The do\u2019s and don\u2019ts<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tDocument shredding is crucial when it comes to protecting your business&#8217;s sensitive information.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/datashred\/document-shredding-best-practices-the-dos-and-donts\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/datashred\/how-long-should-you-keep-confidential-documents-before-disposal\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/07\/AdobeStock_448350597-1024x683.webp\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\tHow long should you keep confidential documents before disposal?<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tData privacy regulations are constantly evolving, and keeping up with best practices for confidential document disposal is crucial. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/datashred\/how-long-should-you-keep-confidential-documents-before-disposal\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>","protected":false},"excerpt":{"rendered":"<p>There\u2019s no end to the deviousness of data thieves when it comes to their will to steal and damage business reputations.<\/p>\n","protected":false},"author":24,"featured_media":21499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[18],"tags":[23,91,28],"resource-type":[],"sector":[],"class_list":["post-21477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-news","tag-security","tag-shredding"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthen Your Physical Access Security<\/title>\n<meta name=\"description\" content=\"Protect your business from stolen ID cards &amp; access items. Strengthen your physical access security &amp; reduce the risk of unauthorised access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthen Your Physical Access Security\" \/>\n<meta property=\"og:description\" content=\"Protect your business from stolen ID cards &amp; access items. Strengthen your physical access security &amp; reduce the risk of unauthorised access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Restore Datashred\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/restoredatashred\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-11T09:59:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-11T10:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg?_t=1778493640\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"speat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@datashreduk\" \/>\n<meta name=\"twitter:site\" content=\"@datashreduk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"speat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/\"},\"author\":{\"name\":\"speat\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\"},\"headline\":\"Strengthening Your Physical Access Security\",\"datePublished\":\"2026-05-11T09:59:29+00:00\",\"dateModified\":\"2026-05-11T10:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/\"},\"wordCount\":46,\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2026\\\/05\\\/AdobeStock_1951284237-scaled.jpeg\",\"keywords\":[\"News\",\"security\",\"Shredding\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/\",\"name\":\"Strengthen Your Physical Access Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2026\\\/05\\\/AdobeStock_1951284237-scaled.jpeg\",\"datePublished\":\"2026-05-11T09:59:29+00:00\",\"dateModified\":\"2026-05-11T10:00:40+00:00\",\"description\":\"Protect your business from stolen ID cards & access items. Strengthen your physical access security & reduce the risk of unauthorised access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2026\\\/05\\\/AdobeStock_1951284237-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2026\\\/05\\\/AdobeStock_1951284237-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Contactless check-in with smartphone at self-service access kiosk in modern office lobby, Gen Z hybrid work and smart building security concept, copy space.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/strengthening-your-physical-access-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening Your Physical Access Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#website\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/\",\"name\":\"Restore Datashred\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#organization\",\"name\":\"Restore Datashred\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/02\\\/Datashred-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/02\\\/Datashred-logo.svg\",\"width\":160,\"height\":65,\"caption\":\"Restore Datashred\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/restoredatashred\\\/\",\"https:\\\/\\\/x.com\\\/datashreduk\",\"https:\\\/\\\/linkedin.com\\\/restoredatashred\"],\"email\":\"datashredmarketing@restore.co.uk\",\"telephone\":\"0800 376 4422\",\"legalName\":\"Restore Datashred Limited\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\",\"name\":\"speat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"caption\":\"speat\"},\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/datashred\\\/author\\\/speat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthen Your Physical Access Security","description":"Protect your business from stolen ID cards & access items. Strengthen your physical access security & reduce the risk of unauthorised access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/","og_locale":"en_GB","og_type":"article","og_title":"Strengthen Your Physical Access Security","og_description":"Protect your business from stolen ID cards & access items. Strengthen your physical access security & reduce the risk of unauthorised access.","og_url":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/","og_site_name":"Restore Datashred","article_publisher":"https:\/\/facebook.com\/restoredatashred\/","article_published_time":"2026-05-11T09:59:29+00:00","article_modified_time":"2026-05-11T10:00:40+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg?_t=1778493640","type":"image\/jpeg"}],"author":"speat","twitter_card":"summary_large_image","twitter_creator":"@datashreduk","twitter_site":"@datashreduk","twitter_misc":{"Written by":"speat","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#article","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/"},"author":{"name":"speat","@id":"https:\/\/www.restore.co.uk\/datashred\/#\/schema\/person\/96e88008d54508295962216993e291c2"},"headline":"Strengthening Your Physical Access Security","datePublished":"2026-05-11T09:59:29+00:00","dateModified":"2026-05-11T10:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/"},"wordCount":46,"publisher":{"@id":"https:\/\/www.restore.co.uk\/datashred\/#organization"},"image":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg","keywords":["News","security","Shredding"],"articleSection":["News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/","url":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/","name":"Strengthen Your Physical Access Security","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/datashred\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#primaryimage"},"image":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg","datePublished":"2026-05-11T09:59:29+00:00","dateModified":"2026-05-11T10:00:40+00:00","description":"Protect your business from stolen ID cards & access items. Strengthen your physical access security & reduce the risk of unauthorised access.","breadcrumb":{"@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#primaryimage","url":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg","contentUrl":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2026\/05\/AdobeStock_1951284237-scaled.jpeg","width":2560,"height":1707,"caption":"Contactless check-in with smartphone at self-service access kiosk in modern office lobby, Gen Z hybrid work and smart building security concept, copy space."},{"@type":"BreadcrumbList","@id":"https:\/\/www.restore.co.uk\/datashred\/strengthening-your-physical-access-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.restore.co.uk\/datashred\/"},{"@type":"ListItem","position":2,"name":"Strengthening Your Physical Access Security"}]},{"@type":"WebSite","@id":"https:\/\/www.restore.co.uk\/datashred\/#website","url":"https:\/\/www.restore.co.uk\/datashred\/","name":"Restore Datashred","description":"","publisher":{"@id":"https:\/\/www.restore.co.uk\/datashred\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.restore.co.uk\/datashred\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.restore.co.uk\/datashred\/#organization","name":"Restore Datashred","url":"https:\/\/www.restore.co.uk\/datashred\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/datashred\/#\/schema\/logo\/image\/","url":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/02\/Datashred-logo.svg","contentUrl":"https:\/\/www.restore.co.uk\/datashred\/wp-content\/uploads\/sites\/5\/2024\/02\/Datashred-logo.svg","width":160,"height":65,"caption":"Restore Datashred"},"image":{"@id":"https:\/\/www.restore.co.uk\/datashred\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/restoredatashred\/","https:\/\/x.com\/datashreduk","https:\/\/linkedin.com\/restoredatashred"],"email":"datashredmarketing@restore.co.uk","telephone":"0800 376 4422","legalName":"Restore Datashred Limited","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/www.restore.co.uk\/datashred\/#\/schema\/person\/96e88008d54508295962216993e291c2","name":"speat","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","caption":"speat"},"url":"https:\/\/www.restore.co.uk\/datashred\/author\/speat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/posts\/21477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/comments?post=21477"}],"version-history":[{"count":21,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/posts\/21477\/revisions"}],"predecessor-version":[{"id":21502,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/posts\/21477\/revisions\/21502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/media\/21499"}],"wp:attachment":[{"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/media?parent=21477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/categories?post=21477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/tags?post=21477"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/resource-type?post=21477"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.restore.co.uk\/datashred\/wp-json\/wp\/v2\/sector?post=21477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}