{"id":16259,"date":"2020-07-22T08:30:30","date_gmt":"2020-07-22T08:30:30","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=16259"},"modified":"2020-08-05T06:23:36","modified_gmt":"2020-08-05T06:23:36","slug":"cyber-resilience-should-never-be-optional","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional","title":{"rendered":"Cyber-Resilience Should Never Be Optional!"},"content":{"rendered":"\n<p>I would suggest that protection of your company\u2019s (your Client\u2019s) information from Cyber-attacks is too important to ever be allowed to lapse. This means that protection from ransomware, access to and implementation of all updates and upgrades, as well as taking the time to routinely conduct test restores from your backups, should not be allowed to fall victim to short-sighted cost reductions.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"has-text-align-center wp-block-heading\">If human capital is the heartbeat of a business,<br>then data is the oxygen needed to keep it beating.&nbsp;&nbsp;<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The reality is that Cyber risks should be viewed the same as any other threats to business continuity. &nbsp;Organizations encounter fire or natural disasters, and they have safety measures against these traditional threats. Risks are inevitable and can come sooner or later. The good news is that Cyber-threats are preventable and manageable with the right cyber resilience strategy.<\/p>\n\n\n\n<p>RSI Security clearly addresses its importance. Cyber resilience is essential because it has numerous benefits to an organization before, during, and after cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">These benefits are as follows:<\/h2>\n\n\n\n<table style=\"border-collapse:collapse;border:none;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-01.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;border:none;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Enhancing system security.<\/div>\n      <div>Cyber resilience does not only help an organization respond to an attack and survive it quickly. By incorporating a cyber resilience program, an organization can develop and design strategies that can be delivered around its existing IT infrastructure. It also helps boost safety and security across the system and decreases the possibility of cyberattacks.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-02.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;border:none;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Reducing financial losses.<\/div>\n      <div>Regardless of how good is the IT security of an organization, the fact is that no entity is immune to cyberattacks. For small to medium enterprises, the financial damage of data breach is over a hundred thousand, according to reports. For big organizations, it is over a million. Additionally, if a security attack is successful, it will also cause damage to the organization\u2019s reputation in the field. It may also increase the financial damage. If an organization has cyber resilience, the effect of the attack will be lessened, and so is the financial losses.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-03.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;border:none;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Complying with regulatory and legal requirements.<\/div>\n      <div>Meeting legal requirements is also a valuable benefit in integrating cyber resilience in an organization. Compliance with legal regulations will aid the organization\u2019s security system such as the Network and Information Systems (NIS) directive which requires every organization \u201cto take appropriate security measures and to notify serious incidents to the relevant national authority.\u201d There is also the General Data Protection Regulation (GDPR) that promises to protect data privacy and restructure the way organizations approach data privacy.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-04.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Enhancing work culture and internal process.<\/div>\n      <div>The goal of every employee of any organization must be the security of data and other IT infrastructures. When people are inspired to take security seriously in their organization, sensitive information and physical assets are more likely in good hands. The organization should reinforce the right security behavior within each department and reduce human errors that expose sensitive data.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-05.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Protecting an organization\u2019s reputation.<\/div>\n      <div>If an organization doesn\u2019t have cyber resilience, the damage done by cybercriminals is challenging to control. Cyber resilience prevents an organization from public scrutiny, fines from regulators, and an abrupt reduction in sales, or worse, loss of business.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-06.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Maintaining the trust of suppliers and customers.<\/div>\n      <div>It is essential to have cyber resilience to maintain trust from suppliers and the public that an organization took many years to build. If an organization has an ineffective approach to cyber resilience, it can potentially experience severe damages, including restitution to suppliers and customers whose confidentiality has been breached.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n<br\/>\n<table style=\"border-collapse:collapse;\">\n  <tr>\n    <td style = \"width:20%;background:#BBE9F9;padding:20px;text-align:center;border:none;\">\n      <img src = \"https:\/\/www.backupassist.com\/app\/uploads\/2020\/07\/cyber-resilience-1-07.png\" style=\"width:100px;\"\/>\n    <\/td>\n    <td style=\"background:#E7F3F7;padding:20px;color:#282561;\">\n      <div style=\"font-size:20pt;margin-bottom:10px;\">Improving the organization\u2019s IT team.<\/div>\n      <div>One of the benefits of cyber resilience is that it improves the operations of the IT department daily. An organization with cyber resilience develops a hands-on IT team that is visible across the whole work environment. IT professionals steadily advance and act as cybercriminals become more evolved.<\/div>\n    <\/td>\n  <\/tr>\n<\/table>\n\n\n\n<p>By maintaining and using BackupAssist\u2019s BackupCare you will always have access to the latest updates and upgrades you need to maintain high cyber resilience, as well as the protection from ransomware attacks that is provided by <a href=\"https:\/\/www.backupassist.com\/solutions\/cryptosafeguard\"><strong>CryptoSafeGuard<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Throughout 2020 most SMBs have been forced to engage in cost cutting measures and making decisions based on the perceived criticality of a service or resource to the future of their business. <\/p>\n","protected":false},"author":19,"featured_media":16354,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Throughout 2020 most SMBs have been forced to engage in cost cutting measures and making decisions based on the perceived criticality of a service or resource to the future of their business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T08:30:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-05T06:23:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"829\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Ryan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Ryan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\"},\"author\":{\"name\":\"Craig Ryan\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/06079a30fc66dbb02f57bc3054fec1d1\"},\"headline\":\"Cyber-Resilience Should Never Be Optional!\",\"datePublished\":\"2020-07-22T08:30:30+00:00\",\"dateModified\":\"2020-08-05T06:23:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\"},\"wordCount\":672,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\",\"url\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\",\"name\":\"Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg\",\"datePublished\":\"2020-07-22T08:30:30+00:00\",\"dateModified\":\"2020-08-05T06:23:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg\",\"width\":2000,\"height\":829},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-Resilience Should Never Be Optional!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/06079a30fc66dbb02f57bc3054fec1d1\",\"name\":\"Craig Ryan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49f0f41c73d62317721f4a3b8d4127afc9905eb110e0494e80422a9bfbd476cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49f0f41c73d62317721f4a3b8d4127afc9905eb110e0494e80422a9bfbd476cf?s=96&d=mm&r=g\",\"caption\":\"Craig Ryan\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/craig-ryan\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional","og_locale":"en_US","og_type":"article","og_title":"Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog","og_description":"Throughout 2020 most SMBs have been forced to engage in cost cutting measures and making decisions based on the perceived criticality of a service or resource to the future of their business.","og_url":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-07-22T08:30:30+00:00","article_modified_time":"2020-08-05T06:23:36+00:00","og_image":[{"width":2000,"height":829,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg","type":"image\/jpeg"}],"author":"Craig Ryan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Ryan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional"},"author":{"name":"Craig Ryan","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/06079a30fc66dbb02f57bc3054fec1d1"},"headline":"Cyber-Resilience Should Never Be Optional!","datePublished":"2020-07-22T08:30:30+00:00","dateModified":"2020-08-05T06:23:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional"},"wordCount":672,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional","url":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional","name":"Cyber-Resilience Should Never Be Optional! - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg","datePublished":"2020-07-22T08:30:30+00:00","dateModified":"2020-08-05T06:23:36+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/05\/cyber-resilience-BG.jpg","width":2000,"height":829},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/cyber-resilience-should-never-be-optional#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Cyber-Resilience Should Never Be Optional!"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/06079a30fc66dbb02f57bc3054fec1d1","name":"Craig Ryan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/49f0f41c73d62317721f4a3b8d4127afc9905eb110e0494e80422a9bfbd476cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49f0f41c73d62317721f4a3b8d4127afc9905eb110e0494e80422a9bfbd476cf?s=96&d=mm&r=g","caption":"Craig Ryan"},"url":"https:\/\/www.backupassist.com\/blog\/author\/craig-ryan"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=16259"}],"version-history":[{"count":16,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16259\/revisions"}],"predecessor-version":[{"id":16357,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16259\/revisions\/16357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/16354"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=16259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=16259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=16259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}