{"id":16898,"date":"2020-12-17T22:30:14","date_gmt":"2020-12-17T22:30:14","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=16898"},"modified":"2020-12-21T09:50:09","modified_gmt":"2020-12-21T09:50:09","slug":"wifi-hacking-how-to-secure-business-wifi","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi","title":{"rendered":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?"},"content":{"rendered":"\n<p>This guide to WiFi hacking and security is a continuation of <a href=\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-introduction-and-attacks\">Part 1 &#8211; WiFi hacking introduction and common attacks<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Basic WiFi Security Checklist<\/h2>\n\n\n\n<p>Here are some low-cost ways you can protect your home and business by implementing basic security on your WiFi access points and devices that use WiFi:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Router or Access Point WiFi Security<\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Set a strong WPA2 password on your router. As a bare minimum, we would suggest 12 characters (non-dictionary), however, using longer passwords or pass phrases is recommended. Longer, complex passwords will reduce the risk of brute force password cracking to negligible levels.<\/li><li>Enable \u2018Encryption of Management Frames\u2019, if your router has the option. This will prevent deauthentication attacks (see last month\u2019s blog for an explanation). &nbsp;<\/li><li>Update your router firmware to the latest version.<\/li><li>Activate MAC address restrictions in your router to limit connections to trusted devices only, e.g. authorised phones and laptops etc.<\/li><li>Disable WPS and UPnP. This will stop hackers from being able to exploit weaknesses in these features to open vulnerabilities for attack.<\/li><li>Change your default router administration credentials to your own User-ID and password.<\/li><li>Disable remote administration and administration via WiFi for the router (internal fixed network only).<\/li><li>Hide your SSID (WiFi identifier). This may not be ideal for guests as they won\u2019t be able to see your network to connect to and will require specific details to be provided to them.<\/li><li>Use the router firewall to restrict access to the minimum services (ports) and IP addresses required.<\/li><li>Reduce the WiFi range on your router to the minimum possible without disrupting normal use.<\/li><li>Switch off the wireless router when not required i.e. when your office is closed overnight or on weekends. This can be scheduled in the device or setup using a simple power socket timer.<\/li><li>Avoid open sharing of WiFi access credentials \u2013 don\u2019t post them on the wall for everyone to see!<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">WiFi Device Security \u2013 phone, laptop, tablet, watch etc.<\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"13\"><li>Disable WiFi on your device and only enable it when you are connecting to a known trusted Access Point.<\/li><li>Avoid automatic connections when setting up a new WiFi connection or, at the very least, remove automatic connections for Access Points you do not regularly use.<\/li><li>Use a VPN when accessing the internet over untrusted connections where possible.<\/li><li>Never enter or view sensitive information with a web site that does not support encrypted (HTTPS) communications (the lock symbol in your browser).<\/li><li>Never connect to an open WiFi network (no password required) unless you are managing the risk.<\/li><li>Ensure all internal network server endpoints such as printers have encrypted (HTTPS) communications.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What if I suspect I\u2019m already being attacked?<\/h2>\n\n\n\n<p>The checklist above will not provide absolute protection, but it\u2019s a good start to making it harder for attackers to access your WiFi. Treat it as the recommended minimum that will prevent many low-level attacks from succeeding.<\/p>\n\n\n\n<p>If you suspect that your WiFi networks have already been compromised, or are subject to being attacked or hijacked, then the only way to stop this is to physically find the rogue devices and remove them.<\/p>\n\n\n\n<p>Let\u2019s repeat: the <strong>only<\/strong> way to stop unauthorised WiFi from attacking or hijacking your network is to <strong>physically find it and remove it<\/strong>.<\/p>\n\n\n\n<p>You\u2019ll need specialized hardware to do this, such as the <a href=\"https:\/\/hackhunter.io\/\">HackHunter Pursuit<\/a> portable WiFi tracker (pictured).<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/Hidden-Camera-Plant-1-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/Hidden-Camera-Plant-1-1.jpg\" alt=\"\" class=\"wp-image-16902\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/Hidden-Camera-Plant-1-1.jpg 1000w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/Hidden-Camera-Plant-1-1-300x169.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/Hidden-Camera-Plant-1-1-768x432.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/WiFi-Pineapple-Found.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/WiFi-Pineapple-Found.jpg\" alt=\"\" class=\"wp-image-16903\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/WiFi-Pineapple-Found.jpg 1000w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/WiFi-Pineapple-Found-300x169.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/12\/WiFi-Pineapple-Found-768x432.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<p>This lightweight, handheld device detects unauthorised WiFi in your environment and locates the source to within a few centimetres, so it can be removed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>WiFi hacking is a risk to all businesses, and following the checklist above will strengthen your security. However, there are still inherent flaws in WiFi that make it vulnerable to attack. The only way to be sure of your WiFi network\u2019s security is by using a WiFi tracker to locate and remove rogue devices. To see how a WiFi tracker works, visit the <a href=\"https:\/\/hackhunter.io\/\">HackHunter website<\/a> or <a href=\"https:\/\/hackhunter.io\/pursuit-tracker-demo\/\">book in for a demo<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you read our WiFi hacking introduction last month, you\u2019ll know that WiFi has vulnerabilities that can be easily exploited and that it is difficult to know if you\u2019re being attacked.<br \/>\nSo what can you do to protect yourself?<\/p>\n","protected":false},"author":24,"featured_media":16755,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-16898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"If you read our WiFi hacking introduction last month, you\u2019ll know that WiFi has vulnerabilities that can be easily exploited and that it is difficult to know if you\u2019re being attacked. So what can you do to protect yourself?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-17T22:30:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-21T09:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"697\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\"},\"author\":{\"name\":\"Mike Thompson\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7ef3a99c7aab32deab9b746427650fad\"},\"headline\":\"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?\",\"datePublished\":\"2020-12-17T22:30:14+00:00\",\"dateModified\":\"2020-12-21T09:50:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\",\"url\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\",\"name\":\"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg\",\"datePublished\":\"2020-12-17T22:30:14+00:00\",\"dateModified\":\"2020-12-21T09:50:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg\",\"width\":1500,\"height\":697},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7ef3a99c7aab32deab9b746427650fad\",\"name\":\"Mike Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a212836670e150302227fcc84bae0bc04e801b58838d70b7b1c4de8ff26f062?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a212836670e150302227fcc84bae0bc04e801b58838d70b7b1c4de8ff26f062?s=96&d=mm&r=g\",\"caption\":\"Mike Thompson\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/mikethompson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi","og_locale":"en_US","og_type":"article","og_title":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog","og_description":"If you read our WiFi hacking introduction last month, you\u2019ll know that WiFi has vulnerabilities that can be easily exploited and that it is difficult to know if you\u2019re being attacked. So what can you do to protect yourself?","og_url":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-12-17T22:30:14+00:00","article_modified_time":"2020-12-21T09:50:09+00:00","og_image":[{"width":1500,"height":697,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","type":"image\/jpeg"}],"author":"Mike Thompson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mike Thompson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi"},"author":{"name":"Mike Thompson","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7ef3a99c7aab32deab9b746427650fad"},"headline":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?","datePublished":"2020-12-17T22:30:14+00:00","dateModified":"2020-12-21T09:50:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi","url":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi","name":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business? - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","datePublished":"2020-12-17T22:30:14+00:00","dateModified":"2020-12-21T09:50:09+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/11\/wifi-hacking\u2013why-it-is-such-a-big-threat-hero-1.jpg","width":1500,"height":697},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/wifi-hacking-how-to-secure-business-wifi#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"WiFi Hacking Part 2 \u2013 how do I secure my WiFi and protect my business?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7ef3a99c7aab32deab9b746427650fad","name":"Mike Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a212836670e150302227fcc84bae0bc04e801b58838d70b7b1c4de8ff26f062?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a212836670e150302227fcc84bae0bc04e801b58838d70b7b1c4de8ff26f062?s=96&d=mm&r=g","caption":"Mike Thompson"},"url":"https:\/\/www.backupassist.com\/blog\/author\/mikethompson"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=16898"}],"version-history":[{"count":12,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16898\/revisions"}],"predecessor-version":[{"id":16931,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16898\/revisions\/16931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/16755"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=16898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=16898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=16898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}