{"id":19744,"date":"2024-04-09T01:14:21","date_gmt":"2024-04-09T01:14:21","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=19744"},"modified":"2024-04-10T00:32:13","modified_gmt":"2024-04-10T00:32:13","slug":"the-grandfather-father-son-backup-scheme-explained","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained","title":{"rendered":"The Grandfather-Father-Son Backup Scheme Explained"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.backupassist.com\/blog\/data-archiving-and-retention-101-best-practices-with-backupassist\" target=\"_blank\" rel=\"noreferrer noopener\">Data archiving and retention<\/a> plays a vital role in both business continuity and adherence to regulatory compliance guidelines in practically every industry worldwide. Protecting your business\u2019s data privacy and cyber-resilience is essential, and you can achieve this with secure and recoverable backups. In this article, we will explore the grandfather-father-son backup scheme.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does the Grandfather-Father-Son Backup Scheme Work?<\/h2>\n\n\n\n<p>The grandfather-father-son backup scheme, also known as GFS backup rotation, is a simple and effective method for managing backups over time. It is especially useful for businesses with larger and complex data storage needs and is designed to balance the need for quick recovery with the requirement for long-term archiving.<\/p>\n\n\n\n<p>GFS backup rotation works like this:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Son (Daily Backup):<\/strong> The \u201cson\u201d represents the most recent backup, generally taken on a daily basis. This ensures that the latest version of your data is always available for recovery.<\/li><li><strong>Father (Weekly Backup):<\/strong> The \u201cfather\u201d backup is taken less frequently, usually on a weekly basis. This version provides a historical perspective and allows you to recover data as it existed at the end of each week.<\/li><li><strong>Grandfather (Monthly Backup):<\/strong> The \u201cgrandfather\u201d backup is the least frequent backup, and provides a long-term archive version of your data. It serves as a more extended historical backup, useful for compliance, auditing, or in case you need to recover data from a specific point in the past.<\/li><\/ol>\n\n\n\n<p>The rotation continues with the son becoming the father, the father becoming the grandfather, and a new son backup being created.<\/p>\n\n\n\n<p>Below is an example of this concept:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/Grandfather-Father-Son-Backup-Schedule.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"750\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/Grandfather-Father-Son-Backup-Schedule.jpg\" alt=\"grandfather-father-son backup schedule\" class=\"wp-image-19745\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/Grandfather-Father-Son-Backup-Schedule.jpg 750w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/Grandfather-Father-Son-Backup-Schedule-300x300.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/Grandfather-Father-Son-Backup-Schedule-150x150.jpg 150w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><figcaption>Note: this diagram is based on the scheme&#8217;s default settings. You can change the days that archive backups are run on.<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What are the Benefits of the Grandfather-Father-Son Backup Scheme?<\/h2>\n\n\n\n<p>A business might choose to use the grandfather-father-son backup scheme for several reasons, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Comprehensive Data Protection: <\/strong>The GFS scheme provides a well-rounded approach to data protection by maintaining multiple generations of backups. Recent backups (\u201csons\u201d) ensure fast recovery, while historical backups (\u201cfathers\u201d and \u201cgrandfathers\u201d) serve longer-term archival and compliance purposes.<\/li><li><strong>Fast Recovery of Recent Data:<\/strong> Since daily (son) backups capture the most recent changes, businesses can quickly recover the latest version of their data in case of accidental deletion, corruption, or other issues. This minimizes downtime and helps maintain business continuity.<\/li><li><strong>Historical Data Preservation:<\/strong> This is particularly useful for compliance, auditing, or recovering specific versions of data from the past.<\/li><li><strong>Regulatory Compliance:<\/strong> Many industries are subject to regulatory requirements that mandate data retention for a specific duration. The GFS scheme allows businesses to meet these standards by maintaining backups for different time intervals.<\/li><li><strong>Risk Mitigation:<\/strong> By having a multi-generational backup strategy, businesses reduce the risk of losing critical data due to unforeseen events such as hardware failures, ransomware attacks, or accidental data loss.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The grandfather-father-son backup scheme enables businesses to adopt a balanced and flexible approach to data protection. Combining the GFS backup scheme with the <a href=\"https:\/\/www.backupassist.com\/blog\/onsite-vs-offsite-backup-recovery-which-is-best-for-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1 backup strategy<\/a> will ensure your business\u2019s valuable data is protected.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.backupassist.com\/classic\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">BackupAssist Classic<\/a> makes it easy to set up your GFS backup rotation with simple and easy-to-use tools. Download your <a href=\"https:\/\/www.backupassist.com\/classic\/downloads\/\" target=\"_blank\" rel=\"noreferrer noopener\">30-day free trial<\/a> today!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.<\/p>\n","protected":false},"author":22,"featured_media":19747,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[771],"tags":[],"class_list":["post-19744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-classic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Grandfather-Father-Son Backup Scheme Explained<\/title>\n<meta name=\"description\" content=\"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Grandfather-Father-Son Backup Scheme Explained\" \/>\n<meta property=\"og:description\" content=\"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-09T01:14:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T00:32:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"The Grandfather-Father-Son Backup Scheme Explained\",\"datePublished\":\"2024-04-09T01:14:21+00:00\",\"dateModified\":\"2024-04-10T00:32:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\"},\"wordCount\":526,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg\",\"articleSection\":[\"BackupAssist Classic\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\",\"url\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\",\"name\":\"The Grandfather-Father-Son Backup Scheme Explained\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg\",\"datePublished\":\"2024-04-09T01:14:21+00:00\",\"dateModified\":\"2024-04-10T00:32:13+00:00\",\"description\":\"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg\",\"width\":1000,\"height\":618},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Grandfather-Father-Son Backup Scheme Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Grandfather-Father-Son Backup Scheme Explained","description":"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained","og_locale":"en_US","og_type":"article","og_title":"The Grandfather-Father-Son Backup Scheme Explained","og_description":"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.","og_url":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained","og_site_name":"Cyber Resilience Blog","article_published_time":"2024-04-09T01:14:21+00:00","article_modified_time":"2024-04-10T00:32:13+00:00","og_image":[{"width":1000,"height":618,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"The Grandfather-Father-Son Backup Scheme Explained","datePublished":"2024-04-09T01:14:21+00:00","dateModified":"2024-04-10T00:32:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained"},"wordCount":526,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg","articleSection":["BackupAssist Classic"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained","url":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained","name":"The Grandfather-Father-Son Backup Scheme Explained","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg","datePublished":"2024-04-09T01:14:21+00:00","dateModified":"2024-04-10T00:32:13+00:00","description":"The grandfather-father-son backup scheme enables businesses to adopt a balanced and cyber-resilient approach to data protection.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/04\/shutterstock_746441521.jpg","width":1000,"height":618},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/the-grandfather-father-son-backup-scheme-explained#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"The Grandfather-Father-Son Backup Scheme Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=19744"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19744\/revisions"}],"predecessor-version":[{"id":19749,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19744\/revisions\/19749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19747"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=19744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=19744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=19744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}