{"id":19898,"date":"2025-03-25T22:08:34","date_gmt":"2025-03-25T22:08:34","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=19898"},"modified":"2026-04-03T07:45:04","modified_gmt":"2026-04-03T07:45:04","slug":"when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","title":{"rendered":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments"},"content":{"rendered":"\n<p>Ransomware attacks are becoming increasingly sophisticated, with some cybercriminals directly targeting backup systems to cripple recovery efforts. Despite having backup strategies in place, some organizations have found themselves paying ransoms due to inadequate protection or other operational challenges. Below are three notable examples of ransomware backup failures and key lessons to improve your own data protection strategy.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">1. Travelex \u2013 Inadequate Backup and Operational Disruption<\/h1>\n\n\n\n<p>In January 2020, Travelex, a global foreign exchange company, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.ifsecglobal.com\/cyber-security\/travelex-hit-by-cyber-attack\/\" target=\"_blank\">fell victim to a ransomware attack<\/a> that encrypted critical data. Despite having backup systems, Travelex faced severe recovery challenges due to incomplete or outdated backup data. As a result, the company&#8217;s services were offline for weeks, severely disrupting business operations worldwide. The pressure to restore services forced Travelex to pay a $2.3 million ransom. Unfortunately, the prolonged downtime and reputational damage ultimately led to the company&#8217;s restructuring and insolvency.<\/p>\n\n\n\n<p><strong>Key Lesson:<\/strong> Ensure backups are updated regularly and tested for reliability. Incomplete or outdated backups provide little protection during a ransomware attack.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">2. Kaseya \u2013 Compromised Backup Systems<\/h1>\n\n\n\n<p>In July 2021, Kaseya, an IT management software provider, was targeted in a sophisticated ransomware attack that <a rel=\"noreferrer noopener\" href=\"https:\/\/purplesec.us\/breach-report\/kaseya-ransomware-attack-explained\/\" target=\"_blank\">spread through its VSA software<\/a>. Attackers exploited a vulnerability, deploying ransomware to thousands of endpoints managed by MSPs. While some businesses had backups, the attackers specifically targeted these systems, leaving victims without functional recovery points. As a result, some affected organizations were forced to pay the ransom to regain control of their data.<\/p>\n\n\n\n<p><strong>Key Lesson:<\/strong> Backups must be air-gapped or stored in isolated environments to prevent attackers from compromising them during an attack.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">3. Colonial Pipeline \u2013 Slow Decryption Tool and Operational Pressure<\/h1>\n\n\n\n<p>In May 2021, Colonial Pipeline, a major U.S. fuel supplier, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you-need-to-know\" target=\"_blank\">suffered a ransomware attack<\/a> that halted fuel distribution across the East Coast. Although the company had backup systems, the urgency to restore operations led Colonial Pipeline to pay a $4.4 million ransom. The decryption tool provided by the attackers proved inefficient, forcing the company to rely heavily on its own backup systems to resume services. This incident demonstrates that even with backups, pressure to minimize downtime can drive companies to pay ransoms.<\/p>\n\n\n\n<p><strong>Key Lesson:<\/strong> Test your backup restoration speed and have a clear incident response plan to ensure your company\u2019s target RTO can be achieved.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Key Takeaways for Effective Backup Protection<\/h1>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Air-Gap Your Backups:<\/strong> Store critical backup data <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/the-3-2-1-1-0-backup-rule-your-ultimate-data-protection-strategy#:~:text=What%20is%20an%20Air%2DGapped%20Backup%3F\" target=\"_blank\">offline or in an isolated environment<\/a> to prevent attackers from accessing it.<\/li><li><strong>Test Backup Integrity Regularly:<\/strong> <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/non-negotiable-why-your-business-needs-an-automated-backup-test-plan\" target=\"_blank\">Routine testing<\/a> ensures your data is recoverable and complete.<\/li><li><strong>Implement Multi-Layered Security:<\/strong> Backup solutions with ransomware protection, like <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/bulletproof-your-backups-the-new-age-of-ransomware-protection\" target=\"_blank\">CryptoSafeGuard<\/a>, can prevent backup tampering.<\/li><li><strong>Apply Industry Best Practices:<\/strong> Reinforce your <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/building-a-comprehensive-data-backup-strategy-key-aims-and-best-practices\" target=\"_blank\">backup strategy<\/a> with recommended best practices to significantly reduce the risk of ransomware backup failures.<\/li><\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>These high-profile ransomware incidents highlight the critical need for robust, well-tested backup systems to ensure recovery in the event of an attack. A solid backup strategy, coupled with modern protection methods like air-gapping and multi-layered security, is essential for minimizing the risk of ransom payments.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/\" target=\"_blank\">BackupAssist<\/a> makes it easy to manage your backups and stay cyber-resilient with automated testing, reliable recovery, and built-in ransomware defenses. Don\u2019t wait until it\u2019s too late &#8211; download BackupAssist today for a <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/classic\/downloads\" target=\"_blank\">30-day free trial<\/a> and safeguard your data from future attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover 3 high-profile ransomware backup failures where companies had to pay the ransom despite having backup systems in place. Learn key lessons to protect your data.<\/p>\n","protected":false},"author":22,"featured_media":19899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[771,757],"tags":[],"class_list":["post-19898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-classic","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments<\/title>\n<meta name=\"description\" content=\"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments\" \/>\n<meta property=\"og:description\" content=\"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T22:08:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T07:45:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments\",\"datePublished\":\"2025-03-25T22:08:34+00:00\",\"dateModified\":\"2026-04-03T07:45:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg\",\"articleSection\":[\"BackupAssist Classic\",\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\",\"url\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\",\"name\":\"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg\",\"datePublished\":\"2025-03-25T22:08:34+00:00\",\"dateModified\":\"2026-04-03T07:45:04+00:00\",\"description\":\"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg\",\"width\":1000,\"height\":563},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments","description":"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","og_locale":"en_US","og_type":"article","og_title":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments","og_description":"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.","og_url":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","og_site_name":"Cyber Resilience Blog","article_published_time":"2025-03-25T22:08:34+00:00","article_modified_time":"2026-04-03T07:45:04+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments","datePublished":"2025-03-25T22:08:34+00:00","dateModified":"2026-04-03T07:45:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments"},"wordCount":541,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg","articleSection":["BackupAssist Classic","Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","url":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments","name":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg","datePublished":"2025-03-25T22:08:34+00:00","dateModified":"2026-04-03T07:45:04+00:00","description":"Discover 3 high-profile ransomware cases where backups failed and ransoms were paid. Learn key lessons to better protect your data.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/03\/shutterstock_1984609274.jpg","width":1000,"height":563},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/when-backups-fail-3-ransomware-attacks-that-still-led-to-ransom-payments#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"When Backups Fail: 3 Ransomware Attacks That Still Led to Ransom Payments"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=19898"}],"version-history":[{"count":1,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19898\/revisions"}],"predecessor-version":[{"id":19900,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19898\/revisions\/19900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19899"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=19898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=19898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=19898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}