{"id":19980,"date":"2025-07-22T23:25:24","date_gmt":"2025-07-22T23:25:24","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=19980"},"modified":"2025-11-06T04:48:54","modified_gmt":"2025-11-06T04:48:54","slug":"how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","title":{"rendered":"How to Build a Business Continuity and Disaster Recovery Strategy That Supports Cyber-Resilience"},"content":{"rendered":"\n<p>In today\u2019s digital workplace, data loss can strike at any moment. Whether caused by ransomware, human error, hardware failure or natural disaster, the impact of losing access to your systems and files can be severe. And yet, a recent survey revealed that only <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/9brgj5n44hqvgsp5f5bqcps\/sophos-state-of-ransomware-2024-wp.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">16%<\/a> of businesses were able to recover critical applications in 1 day, and nearly 50% of businesses took a week or more to recover \u2013 if at all.<\/p>\n\n\n\n<p>For any business, especially small to medium-sized enterprises, that kind of delay can mean lost revenue, reputational damage and customer dissatisfaction. To protect against this, every organization needs a business continuity and disaster recovery (BCDR) strategy that allows for rapid recovery. The goal should be to restore critical systems in hours, not days.<\/p>\n\n\n\n<p>Here\u2019s how to build a strong, practical business continuity and disaster recovery strategy that supports cyber-resilience and fast recovery.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Know Your RTO and RPO<\/h2>\n\n\n\n<p>Before you put any technical measures in place, it\u2019s important to define two key terms: your <strong>Recovery Time Objective (RTO)<\/strong> and <strong>Recovery Point Objective (RPO)<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>RTO<\/strong> is how quickly you need your systems back online after a disruption.<\/li><li><strong>RPO<\/strong> is how much data loss you can tolerate, measured in time. For example, if your last backup was 12 hours ago, you risk losing 12 hours of data.<\/li><\/ul>\n\n\n\n<p>Clear RTO and RPO targets help guide your backup schedule, your technology choices and your recovery testing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Follow the 3-2-1-1-0 Backup Rule<\/h2>\n\n\n\n<p>A proven framework for backup planning is the <a href=\"https:\/\/www.backupassist.com\/blog\/the-3-2-1-1-0-backup-rule-your-ultimate-data-protection-strategy\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1-1-0 strategy<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Keep <strong>3<\/strong> copies of your data<\/li><li>Store them on <strong>2<\/strong> different types of media<\/li><li>Have at least <strong>1<\/strong> backup stored <strong>offsite<\/strong><\/li><li>Keep <strong>1<\/strong> backup that is <strong>offline, air-gapped or immutable<\/strong><\/li><li>Ensure <strong>0<\/strong> backup errors by testing regularly<\/li><\/ul>\n\n\n\n<p>This strategy builds both resilience and redundancy into your backup environment. If one copy is compromised, you have others to fall back on. If your local environment is hit by ransomware, you still have a remote or immutable copy to recover from.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Use Immutable and Air-Gapped Backups<\/h2>\n\n\n\n<p>Ransomware is one of the biggest threats to modern businesses. If backups are not protected, attackers can encrypt or delete them, making recovery impossible.<\/p>\n\n\n\n<p>That\u2019s why <strong>immutable backups<\/strong> and <strong>air-gapped storage<\/strong> are so important. Immutable backups cannot be altered or deleted during a set retention period. Air-gapped backups are kept separate from your main systems, so they remain untouched if your network is compromised.<\/p>\n\n\n\n<p>BackupAssist\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-cloud-immutability-and-why-is-it-important\" target=\"_blank\">cloud immutability<\/a> feature provides exactly this kind of protection, allowing you to store disk-image backups securely in the cloud, shielded from tampering.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enable Ransomware Protection<\/h2>\n\n\n\n<p>Even the best backup plan is vulnerable without protection from cyber threats. <strong>CryptoSafeGuard<\/strong> is BackupAssist\u2019s built-in ransomware defense tool that detects suspicious activity and prevents infected files from being backed up.<\/p>\n\n\n\n<p>This helps ensure that your backups are clean and recoverable. It acts as a final line of defense, giving you peace of mind that your recovery points haven\u2019t been compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Automate Your Backups and Test Your Restores<\/h2>\n\n\n\n<p>Manual backups are easy to forget. Set up <strong>automated backup schedules<\/strong> so that your data is protected regularly and reliably.<\/p>\n\n\n\n<p>Equally important is the ability to restore from your backups. A backup you can\u2019t restore is no better than no backup at all. Schedule <strong>test restores<\/strong> on a regular basis to make sure everything works. This is part of the \u201czero errors\u201d goal in the 3-2-1-1-0 rule.<\/p>\n\n\n\n<p>BackupAssist includes tools that make both automated backups and test restores simple, even for users who aren\u2019t IT specialists.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Follow Industry Best Practices<\/h2>\n\n\n\n<p>There\u2019s no one-size-fits-all backup plan, but there are <a href=\"https:\/\/www.backupassist.com\/blog\/building-a-comprehensive-data-backup-strategy-key-aims-and-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">best practices<\/a> that apply to all businesses. We\u2019ve developed a series of guides to help you get started with your BCDR planning. These resources walk you through how to <strong>determine your RTOs and RPOs<\/strong>, and how <strong>to design a backup strategy<\/strong> that fits your business needs.<\/p>\n\n\n\n<p>Check out our best practice guides on <a rel=\"noreferrer noopener\" href=\"https:\/\/downloads.backupassist.com\/Document\/Best%20Practice%20Guide%20Determining%20Your%20Backup%20Objectives.pdf\" target=\"_blank\">Determining Your Backup Objectives<\/a> and <a href=\"https:\/\/downloads.backupassist.com\/Document\/Best%20Practice%20Guide%20Designing%20Your%20Backup%20Strategy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Designing Your Backup Strategy<\/a> for practical steps you can take now to define your BCDR plan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>If you haven\u2019t reviewed your recovery processes in a while, now is the time. A well-planned business continuity and disaster recovery strategy can mean the difference between a temporary hiccup and a major business crisis.<\/p>\n\n\n\n<p>By defining your RTO and RPO, implementing the 3-2-1-1-0 backup rule, protecting against ransomware and automating your backup tasks, you\u2019ll be building a foundation for business continuity and cyber-resilience. With BackupAssist\u2019s features like CryptoSafeGuard, immutable backups and test restore tools, recovery becomes something you can count on.<\/p>\n\n\n\n<p>New to BackupAssist? Start your <a href=\"https:\/\/www.backupassist.com\/classic\/downloads\/\" target=\"_blank\" rel=\"noreferrer noopener\">free 30-day trial<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.<\/p>\n","protected":false},"author":22,"featured_media":19981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-19980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Build a Business Continuity and Disaster Recovery Strategy That Works<\/title>\n<meta name=\"description\" content=\"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Build a Business Continuity and Disaster Recovery Strategy That Works\" \/>\n<meta property=\"og:description\" content=\"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-22T23:25:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T04:48:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"590\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"How to Build a Business Continuity and Disaster Recovery Strategy That Supports Cyber-Resilience\",\"datePublished\":\"2025-07-22T23:25:24+00:00\",\"dateModified\":\"2025-11-06T04:48:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\"},\"wordCount\":781,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\",\"url\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\",\"name\":\"Build a Business Continuity and Disaster Recovery Strategy That Works\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg\",\"datePublished\":\"2025-07-22T23:25:24+00:00\",\"dateModified\":\"2025-11-06T04:48:54+00:00\",\"description\":\"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg\",\"width\":1000,\"height\":590},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Build a Business Continuity and Disaster Recovery Strategy That Supports Cyber-Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Build a Business Continuity and Disaster Recovery Strategy That Works","description":"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","og_locale":"en_US","og_type":"article","og_title":"Build a Business Continuity and Disaster Recovery Strategy That Works","og_description":"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.","og_url":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","og_site_name":"Cyber Resilience Blog","article_published_time":"2025-07-22T23:25:24+00:00","article_modified_time":"2025-11-06T04:48:54+00:00","og_image":[{"width":1000,"height":590,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"How to Build a Business Continuity and Disaster Recovery Strategy That Supports Cyber-Resilience","datePublished":"2025-07-22T23:25:24+00:00","dateModified":"2025-11-06T04:48:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience"},"wordCount":781,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","url":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience","name":"Build a Business Continuity and Disaster Recovery Strategy That Works","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg","datePublished":"2025-07-22T23:25:24+00:00","dateModified":"2025-11-06T04:48:54+00:00","description":"Learn how to build a business continuity and disaster recovery strategy that supports rapid recovery, ransomware protection, and cyber-resilience.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2025\/07\/shutterstock_2275774477.jpg","width":1000,"height":590},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/how-to-build-a-business-continuity-and-disaster-recovery-strategy-that-supports-cyber-resilience#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How to Build a Business Continuity and Disaster Recovery Strategy That Supports Cyber-Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=19980"}],"version-history":[{"count":3,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19980\/revisions"}],"predecessor-version":[{"id":20045,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19980\/revisions\/20045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19981"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=19980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=19980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=19980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}