{"id":2044,"date":"2013-06-19T02:00:36","date_gmt":"2013-06-19T02:00:36","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2044"},"modified":"2019-11-13T03:03:21","modified_gmt":"2019-11-13T03:03:21","slug":"how-backup-companies-backup","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup","title":{"rendered":"How we backup at BackupAssist"},"content":{"rendered":"<p><a href=\"http:\/\/www.backupassist.com\/blog\/news\/how-backup-companies-backup\/attachment\/blog-image-design-template\/\" rel=\"attachment wp-att-2047\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2047\" title=\"Blog-image-design-template\" alt=\"\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template-300x117.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>As a backup business, one thing we often get asked is how we backup our own business. Well today, ladies and gentlemen, all will be revealed.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_2048\" aria-describedby=\"caption-attachment-2048\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.backupassist.com\/blog\/news\/how-backup-companies-backup\/attachment\/2013-06-14-10-32\/\" rel=\"attachment wp-att-2048\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2048\" title=\"2013-06-14-10.32\" alt=\"\" src=\"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2013\/06\/2013-06-14-10.32-700x394.png\" width=\"700\" height=\"394\"><\/a><figcaption id=\"caption-attachment-2048\" class=\"wp-caption-text\">&#8220;Rachmaninov&#8221; &#8211; the servers where we compose BackupAssist<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>To start, I think a little about our set up is required. Our head office has around 20 workstations scattered around as well as our data center with two Hyper-V servers, central storage server and all the weird and wonderful servers and machines we use for testing. Our Quality Assurance department even keeps a few machines in their little corner, just to keep things interesting.<\/p>\n<p>All of the production servers in the office are virtual machines run from our two <a href=\"http:\/\/www.backupassist.com\/education\/whitepapers\/hyper-v_system_protection_whitepaper.html\">Hyper-V Servers<\/a>. Each VM within them punches out a File Protection backup with the critical data sent to our central server either hourly or nightly. Each of the VM workstations is also backed up nightly using System Protection to via iSCSI to an&nbsp;<a href=\"http:\/\/www.backupassist.com\/education\/resources\/using_iSCSI_with_BackupAssist.html\">iSCSI target<\/a> on our central storage server. To top it all off, we have a System Protection backup which runs every night via iSCSI to a target.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_2052\" aria-describedby=\"caption-attachment-2052\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.backupassist.com\/blog\/news\/how-backup-companies-backup\/attachment\/2013-06-14-10-30-09\/\" rel=\"attachment wp-att-2052\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2052\" title=\"2013-06-14 10.30.09\" alt=\"\" src=\"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2013\/06\/2013-06-14-10.30.09-700x394.jpg\" width=\"700\" height=\"394\"><\/a><figcaption id=\"caption-attachment-2052\" class=\"wp-caption-text\">The two Hyper-V production servers that power the everyday life of BackupAssist<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Within the Hyper-V servers, our virtual <a href=\"http:\/\/www.backupassist.com\/education\/whitepapers\/SQL_whitepaper.html\">SQL Server<\/a> performs transactional backups, also known as \u201cnear continuous\u201d backups to the central server. We don\u2019t need a full or imaging backup on this one because, as a VM, our SQL server is protected within the System Protection backup of our Hyper-V servers.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_2059\" aria-describedby=\"caption-attachment-2059\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.backupassist.com\/blog\/news\/how-backup-companies-backup\/attachment\/2013-06-14-10-33-19\/\" rel=\"attachment wp-att-2059\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2059\" title=\"2013-06-14 10.33.19\" alt=\"\" src=\"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2013\/06\/2013-06-14-10.33.19-700x394.jpg\" width=\"700\" height=\"394\"><\/a><figcaption id=\"caption-attachment-2059\" class=\"wp-caption-text\">One of the hard drives that we use for offsite backup<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Like SQL, our <a href=\"http:\/\/www.backupassist.com\/education\/whitepapers\/exchange_server_whitepaper.html\">Exchange Server<\/a> has been virtualized and doesn\u2019t need the imaging backup. Of course, we also run an Exchange Mailbox Protection backup which is stored in duplicate \u2013 one in a local directory and another on our central storage server.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_2057\" aria-describedby=\"caption-attachment-2057\" style=\"width: 690px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.backupassist.com\/blog\/news\/how-backup-companies-backup\/attachment\/2013-06-14-10-36-13\/\" rel=\"attachment wp-att-2057\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2057\" title=\"2013-06-14 10.36.13\" alt=\"\" src=\"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2013\/06\/2013-06-14-10.36.13-700x289.jpg\" width=\"700\" height=\"289\"><\/a><figcaption id=\"caption-attachment-2057\" class=\"wp-caption-text\">Our rather ominous central server, where all of our work is replicated before being shuttled offsite<\/figcaption><\/figure>\n<p>Our final backup layer is a File Protection backup of the central server which is scheduled during the day on weekdays. This copies the iSCSI targets off the storage server (central server) onto an external drive that is taken off-site at the end of the day.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a backup business, one thing we often get asked is how we backup our own business. Well today, ladies and gentlemen, all will be revealed.<\/p>\n","protected":false},"author":13,"featured_media":2047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,760],"tags":[93,19,77,151,152,153],"class_list":["post-2044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-legacy","tag-backup","tag-backupassist","tag-hyper-v","tag-rack","tag-servers","tag-sql"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How we back up | BackupAssist<\/title>\n<meta name=\"description\" content=\"Learn how Cortex I.T. Labs back up their network with BackupAssist\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How we back up | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"Learn how Cortex I.T. Labs back up their network with BackupAssist\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-19T02:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-13T03:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"How we backup at BackupAssist\",\"datePublished\":\"2013-06-19T02:00:36+00:00\",\"dateModified\":\"2019-11-13T03:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\"},\"wordCount\":403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\",\"keywords\":[\"Backup\",\"BackupAssist\",\"Hyper-V\",\"rack\",\"servers\",\"SQL\"],\"articleSection\":[\"News\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\",\"url\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\",\"name\":\"How we back up | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\",\"datePublished\":\"2013-06-19T02:00:36+00:00\",\"dateModified\":\"2019-11-13T03:03:21+00:00\",\"description\":\"Learn how Cortex I.T. Labs back up their network with BackupAssist\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png\",\"width\":640,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How we backup at BackupAssist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How we back up | BackupAssist","description":"Learn how Cortex I.T. Labs back up their network with BackupAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup","og_locale":"en_US","og_type":"article","og_title":"How we back up | BackupAssist","og_description":"Learn how Cortex I.T. Labs back up their network with BackupAssist","og_url":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup","og_site_name":"Cyber Resilience Blog","article_published_time":"2013-06-19T02:00:36+00:00","article_modified_time":"2019-11-13T03:03:21+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"How we backup at BackupAssist","datePublished":"2013-06-19T02:00:36+00:00","dateModified":"2019-11-13T03:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup"},"wordCount":403,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png","keywords":["Backup","BackupAssist","Hyper-V","rack","servers","SQL"],"articleSection":["News","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup","url":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup","name":"How we back up | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png","datePublished":"2013-06-19T02:00:36+00:00","dateModified":"2019-11-13T03:03:21+00:00","description":"Learn how Cortex I.T. Labs back up their network with BackupAssist","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template.png","width":640,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/how-backup-companies-backup#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How we backup at BackupAssist"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2044"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2044\/revisions"}],"predecessor-version":[{"id":13713,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2044\/revisions\/13713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2047"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}