{"id":2172,"date":"2013-06-26T10:59:59","date_gmt":"2013-06-26T10:59:59","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2172"},"modified":"2019-11-19T02:58:03","modified_gmt":"2019-11-19T02:58:03","slug":"the-10-biggest-data-breaches-since-2006","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006","title":{"rendered":"The 10 biggest data breaches in the last 10 years"},"content":{"rendered":"<p><a href=\"http:\/\/www.backupassist.com\/blog\/news\/the-10-biggest-data-breaches-since-2006\/attachment\/data-breaches\/\" rel=\"attachment wp-att-2223\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2223\" title=\"data breaches\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\" alt=\"\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches-300x117.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Protecting your data isn&#8217;t just about backups, you&#8217;ve also got to stop others from gaining access to your data. Over the last few years plenty of big corporations, ones that we know and trust with our most precious of personal information, have unwittingly given that same data out.<\/p>\n<p>Let\u2019s go back a few years and find out some of those who learnt about data protection the hard way.<!--more--><\/p>\n<h2>1. Yahoo<\/h2>\n<p>In 2012, Yahoo saw <a href=\"http:\/\/arstechnica.com\/security\/2012\/07\/yahoo-service-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">400,000 text passwords<\/a> lifted from their VoIP network. The hackers, believed to be a group called D33DS, posted the passwords online to \u2018highlight\u2019 the lack of security on the internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-14531 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/yahoo11-1.jpg\" alt=\"\" width=\"1023\" height=\"542\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/yahoo11-1.jpg 1023w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/yahoo11-1-300x159.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/yahoo11-1-768x407.jpg 768w\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" \/><\/p>\n<h2>2. eHarmony<\/h2>\n<p>True love was not safe in 2012 when 1.5 million <a href=\"http:\/\/www.computerworld.com\/s\/article\/9227857\/Dating_site_eHarmony_confirms_password_breach\" target=\"_blank\" rel=\"noopener noreferrer\">eHarmony passwords were compromised<\/a> by a hacker. Analysts discovered the passwords online and realized they were from the romance site when they found many of the passwords used variations of the word\u2026 eHarmony \u2026 or should that be 3harm0ny.<\/p>\n<h2>3. LinkedIn<\/h2>\n<p>Not wanting this popular social networking site to be left out, the hacker who took 1.5 million passwords from eHarmony proceeded to take 6.5 million passwords from LinkedIn as well. LinkedIn\u2019s loss was a Russian web forum&#8217;s gain when the passwords were posted online \u2026 with the usernames left out. Mashable has a<a href=\"http:\/\/mashable.com\/2012\/06\/08\/linkedin-stolen-passwords-list\/\" target=\"_blank\" rel=\"noopener noreferrer\"> great graphic<\/a> of some of the most common variations from this heist.<\/p>\n<h2>4. Sony PlayStation Network<\/h2>\n<p>In 2011, 77 million Sony PlayStation Network accounts were hacked by what Sony said was an \u2018external intrusion\u2019. Card numbers, passwords and email addresses were compromised and the PlayStation Network was <a href=\"http:\/\/en.wikipedia.org\/wiki\/PlayStation_Network_outage\" target=\"_blank\" rel=\"noopener noreferrer\">taken offline for over a month<\/a>. It was <strong>not just<\/strong> angry gamers who wanted an explanation.\u00a0 Sony had to send a letter to the US House of Representatives, who had sent them a \u2018please explain\u2019.<\/p>\n<h2>5. NASDAQ<\/h2>\n<p>It wasn\u2019t a good day for the company directors when hackers got into <a href=\"http:\/\/www.forbes.com\/sites\/jeffreycarr\/2011\/02\/06\/nasdaqs-hacked-directors-desk-allegedly-violated-ftc-rules\/\" target=\"_blank\" rel=\"noopener noreferrer\">NAZDAQ\u2019s Directors Desk<\/a>, a cloud-based system used for boardroom-level communications between executives and directors. Hackers not only got bragging rights, but access to inside information that could have been used to make \u2018informed\u2019 stock market trades in 2011.<\/p>\n<h2>6. Citigroup<\/h2>\n<p>Data can also be compromised internally, as Citigroup found out in Japan in 2011 when the personal information of <a href=\"http:\/\/www.theregister.co.uk\/2011\/08\/09\/citigroup_data_breach_again\/\" target=\"_blank\" rel=\"noopener noreferrer\">92,000 local customers was sold to a third-party<\/a>. In this case, an employee who worked for an outsourced contractor sold the information. Of course, hackers were not completely absent that year. They had made their presence felt a few months earlier by accessing the account details of 200,000 Citigroup customers in an unrelated incident.<\/p>\n<h2>7. AT&amp;T<\/h2>\n<p>New tech is generally a good thing, but in 2010 AT&amp;T\u2019s online 3G application had a pretty serious downside &#8211; a vulnerability that was found and exploited by hacker group Goatse Security. The hackers tested the security flaw by accessing the<a href=\"http:\/\/arstechnica.com\/apple\/2010\/06\/ipad-3g-user-e-mail-addresses-leaked-by-att-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\"> e-mail addresses of over 100,000 iPad 3G customers<\/a>. These iPad 3G early adopters included: Diane Sawyer, Harvey Weinstein and NY Mayor Michael Bloomberg.<\/p>\n<h2>8. GE Money<\/h2>\n<p>Now we\u2019re back in 2007, so it seems appropriate to note an old-school data \u2018incident\u2019 &#8211; when a magnetic tape with 150,000 social security numbers and in-store credit card information belonging to 650,000 customers went <a href=\"http:\/\/consumerist.com\/2008\/01\/18\/data-tape-on-650k-customers-from-230-retailers-is-missing\/\" target=\"_blank\" rel=\"noopener noreferrer\">missing from a GE Money storage facility<\/a>. There was no sign of anything criminal &#8211; it just went missing. GE spent two months reconstructing the tape, so they could notify those affected.<\/p>\n<h2>9. The Gap<\/h2>\n<p>The loss of data from this clothing retailer was not good news for those who tried to get a job with the company. In 2007, the details o<a href=\"http:\/\/www.infoworld.com\/d\/security-central\/gap-contractor-blamed-data-breach-758\" target=\"_blank\" rel=\"noopener noreferrer\">f 800,000 job applicants were lost<\/a> when two laptops were stolen. Unfortunately, the data included social security numbers and of course, the data was not encrypted.<\/p>\n<h2>10. AOL<\/h2>\n<p>And here we finish at 2006, with a softer landing \u2013 a data breach of the accidental kind. To further its research into search technology, AOL produced a text file containing the keyword searches of 650,000 users, and <a href=\"http:\/\/techcrunch.com\/2006\/08\/06\/aol-proudly-releases-massive-amounts-of-user-search-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">accidentally released it on one of the company\u2019s websites<\/a>. It was left there long enough for those with an interest in \u2018search statistics\u2019, to download the list.<\/p>\n<p><em>While network security and stopping data theft can be complicated and expensive, securing your data from disasters, both human and man-made, is easy if you use BackupAssist. With TrueCrypt 256 bit AES\u00a0encryption, easy to set up and configure automated backups and dedicated support for VSS apps including Exchange and SQL, protecting your data has never been easier.\u00a0<\/em><\/p>\n<p><em>Download your <a href=\"http:\/\/www.backupassist.com\/BackupAssist\/download2.php\">free, fully functional 30 day trial of BackupAssist<\/a> today.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your data isn&#8217;t just about backups, you&#8217;ve also got to stop others from gaining access to your data. Over the last few years plenty of big corporations, ones that we know and trust with our most precious of personal information, have unwittingly given that same data out. Let\u2019s go back a few years and &#8230; <a title=\"The 10 biggest data breaches in the last 10 years\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\">Read more <span class=\"screen-reader-text\">The 10 biggest data breaches in the last 10 years<\/span><\/a><\/p>\n","protected":false},"author":13,"featured_media":2223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,760],"tags":[164,165,33,166,167,168],"class_list":["post-2172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-legacy","tag-data","tag-data-breach","tag-encryption","tag-hack","tag-hackers","tag-storage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Big10 data breaches | BackupAssist<\/title>\n<meta name=\"description\" content=\"A look as 10 of the most memorable data breaches over the last 10 years\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big10 data breaches | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"A look as 10 of the most memorable data breaches over the last 10 years\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-26T10:59:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-19T02:58:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"The 10 biggest data breaches in the last 10 years\",\"datePublished\":\"2013-06-26T10:59:59+00:00\",\"dateModified\":\"2019-11-19T02:58:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\"},\"wordCount\":733,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\",\"keywords\":[\"data\",\"data breach\",\"encryption\",\"hack\",\"hackers\",\"storage\"],\"articleSection\":[\"News\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\",\"url\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\",\"name\":\"Big10 data breaches | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\",\"datePublished\":\"2013-06-26T10:59:59+00:00\",\"dateModified\":\"2019-11-19T02:58:03+00:00\",\"description\":\"A look as 10 of the most memorable data breaches over the last 10 years\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg\",\"width\":640,\"height\":250,\"caption\":\"Image via Flickr: \/\\\\ \\\\\/\\\\\/ \/\\\\\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 10 biggest data breaches in the last 10 years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big10 data breaches | BackupAssist","description":"A look as 10 of the most memorable data breaches over the last 10 years","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006","og_locale":"en_US","og_type":"article","og_title":"Big10 data breaches | BackupAssist","og_description":"A look as 10 of the most memorable data breaches over the last 10 years","og_url":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006","og_site_name":"Cyber Resilience Blog","article_published_time":"2013-06-26T10:59:59+00:00","article_modified_time":"2019-11-19T02:58:03+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg","type":"image\/jpeg"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"The 10 biggest data breaches in the last 10 years","datePublished":"2013-06-26T10:59:59+00:00","dateModified":"2019-11-19T02:58:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006"},"wordCount":733,"commentCount":1,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg","keywords":["data","data breach","encryption","hack","hackers","storage"],"articleSection":["News","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006","url":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006","name":"Big10 data breaches | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg","datePublished":"2013-06-26T10:59:59+00:00","dateModified":"2019-11-19T02:58:03+00:00","description":"A look as 10 of the most memorable data breaches over the last 10 years","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/data-breaches.jpg","width":640,"height":250,"caption":"Image via Flickr: \/\\ \\\/\\\/ \/\\"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/the-10-biggest-data-breaches-since-2006#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"The 10 biggest data breaches in the last 10 years"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2172"}],"version-history":[{"count":6,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2172\/revisions"}],"predecessor-version":[{"id":14536,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2172\/revisions\/14536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2223"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}