{"id":2901,"date":"2014-04-03T13:23:14","date_gmt":"2014-04-03T13:23:14","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2901"},"modified":"2026-04-03T13:17:24","modified_gmt":"2026-04-03T13:17:24","slug":"encryption-part-2-backupassist-encryption","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption","title":{"rendered":"Encryption Part 2 \u2013 BackupAssist encryption"},"content":{"rendered":"<p>Our previous article explained the importance of using encryption to protect your backups from unauthorized access. Now let\u2019s look at how you can encrypt your backups using BackupAssist.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2903\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\" alt=\"part 2 banner\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner-300x117.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><span style=\"line-height: 1.5em;\">&nbsp;<\/span><\/p>\n<p><!--more--><\/p>\n<p>Backups contain confidential information that you want to keep secure. This is especially important for backups on removable media that are rotated or stored off-site. Encryption makes the information on these backups inaccessible if the backups are lost or stolen.<\/p>\n<h2>Backup Encryption methods<\/h2>\n<p>There are different methods of backup encryption.<\/p>\n<p><strong>Backing up to a self-encrypting hard drive<\/strong><\/p>\n<p>This method uses specialized hardware that can provide high performance encryption with good speed and security. However, specialized hardware needs to be purchased for this solution.<\/p>\n<p><strong>Backing data up to an encrypted drive<\/strong><\/p>\n<p>This method uses encryption software to encrypt the backup destination drive. This adds an additional step to the backup process because the encryption is managed separately. This is the solution used by Microsoft BitLocker. To learn about BackupAssist&#8217;s implementation of BitLocker for File Protection, File Archiving and System Protection, see <a href=\"https:\/\/www.backupassist.com\/blog\/support\/encryption-part-3-bitlocker-and-backupassist\/\">Part 3<\/a>.<\/p>\n<p><strong>Encrypting the backup destination as the data is backed up.<\/strong><\/p>\n<p>This is a solution implemented by BackupAssist for File Protection backups to an rsync destination, and File Archiving backups that use the AES encryption option. All you need to do is tick an encryption box and provide a password. BackupAssist does these rest.&nbsp;If you have not used encryption with BackupAssist before, the required software updates will be downloaded and installed when you create your backup and select encryption.<\/p>\n<p>BackupAssist supports BitLocker encryption for all 3 backup types :File Archiving, File Protection and System Protection, and is explained in detail in <a href=\"https:\/\/www.backupassist.com\/blog\/support\/encryption-part-3-bitlocker-and-backupassist\/\">Part 3<\/a>&nbsp;of this series of articles. The following section looks at two specific encryption options that BackupAssist also support for rsync and archiving backups.<\/p>\n<h2>File Protection backups to rsync destinations<\/h2>\n<p>When you create a File Protection backup and select Rsync or S3Rsync as the destination, the <strong>Enable Rsync file based encryption<\/strong> option will become available. If you make this selection, the <strong>Set up destination <\/strong>step&nbsp;will ask you to supply a password for your encrypted backup destination.<\/p>\n<h2>File Archiving backup encryption<\/h2>\n<p>When you create a File Archiving backup, the <strong>destination <\/strong>selection screen will give you the option to <strong>Enable ZIP encryption<\/strong>. The <strong>set up destination<\/strong> screen will then ask you to supply a password for your encrypted backup.<\/p>\n<p>File Archiving&#8217;s ZIP encryption option uses 256-bit AES encryption. AES (Advanced Encryption Standard) is an encryption standard that is designed to provide a good balance between speed and security.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2905 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-2.png\" alt=\"encrypt 2\" width=\"750\" height=\"431\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-2.png 750w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-2-300x172.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<h2>Restoring encrypted backups<\/h2>\n<p>Restoring data from an encrypted backup is even easier than making an encrypted backup. You just treat the backup as normal and follow the standard restore process.<\/p>\n<p>When you get to the final restore screen, you will be prompted to enter the password that you provided when the encrypted backup was created.<\/p>\n<p>Enter your password and select Retry \u2013 that\u2019s all you need to do!<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2906 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-3.png\" alt=\"encrypt 3\" width=\"758\" height=\"485\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-3.png 758w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/encrypt-3-300x192.png 300w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.backupassist.com\/blog\/support\/encryption-part-1-backup-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">In article 1<\/a>, we looked at what encryption is, how it works and how it can protect your backups if they are lost or stolen.<\/p>\n<p>In this article, we looked at how you can use BackupAssist to encrypt your File Protection and File Archiving backups.<\/p>\n<p>In article 3, we will look at how you can use <a href=\"https:\/\/www.backupassist.com\/support\/en\/references\/bitlocker-encryption.htm\" target=\"_blank\" rel=\"noopener noreferrer\">BitLocker<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our previous article explained the importance of using encryption to protect your backups from unauthorized access. Now let\u2019s look at how you can encrypt your backups using BackupAssist. &nbsp;<\/p>\n","protected":false},"author":15,"featured_media":2903,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,3,760],"tags":[233,236,237],"class_list":["post-2901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-support","category-legacy","tag-backup-encryption","tag-backupassist-encryption","tag-data-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BackupAssist encryption<\/title>\n<meta name=\"description\" content=\"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BackupAssist encryption\" \/>\n<meta property=\"og:description\" content=\"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-03T13:23:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T13:17:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gagan Sohal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gagan Sohal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\"},\"author\":{\"name\":\"Gagan Sohal\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e5f223157a6fddb7405b2318ad736926\"},\"headline\":\"Encryption Part 2 \u2013 BackupAssist encryption\",\"datePublished\":\"2014-04-03T13:23:14+00:00\",\"dateModified\":\"2026-04-03T13:17:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\"},\"wordCount\":549,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\",\"keywords\":[\"backup encryption\",\"BackupAssist Encryption\",\"Data protection\"],\"articleSection\":[\"Guides\",\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\",\"url\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\",\"name\":\"BackupAssist encryption\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\",\"datePublished\":\"2014-04-03T13:23:14+00:00\",\"dateModified\":\"2026-04-03T13:17:24+00:00\",\"description\":\"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png\",\"width\":640,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Part 2 \u2013 BackupAssist encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e5f223157a6fddb7405b2318ad736926\",\"name\":\"Gagan Sohal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e0840959783553e4663c719edfc441c4639f8748e2a25d908cbd05da62973be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e0840959783553e4663c719edfc441c4639f8748e2a25d908cbd05da62973be?s=96&d=mm&r=g\",\"caption\":\"Gagan Sohal\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/gagan-sohal\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BackupAssist encryption","description":"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption","og_locale":"en_US","og_type":"article","og_title":"BackupAssist encryption","og_description":"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.","og_url":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption","og_site_name":"Cyber Resilience Blog","article_published_time":"2014-04-03T13:23:14+00:00","article_modified_time":"2026-04-03T13:17:24+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png","type":"image\/png"}],"author":"Gagan Sohal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gagan Sohal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption"},"author":{"name":"Gagan Sohal","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e5f223157a6fddb7405b2318ad736926"},"headline":"Encryption Part 2 \u2013 BackupAssist encryption","datePublished":"2014-04-03T13:23:14+00:00","dateModified":"2026-04-03T13:17:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption"},"wordCount":549,"commentCount":3,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png","keywords":["backup encryption","BackupAssist Encryption","Data protection"],"articleSection":["Guides","Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption","url":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption","name":"BackupAssist encryption","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png","datePublished":"2014-04-03T13:23:14+00:00","dateModified":"2026-04-03T13:17:24+00:00","description":"Our previous article covered why encryption matters. Now learn how to encrypt backups with BackupAssist so your data stays safe if backups are lost or stolen.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/04\/part-2-banner.png","width":640,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/encryption-part-2-backupassist-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Encryption Part 2 \u2013 BackupAssist encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e5f223157a6fddb7405b2318ad736926","name":"Gagan Sohal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6e0840959783553e4663c719edfc441c4639f8748e2a25d908cbd05da62973be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e0840959783553e4663c719edfc441c4639f8748e2a25d908cbd05da62973be?s=96&d=mm&r=g","caption":"Gagan Sohal"},"url":"https:\/\/www.backupassist.com\/blog\/author\/gagan-sohal"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2901"}],"version-history":[{"count":4,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2901\/revisions"}],"predecessor-version":[{"id":20220,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2901\/revisions\/20220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2903"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}