{"id":7030,"date":"2016-11-02T08:32:53","date_gmt":"2016-11-01T21:32:53","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=7030"},"modified":"2016-11-02T08:32:53","modified_gmt":"2016-11-01T21:32:53","slug":"what-is-an-exploit-kit-how-hackers-hunt-your-old-software","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software","title":{"rendered":"What is an Exploit Kit? How Hackers Hunt Your Old Software"},"content":{"rendered":"<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7054\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\" alt=\"Beware of exploit kits!\" width=\"552\" height=\"296\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg 1300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware-300x161.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware-768x412.jpg 768w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware-1024x549.jpg 1024w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/a><\/p>\n<p><strong>You&#8217;re browsing the web on a\u00a0trusted\u00a0website. <\/strong>You click on an regular-looking link.\u00a0Suddenly, the website changes on you. A splash screen appears.\u00a0\u00a0You read it out, a pit forming in your stomach as you see the skull above the text.<\/p>\n<p><em>&#8216;We have encrypted all of your files. The only way to get your files back is to buy our decryption software. You have 94\u00a0hours to pay us, or your files will be permanently\u00a0destroyed.&#8217;<\/em><\/p>\n<p>How did this happen? You were just surfing the net\u2014and you weren&#8217;t even on a suspicious website!\u00a0The answer? You&#8217;ve been hit by an <strong>Exploit Kit<\/strong>.<\/p>\n<p><!--more--><\/p>\n<h2>So, What\u00a0Exactly Is An Exploit Kit?<\/h2>\n<p>An exploit kit is a hacking toolkit that cybercrims use to take advantage of your old, outdated software. Like a big cat on the Savannah, they watch the herds of traffic going by&#8230; then pounce on the weaker members\u00a0that lag behind.<\/p>\n<p>To use less metaphor, it&#8217;s a hacking toolkit that provides several different kinds of trojans, malware, and ransomware, all tailored to &#8216;exploit&#8217; a vulnerability in your existing software. Typically, they target popular products such as Adobe Flash, Java, and Microsoft Silverlight.<\/p>\n<p>When you access a website, the exploit kit analyzes the software installed on the system\/devices used to access it. If any unpatched software is detected, that&#8217;s when they attack.<\/p>\n<h2>How Normal Websites Hide\u00a0Exploit Kits<\/h2>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/exploit-kit-attack-scenario.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7055\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/exploit-kit-attack-scenario.jpg\" alt=\"Print\" width=\"600\" height=\"352\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/exploit-kit-attack-scenario.jpg 600w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/exploit-kit-attack-scenario-300x176.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>To subject an internet user to scanning with an Exploit Kit, they must be tricked into clicking on a link. This is done through spamming them (forcing them to click it to get rid of pop ups) or social engineering lures.<\/p>\n<p>Once the link is clicked, the user traffic is redirected to the exploit kit, which scans the user. Depending on the prey, it delivers an appropriate payload.<\/p>\n<p>Exploit kits are frequently combined with malvertising\u2014malicious advertisements on legitimate webpages. Since these malware ads are on top-tier news, entertainment and political commentary sites, a user&#8217;s guard is down. It preys on the fact many users think bad links only exist on bad websites&#8230; and out-of-date software.<\/p>\n<figure id=\"attachment_7056\" aria-describedby=\"caption-attachment-7056\" style=\"width: 625px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/102213_2109_Battlingwit8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7056 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/102213_2109_Battlingwit8.png\" alt=\"102213_2109_battlingwit8\" width=\"635\" height=\"554\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/102213_2109_Battlingwit8.png 635w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/102213_2109_Battlingwit8-300x262.png 300w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><figcaption id=\"caption-attachment-7056\" class=\"wp-caption-text\"><strong>The Blackhole Kit:<\/strong> <em>In 2012, this kit made up 29% of all web threats. When its Russian creator was jailed, the kit was no longer updated\u2014and new exploit kits took its place.<\/em><\/figcaption><\/figure>\n<h2>Phishing Education and Exploit Kits: Only A Half Fix<\/h2>\n<p>Unpatched software is just like an open door to your house. Sure, you could blame the people on the street who would happily come in and loot the place&#8230; or you could lock your door. They\u00a0can only exploit you because there&#8217;s a vulnerability to exploit in the first place!<\/p>\n<p>Since any link can lead to an exploit kit, that means phishing can take place via e-mail, social media, advertisements, pop-ups, etc. That&#8217;s a lot of bait left out, and all it takes is one click to put your servers in hot water.<\/p>\n<h2>Preemptively Defending Your Data<\/h2>\n<p>Even if you keep your software completely up to date, the tried and true way to protect your data is to double up on it.\u00a0Use a <a href=\"https:\/\/www.backupassist.com\/blog\/news\/3-2-1-rule-of-backups-infographic\/\">3-2-1 backup strategy<\/a> to make sure your data is secure. <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">BackupAssist<\/a> has this sort of scheduling available and several others to protect your data.<\/p>\n<p>And while you&#8217;re at it, ask yourself this:\u00a0is the software you&#8217;re using to read this article completely up to date?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re browsing the web on a\u00a0trusted\u00a0website. You click on an regular-looking link.\u00a0Suddenly, the website changes on you. A splash screen appears.\u00a0\u00a0You read it out, a pit forming in your stomach as you see the skull above the text. &#8216;We have encrypted all of your files. The only way to get your files back is to &#8230; <a title=\"What is an Exploit Kit? How Hackers Hunt Your Old Software\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\">Read more <span class=\"screen-reader-text\">What is an Exploit Kit? How Hackers Hunt Your Old Software<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":7054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[],"class_list":["post-7030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is an Exploit Kit? How Hackers Hunt Your Old Software<\/title>\n<meta name=\"description\" content=\"You&#039;re browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you&#039;ve been hit by an Exploit Kit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Exploit Kit? How Hackers Hunt Your Old Software\" \/>\n<meta property=\"og:description\" content=\"You&#039;re browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you&#039;ve been hit by an Exploit Kit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-01T21:32:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"697\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"What is an Exploit Kit? How Hackers Hunt Your Old Software\",\"datePublished\":\"2016-11-01T21:32:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\"},\"wordCount\":574,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\",\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\",\"url\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\",\"name\":\"What is an Exploit Kit? How Hackers Hunt Your Old Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\",\"datePublished\":\"2016-11-01T21:32:53+00:00\",\"description\":\"You're browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you've been hit by an Exploit Kit.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg\",\"width\":1300,\"height\":697,\"caption\":\"Dealing with Exploit Kits\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an Exploit Kit? How Hackers Hunt Your Old Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an Exploit Kit? How Hackers Hunt Your Old Software","description":"You're browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you've been hit by an Exploit Kit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software","og_locale":"en_US","og_type":"article","og_title":"What is an Exploit Kit? How Hackers Hunt Your Old Software","og_description":"You're browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you've been hit by an Exploit Kit.","og_url":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software","og_site_name":"Cyber Resilience Blog","article_published_time":"2016-11-01T21:32:53+00:00","og_image":[{"width":1300,"height":697,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg","type":"image\/jpeg"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"What is an Exploit Kit? How Hackers Hunt Your Old Software","datePublished":"2016-11-01T21:32:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software"},"wordCount":574,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg","articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software","url":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software","name":"What is an Exploit Kit? How Hackers Hunt Your Old Software","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg","datePublished":"2016-11-01T21:32:53+00:00","description":"You're browsing a trusted website. Suddenly, a ransomware demand pops up. It tells you your files have been encrypted\u2014you've been hit by an Exploit Kit.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/10\/ransomware.jpg","width":1300,"height":697,"caption":"Dealing with Exploit Kits"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/what-is-an-exploit-kit-how-hackers-hunt-your-old-software#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"What is an Exploit Kit? How Hackers Hunt Your Old Software"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/7030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=7030"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/7030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/7054"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=7030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=7030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=7030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}