{"id":8691,"date":"2017-06-28T09:00:31","date_gmt":"2017-06-27T23:00:31","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=8691"},"modified":"2017-06-28T09:00:31","modified_gmt":"2017-06-27T23:00:31","slug":"backupassist-10-feature-article-insulated-encryption","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption","title":{"rendered":"BackupAssist 10 Feature Article: Insulated Encryption"},"content":{"rendered":"<p>In this BackupAssist 10 feature article, we&#8217;ll be talking about <strong>Insulated Encryption<\/strong>. This is a feature that protects your data sovereignty, even when it&#8217;s in the cloud, and makes sure\u00a0it&#8217;s completely private.<\/p>\n<p><!--more--><\/p>\n<hr \/>\n<h1>BackupAssist 10 Feature Series<\/h1>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/HighRes-Boxshot-Cropped-31.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8369\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/HighRes-Boxshot-Cropped-31.png\" alt=\"HighRes Boxshot Cropped 3\" width=\"420\" height=\"395\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/HighRes-Boxshot-Cropped-31.png 420w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/HighRes-Boxshot-Cropped-31-300x282.png 300w\" sizes=\"auto, (max-width: 420px) 100vw, 420px\" \/><\/a><\/p>\n<ol>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-is-released-download-now\/\">Full Feature List \/ Release Post<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-feature-article-the-cloud-backup-job\/\">The Cloud Backup Job<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-feature-article-data-deduplication\/\">Data Deduplication<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-feature-article-cloud-independence\/\">Cloud Independence<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-feature-article-insulated-encryption\/\">Insulated Encryption<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backupassist-10-feature-article-resilient-transfers\/\">Resilient Transfers<\/a><\/li>\n<\/ol>\n<hr \/>\n<h1>What\u00a0is\u00a0Data Sovereignty?<\/h1>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/gavel_and_keyboard.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8700\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/gavel_and_keyboard.jpg\" alt=\"gavel_and_keyboard\" width=\"601\" height=\"338\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/gavel_and_keyboard.jpg 480w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/gavel_and_keyboard-300x169.jpg 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<p><strong>Data sovereignty<\/strong> is the fact that information that is converted and stored in digital form is subject to the laws of the country in which it is located.<\/p>\n<p>That means\u00a0when you store your data overseas, it&#8217;s subject to international laws that are less stringent (or potentially more) than those at home that safeguard your individual and corporate privacy.<\/p>\n<p>With the boom of the information era, data has become digital gold for many businesses. Meanwhile, many governments are playing a game of legal catch-up with the internet. In short, data sovereignty is something that many businesses may not want you to have, and something you&#8217;ve got to proactively enforce\u2014both for your sake and for your customers.<\/p>\n<p>To ensure your data sovereignty, BackupAssist 10 provides you with <strong>Insulated Encryption<\/strong>, which makes sure governments, cloud providers, and hackers can&#8217;t get at your data &#8211; only you can.<\/p>\n<hr \/>\n<h1>What is Insulated Encyption?<\/h1>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/data-sovereignty.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8699\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/06\/data-sovereignty-700x289.jpg\" alt=\"data-sovereignty\" width=\"586\" height=\"242\" \/><\/a><\/p>\n<p>With BackupAssist 10, you can create military-grade encrypted containers to store your data in. This container stays intact when you send your data to the cloud, meaning your cloud provider can&#8217;t see or modify the contents. This is what we mean by <strong>Insulated Encryption<\/strong> &#8211; your container is completely insulated from any kind of interference.<\/p>\n<p>Each container has an encryption key. Without this, it&#8217;s completely impossible for the cloud provider or a hacker to steal your data. Your container still benefits from being encrypted during transit (to protect from interception) as well as any encryption the cloud provider also uses to protect your data.<\/p>\n<p>If you want to increase your security level further, you can create multiple containers and therefore multiple encryption keys &#8211; one per company, department, or even server.<\/p>\n<p>In short? Insulated Encryption provides you with\u00a0an extremely secure offsite backup ready for rapid retrieval.\u00a0This feature works extremely well with <strong>Cloud Independence<\/strong>, which lets you choose the data center location your backups are being stored at.<\/p>\n<hr \/>\n<h3 style=\"text-align: left;\"><strong><span style=\"color: #04145e;\">New to BackupAssist?<\/span><\/strong><\/h3>\n<h4 style=\"text-align: left;\"><span style=\"color: #000000;\"><a href=\"https:\/\/www.backupassist.com\/BackupAssist\/download2.php\">Download the free 30-day trial<\/a>\u00a0<\/span><span style=\"color: #04145e;\">of BackupAssist 10!<\/span><\/h4>\n<h3 style=\"text-align: left;\"><strong><span style=\"color: #04145e;\">Existing Customer?<\/span><\/strong><\/h3>\n<h4 style=\"text-align: left;\"><span style=\"color: #04145e;\">If you have Upgrade Protection, you can\u00a0<\/span><span style=\"color: #000000;\"><a href=\"https:\/\/www.backupassist.com\/download.php\">download it right now<\/a>.\u00a0<\/span><\/h4>\n<h3 style=\"text-align: left;\"><strong><span style=\"color: #04145e;\">Unsure of your Upgrade Protection Status?<\/span><\/strong><\/h3>\n<h4 style=\"text-align: left;\"><a href=\"https:\/\/www.backupassist.com\/BackupAssist\/customer.php#top\">Check your license<\/a><span style=\"color: #04145e;\">, and if it&#8217;s out of date,\u00a0<\/span><a href=\"https:\/\/www.backupassist.com\/purchase\/renew\/?\">renew it here<\/a>.<\/h4>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this BackupAssist 10 feature article, we&#8217;ll be talking about Insulated Encryption. This is a feature that protects your data sovereignty, even when it&#8217;s in the cloud, and makes sure\u00a0it&#8217;s completely private.<\/p>\n","protected":false},"author":3,"featured_media":9911,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[30,598,588,599],"class_list":["post-8691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","tag-backupassist-10","tag-data-sovereignty","tag-feature-article","tag-insulated-encryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BackupAssist 10 Feature Article: Insulated Encryption<\/title>\n<meta name=\"description\" content=\"In this BackupAssist 10 article, we&#039;ll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BackupAssist 10 Feature Article: Insulated Encryption\" \/>\n<meta property=\"og:description\" content=\"In this BackupAssist 10 article, we&#039;ll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-27T23:00:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"840\" \/>\n\t<meta property=\"og:image:height\" content=\"236\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"BackupAssist 10 Feature Article: Insulated Encryption\",\"datePublished\":\"2017-06-27T23:00:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\"},\"wordCount\":420,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg\",\"keywords\":[\"BackupAssist 10\",\"Data Sovereignty\",\"Feature Article\",\"Insulated Encryption\"],\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\",\"url\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\",\"name\":\"BackupAssist 10 Feature Article: Insulated Encryption\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg\",\"datePublished\":\"2017-06-27T23:00:31+00:00\",\"description\":\"In this BackupAssist 10 article, we'll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg\",\"width\":840,\"height\":236},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BackupAssist 10 Feature Article: Insulated Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BackupAssist 10 Feature Article: Insulated Encryption","description":"In this BackupAssist 10 article, we'll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption","og_locale":"en_US","og_type":"article","og_title":"BackupAssist 10 Feature Article: Insulated Encryption","og_description":"In this BackupAssist 10 article, we'll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.","og_url":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption","og_site_name":"Cyber Resilience Blog","article_published_time":"2017-06-27T23:00:31+00:00","og_image":[{"width":840,"height":236,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg","type":"image\/jpeg"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"BackupAssist 10 Feature Article: Insulated Encryption","datePublished":"2017-06-27T23:00:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption"},"wordCount":420,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg","keywords":["BackupAssist 10","Data Sovereignty","Feature Article","Insulated Encryption"],"articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption","url":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption","name":"BackupAssist 10 Feature Article: Insulated Encryption","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg","datePublished":"2017-06-27T23:00:31+00:00","description":"In this BackupAssist 10 article, we'll be talking about the importance of data sovereignty, and how our Insulated Encryption feature helps you achieve it.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2017\/11\/home_004.jpg","width":840,"height":236},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/backupassist-10-feature-article-insulated-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"BackupAssist 10 Feature Article: Insulated Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/8691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=8691"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/8691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/9911"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=8691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=8691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=8691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}