{"id":9134,"date":"2016-11-08T08:34:03","date_gmt":"2016-11-08T08:34:03","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/ransomware-and-beyond-part-1\/"},"modified":"2021-03-04T14:49:29","modified_gmt":"2021-03-04T14:49:29","slug":"ransomware-and-beyond-part-1","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/","title":{"rendered":"Ransomware and Beyond &#8211; Part 1"},"content":{"rendered":"<p>The Internet is teeming with cybercriminals armed with increasingly sophisticated malware designed to steal your data \u2013 or extort you for cash. It\u2019s an evolutionary process, an arms race, and a threat to every organization doing business across the Internet. Symantec\u2019s 2016 Internet Security Threat Report contains some appalling statistics. During 2015:<!--more--><\/p>\n<ul>\n<li>Zero-day attacks (exploiting software vulnerabilities) more than doubled.<\/li>\n<li>An estimated half-billion personal records were stolen or lost in data breaches.<\/li>\n<li>Three-quarters of all websites were found to be vulnerable to exploits.<\/li>\n<li>Spear-phishing campaigns targeting employees increased 55 percent.<\/li>\n<li>Ransomware attacks increased 35%, spreading to Mac, Linux, and smartphones.<\/li>\n<\/ul>\n<p>For me, the situation became personal when the tiny, not-for-profit company my wife works for was hit by ransomware. The second time in less than a year they have been targeted by cybercriminals, they\u2019d done nothing wrong. The cryptovirus infiltrated the network from a seemingly reliable e-mail.<\/p>\n<p>In the first quarter of 2016, Kaspersky Labs reports that it prevented 376,602 ransomware attacks on users, an increase of 30 percent compared to Q4, 2015.<\/p>\n<p>Ransomware propagates in a variety of ways, through infected email attachments, downloaded software, or via innocent or official-looking links that lead to infected websites and advertising (\u2018malvertising\u2019). According to some experts, many infections in the corporate setting occur due to \u201cspear phishing\u201d, in which individuals or companies are specifically targeted, often using information found on social media sites. Emails forge marks of authenticity, and appear, at first sight, to come from trusted sources.<\/p>\n<p>Cryptolockers, for example, infected over a quarter-million computers in the last quarter of 2013. It typically arrived as an attachment in an e-mail that purported to be a \u2018Customer Complaint\u2019. Once the attachment was opened, the malware infiltrated the computer or server, scrambled all of the victim\u2019s files with commercial-grade (2048-bit RSA) encryption software, and displayed a ransom demand.<\/p>\n<p>Attacks on mobile devices are currently less common than attacks on PCs, but since consumers increasingly rely on smartphones to access the web, it\u2019s my bet that cyber villains will increasingly target mobile devices. This leads to my next concern. Imagine the potential for profit, and harm, once criminals begin to target the Internet of Things (IoT). The hardware used in smart homes and smart cars, for example, could be held hostage \u2013 suddenly you can\u2019t unlock your door, turn on your ignition, adjust your thermostat, etc. It gets worse \u2013 imagine the threat to people wearing Internet-connected medical devices, such as pacemakers and insulin pumps. Suddenly the threat is not just the loss of your data or money, but the imminent loss of your life.<\/p>\n<p>The recent <a href=\"http:\/\/www.zdnet.com\/article\/mirai-botnet-attack-briefly-knocked-an-entire-country-offline\/\">Mirai attacks<\/a>, which came to light in September of this year, foreshadow a potential plethora of problems to come. Mirai takes advantage of default passwords that create vulnerabilities in countless IoT devices. Once hacked, these devices can be used to form vast botnets, capable of delivering concerted DDoS (Distributed Denial of Service) attacks. Traditionally, DDoS attacks have been used to take down entire websites or networks, by overloading them with spurious traffic. With botnet numbers of IoT proportions, security experts are predicting attacks that could take down entire portions of the Internet, just this week a small African country had their internet taken down. Although to my knowledge the IoT has not been used for ransomware yet &#8230; there\u2019s no reason to think it won\u2019t happen.<\/p>\n<p>As corporations, big and small, how do we protect ourselves against a ruthless, evolving, and implacable enemy? In part two of this blog, I\u2019ll go into detail on ways you can minimize your risk. So as not to leave you hanging, however, I give you three sage words of advice: backup &#8230; backup &#8230; backup. Backup regularly, backup properly and backup securely.<\/p>\n<p>My colleague, Tracey Gates, recently published a blog on this topic called: <a href=\"https:\/\/ca.syspro.com\/blog\/2016\/10\/27\/protecting-your-erp-data\">The Importance of ERP Backups<\/a> \u2013 her opening statement includes the word \u201cpriceless\u201d to describe a situation where a backup can be restored easily and the steps that need to be undertaken to reach this peace of mind.<\/p>\n<p><strong><a href=\"https:\/\/www.syspro.com\/whitepaper\/executive-guide-syspro-security-auditing-assurance-control\/\">Download Whitepaper<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>The Internet is teeming with cybercriminals armed with increasingly sophisticated malware designed to steal your data \u2013 or extort you for cash. It\u2019s an evolutionary process, an arms race, and a threat to every organization doing business across the Internet. Symantec\u2019s 2016 Internet Security Threat Report contains some appalling statistics. During 2015:<\/p>\n","protected":false},"author":155,"featured_media":6763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[81,25],"class_list":["post-9134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applying-and-operating-erp","tag-maintaining-upgrading-erp","tag-technology-or-enterprise-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware and Beyond - Part 1<\/title>\n<meta name=\"description\" content=\"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and Beyond - Part 1\" \/>\n<meta property=\"og:description\" content=\"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-08T08:34:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:49:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Al Brough\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al Brough\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\"},\"author\":{\"name\":\"Al Brough\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e\"},\"headline\":\"Ransomware and Beyond &#8211; Part 1\",\"datePublished\":\"2016-11-08T08:34:03+00:00\",\"dateModified\":\"2021-03-04T14:49:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\"},\"wordCount\":671,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg\",\"keywords\":[\"Maintaining\/Upgrading ERP\",\"Technology (or Enterprise Technology)\"],\"articleSection\":[\"Applying and Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\",\"name\":\"Ransomware and Beyond - Part 1\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg\",\"datePublished\":\"2016-11-08T08:34:03+00:00\",\"dateModified\":\"2021-03-04T14:49:29+00:00\",\"description\":\"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg\",\"width\":900,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and Beyond &#8211; Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e\",\"name\":\"Al Brough\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"caption\":\"Al Brough\"},\"description\":\"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.\",\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/al\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware and Beyond - Part 1","description":"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware and Beyond - Part 1","og_description":"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime","og_url":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/","og_site_name":"SYSPRO Blog","article_published_time":"2016-11-08T08:34:03+00:00","article_modified_time":"2021-03-04T14:49:29+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg","type":"image\/jpeg"}],"author":"Al Brough","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Al Brough","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/"},"author":{"name":"Al Brough","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e"},"headline":"Ransomware and Beyond &#8211; Part 1","datePublished":"2016-11-08T08:34:03+00:00","dateModified":"2021-03-04T14:49:29+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/"},"wordCount":671,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg","keywords":["Maintaining\/Upgrading ERP","Technology (or Enterprise Technology)"],"articleSection":["Applying and Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/","url":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/","name":"Ransomware and Beyond - Part 1","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg","datePublished":"2016-11-08T08:34:03+00:00","dateModified":"2021-03-04T14:49:29+00:00","description":"Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_1.jpg","width":900,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/applying-and-operating-erp\/ransomware-and-beyond-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware and Beyond &#8211; Part 1"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e","name":"Al Brough","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","caption":"Al Brough"},"description":"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.","url":"https:\/\/ca.syspro.com\/blog\/author\/al\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["Ransomware and Beyond - Part 1"],"_yoast_wpseo_focuskw_text_input":["Ransomware and Beyond - Part 1"],"_yoast_wpseo_title":["Ransomware and Beyond - Part 1"],"_yoast_wpseo_metadesc":["Randsomware and beyond- Don\u2019t underestimate the importance of regular, thorough back-ups as a defense against cybercrime"],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":[""],"_yoast_wpseo_linkdex":["75"],"_yoast_wpseo_metakeywords":["ransomware, cybercrime, cybercriminals"],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["6763"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9134"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9134\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/6763"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}