{"id":9140,"date":"2017-01-10T09:38:58","date_gmt":"2017-01-10T09:38:58","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/ransomware-and-beyond-part-2\/"},"modified":"2021-03-04T14:49:32","modified_gmt":"2021-03-04T14:49:32","slug":"ransomware-and-beyond-part-2","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/","title":{"rendered":"Ransomware and Beyond &#8211; Part 2"},"content":{"rendered":"<p>No networked computer system is immune to malware attacks, but some organisations actively prepare to defend themselves. Here, for example, is an illustrative news report that warms the cockles of my Technical-Support-Desk heart.<!--more--><\/p>\n<p>On November 25, 2016, the San Francisco Municipal Transportation Agency (SFMTA) was attacked by ransomware \u2013 to be specific, a variant of <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/bksod-by-ransomware-hddcryptor-uses-commercial-tools-to-encrypt-network-shares-and-lock-hdds\/\">HDDCryptor<\/a>, which encrypts files, rewrites the Master Boot Records for all partitions (locking the user out of his computer), and presents the victim with a cheeky message containing instructions for payment.<\/p>\n<p>According to SFMTA, the malware attack primarily affected ~900 office computers, and had no impact on transit operations or safety. According to an announcement on <a href=\"https:\/\/www.sfmta.com\/about-sfmta\/blog\/update-sfmta-ransomware-attack\">SFMTA\u2019s website<\/a>, the ransom of 100 bitcoins (approximately AUD$103,000) was entirely ignored:<\/p>\n<p><em><strong>The SFMTA has never considered paying the ransom. We have an information technology team in place that can restore our systems, and that is what they are doing.<\/strong><\/em><br \/>\n<em><strong>Existing backup systems allowed us to get most affected computers up and running this morning, and our information technology team anticipates having the remaining computers functional in the next day or two.<\/strong><\/em><\/p>\n<p>To which I (quietly) yell: \u2018<strong>Huzzah!<\/strong>\u2019 It\u2019s great to see the bad guys foiled, and it\u2019s also instructive to see what saved the SFMTA\u2019s posterior: \u2018&#8230;<em>existing backup systems&#8230;<\/em>\u2019 Backups, and especially <em>off-sit<\/em>e or <em>cloud<\/em> backups, are your very best friends when the cybercrooks come to call. (And with the cost of storage at all-time lows, it\u2019s hard to imagine a company these days that doesn\u2019t take backups <em>very<\/em> seriously.)<\/p>\n<p>Let\u2019s assume that your organisation is properly and sensibly backed up, and move on to malware prevention. What can you do to minimise your susceptibility to ransomware attacks?<\/p>\n<p><strong>1) Educate your employees. <\/strong><\/p>\n<p>Using the Internet without behavioural checks is a recipe for disaster. Visiting strange websites, downloading files and torrents, and opening unexpected e-mail attachments (even from clients and people you know) are great ways to open the doors to ransomware. Teach your users the various modes of attack: <em>phishing<\/em>, which casts a wide, untargeted net, <em>spear phishing<\/em>, targeted directly at a company\u2019s users, and <em>whaling<\/em>, which specifically targets C-suite execs.<\/p>\n<p><strong>2) Insist on stronger passwords and change them regularly. <\/strong><\/p>\n<p>Personally, I\u2019m a fan of the four-word and a symbol convention. Forget unusual symbols, leet-speak and capital letters. There\u2019s a good argument to be made that the strongest password is simply four unconnected words. Although it may seem counterintuitive, \u2018Crumpetkissing@parsnipkangaroo\u2019 is easier to remember, and much harder for a crook to crack, than anything you can do to the name of your cat: \u2018Mist3r_T@@dl3z\u2019 with photos as hints of him blasted all over your Facebook profile. As an example 10 characters with a symbol gives 171.3 sextillion (171,269,557,687,901,638,419) combinations to comb through.<\/p>\n<p><strong>3) Automatic patches. <\/strong><\/p>\n<p>All your business\u2019s operating systems (including phones, tablets, laptops) and browsers should be automatically patched with security updates.<\/p>\n<p><strong>4) Software updates. <\/strong><\/p>\n<p>Antivirus and anti-malware software is constantly being updated. Make sure that all your network devices are running the latest versions.<\/p>\n<p><strong>5) Deploy application whitelists. <\/strong><\/p>\n<p>Application whitelisting ensures that only authorised applications can be downloaded or run. According to the <a href=\"http:\/\/www.asd.gov.au\/publications\/protect\/application_whitelisting.htm\">Australian Department of Defense<\/a>, application whitelisting is the most effective strategy for mitigating targeted cyber intrusions.<\/p>\n<p><strong>6) <\/strong><strong>Implement e-mail and web security tools. <\/strong><\/p>\n<p>Security tools allow your system to analyse e-mail attachments, websites and files for malware and block potentially compromised advertisements and websites. (If anyone complains, tell them to stop uploading their holiday pics and get back to work!)<\/p>\n<p><strong>7) Virtual LANs. <\/strong><\/p>\n<p>Segmenting your network using VLANs is not a cure-all, but it can help prevent the spread of malware.<\/p>\n<p><strong>8) Mobile Device Management.<\/strong><\/p>\n<p>MDM technology can be configured to automatically inspect and block mobile devices which do not meet your organisation\u2019s security standards.<\/p>\n<p>And finally&#8230;have I mentioned backups? I know that I have, and yet I\u2019m doing it again, because backups are your very best friends. If you don\u2019t believe me, just ask the good admins at the San Francisco Municipal Transportation Agency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>No networked computer system is immune to malware attacks, but some organisations actively prepare to defend themselves. Here, for example, is an illustrative news report that warms the cockles of my Technical-Support-Desk heart.<\/p>\n","protected":false},"author":155,"featured_media":6780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[21],"tags":[81],"class_list":["post-9140","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-erp-for-manufacturing","tag-maintaining-upgrading-erp"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware and Beyond - Part 2<\/title>\n<meta name=\"description\" content=\"What should you do to minimize the risks of ransomware attacks?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and Beyond - Part 2\" \/>\n<meta property=\"og:description\" content=\"What should you do to minimize the risks of ransomware attacks?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-10T09:38:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Al Brough\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Al Brough\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\"},\"author\":{\"name\":\"Al Brough\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e\"},\"headline\":\"Ransomware and Beyond &#8211; Part 2\",\"datePublished\":\"2017-01-10T09:38:58+00:00\",\"dateModified\":\"2021-03-04T14:49:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\"},\"wordCount\":671,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png\",\"keywords\":[\"Maintaining\/Upgrading ERP\"],\"articleSection\":[\"ERP for Manufacturing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\",\"name\":\"Ransomware and Beyond - Part 2\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png\",\"datePublished\":\"2017-01-10T09:38:58+00:00\",\"dateModified\":\"2021-03-04T14:49:32+00:00\",\"description\":\"What should you do to minimize the risks of ransomware attacks?\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png\",\"width\":900,\"height\":410,\"caption\":\"alistair_ransomware_and_beyond\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and Beyond &#8211; Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e\",\"name\":\"Al Brough\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg\",\"caption\":\"Al Brough\"},\"description\":\"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.\",\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/al\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware and Beyond - Part 2","description":"What should you do to minimize the risks of ransomware attacks?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware and Beyond - Part 2","og_description":"What should you do to minimize the risks of ransomware attacks?","og_url":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/","og_site_name":"SYSPRO Blog","article_published_time":"2017-01-10T09:38:58+00:00","article_modified_time":"2021-03-04T14:49:32+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png","type":"image\/png"}],"author":"Al Brough","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Al Brough","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/"},"author":{"name":"Al Brough","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e"},"headline":"Ransomware and Beyond &#8211; Part 2","datePublished":"2017-01-10T09:38:58+00:00","dateModified":"2021-03-04T14:49:32+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/"},"wordCount":671,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png","keywords":["Maintaining\/Upgrading ERP"],"articleSection":["ERP for Manufacturing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/","url":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/","name":"Ransomware and Beyond - Part 2","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png","datePublished":"2017-01-10T09:38:58+00:00","dateModified":"2021-03-04T14:49:32+00:00","description":"What should you do to minimize the risks of ransomware attacks?","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_ransomware_and_beyond_part_2.png","width":900,"height":410,"caption":"alistair_ransomware_and_beyond"},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/erp-for-manufacturing\/ransomware-and-beyond-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware and Beyond &#8211; Part 2"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/a62d854ff899a3062c3af12d8cc6260e","name":"Al Brough","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/alistair_brough_blog_image-150x150.jpg","caption":"Al Brough"},"description":"Al Brough is an Analyst at SYSPRO Asia. Before entering the world of ERP, Al worked extensively in the sugar and timber manufacturing industry. With an undergraduate degree in Marketing and Human Resource Management, Al uses his broad knowledge base and pragmatic nature to find the perfect solution for every problem. His personal life is perfectly balanced by his lovely wife, an energetic Jack Russell, anything to do with trains and a slow-growing bonsai.","url":"https:\/\/ca.syspro.com\/blog\/author\/al\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["Ransomware and Beyond - Part 2"],"_yoast_wpseo_focuskw_text_input":["Ransomware and Beyond - Part 2"],"_yoast_wpseo_title":["Ransomware and Beyond - Part 2"],"_yoast_wpseo_metadesc":["What should you do to minimize the risks of ransomware attacks?"],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":[""],"_yoast_wpseo_linkdex":["61"],"_yoast_wpseo_metakeywords":[""],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["6780"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9140"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9140\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/6780"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}