{"id":22076,"date":"2020-10-12T10:35:57","date_gmt":"2020-10-12T14:35:57","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=22076"},"modified":"2022-07-18T20:12:21","modified_gmt":"2022-07-19T00:12:21","slug":"best-ways-to-defend-against-ransomware","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/","title":{"rendered":"The best ways to defend against ransomware? Backups &#038; disaster recovery"},"content":{"rendered":"<p>Ransomware remains a <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-the-internets-biggest-headache-refuses-to-go-away\/\">major threat to businesses<\/a>, especially SMBs. Just a single successful ransomware attack can be devastating.<\/p>\n<p>Managed service providers (MSPs) should be able to offer their clients a <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\" >comprehensive set of tools<\/a> to defend against ransomware. These tools can include <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-endpoint-protection-and-why-do-you-need-it\/\">endpoint protection<\/a>, <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\">multi-factor authentication<\/a>, and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-monitoring-alerts\/\">traffic monitoring<\/a>. But do you know what the most reliable protection against ransomware actually is? A solid <a href=\"https:\/\/www.sherweb.com\/blog\/security\/5-reasons-need-disaster-recovery-plan-small-business-online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">backup and disaster recovery (DR) plan<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Why SMBs (and providers) need a disaster recovery plan<\/h2>\n<p>Unfortunately, many businesses don\u2019t realize how important their data integrity is until it has been compromised. Public, private, and hybrid clouds may be effective platforms for running business IT, but they&#8217;re not immune to ransomware attacks. In fact, security firm Sophos in their <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-the-state-of-ransomware-2020-wp.pdf\">State of Ransomware 2020<\/a> report, found that 59% of all successful ransomware attacks\u00a0were carried out against cloud data.<\/p>\n<p>Implementing a disaster recovery solution for your clients allows you to quickly restore system functionality and data in the event that a ransomware attack is successful. DR tools are of course equally effective at restoring service in the event of a natural disaster, major hardware failure and other crises.<\/p>\n<p>MSPs need to defend against ransomware attacks on their own cloud infrastructure too. As much as we like to think we won\u2019t succumb to <a href=\"https:\/\/www.zdnet.com\/article\/at-least-13-managed-service-providers-were-used-to-push-ransomware-this-year\/\">social engineering attacks<\/a>, we\u2019re not immune either. The elevated permissions MSPs hold over their clients&#8217; tenants can increase the risk of a ransomware attack propagating quickly should their accounts become compromised. We need to react quickly should our own systems be compromised as well!<\/p>\n<p>&nbsp;<\/p>\n<h2>Backing up data is critical<\/h2>\n<p>Despite being a constant and predictable IT security threat for years now, the remediation costs for ransomware attacks remain high. That same Sophos report identified the average cost for a US-based business to remediate a ransomware attack as $732,520. The average remediation cost nearly doubled to $1,448,458 among businesses who were forced to pay the ransom because they lacked proper backups.<\/p>\n<p>Those are just the direct costs! There are also many intangible costs that can arise from a ransomware attack:<\/p>\n<h3>Lost productivity<\/h3>\n<p>Work slows down while data is locked behind ransomware encryption. The longer the attack goes on, the more and more lost revenue a client\u2019s business could see.<\/p>\n<h3>Lost customers<\/h3>\n<p>Customers might see it as a breach of trust (and rightly so!) if their own data in your client\u2019s possession is lost or damaged in a ransomware attack. They will likely want to take their business elsewhere.<\/p>\n<h3>Reputational damage<\/h3>\n<p>Word of a ransomware attack against your client will eventually make its way to their peers, competitors and the media as well. They may even be required to disclose the attack, depending on what regulatory standards they work under. That can harm their reputation and steer future business opportunities towards their competitors.<\/p>\n<p>&nbsp;<\/p>\n<h2>Protect your clients &amp; increase MRR by offering disaster recovery services<\/h2>\n<p>Ransomware attacks, natural disasters and hardware failures can\u2019t be predicted\u2014all you can do is plan for them. MSPs can defend against ransomware attacks and other threats by offering <a href=\"https:\/\/www.sherweb.com\/security\/\">backup and disaster recovery solutions<\/a>.<\/p>\n<p>Not only are DR services your best defense against ransomware attacks, but they also offer an easy way to increase your monthly recurring revenue (MRR). They\u2019re a win-win solution for <a href=\"https:\/\/www.sherweb.com\/partners\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sherweb partners<\/a> and their customers.<\/p>\n<p>Cloud-based Disaster Recovery as a Service (DRaaS) solutions are easy to spin up for clients of any size. Two of the most reliable DRaaS solutions on the market are <a href=\"https:\/\/www.sherweb.com\/security\/veeam\/\" target=\"_blank\" rel=\"noopener noreferrer\">Veeam<\/a> and <a href=\"https:\/\/www.sherweb.com\/security\/acronis\/\">Acronis<\/a>. Sherweb offers both!<\/p>\n<h3>What is Veeam?<\/h3>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/online-backup\/why-msps-need-veeam-disaster-recovery\/\">Veeam Cloud Connect<\/a> is a cloud-based DRaaS solution. It was specifically designed to support the backup, replication, and restoration of cloud-based VMs, but it is very capable of doing the same for physical servers and virtualized resources in your client\u2019s data center.<\/p>\n<p>Veeam is managed through its own Veeam Availability Suite dashboard. It is compatible with all major hypervisors, including vSphere and Hyper-V, and is compatible with all major cloud environments.<\/p>\n<p>Veeam supports hot, warm, and cold restoration options, which you can assign to each individual resource depending on how mission-critical each is to your client\u2019s operations. Veeam can run with or without an agent. Hot replicated servers can be restored in a matter of minutes. Warm and cold backups can be restored to production in less than a day.<\/p>\n<h3>What is Acronis?<\/h3>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/security\/traditional-backup-not-enough-sherweb-with-acronis\/\">Acronis Online Backup<\/a> is a versatile and easy-to-use DR solution. It performs agentless backups of your cloud apps, including <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a> and Google Workspace apps. It is also able to back up both virtual and on-site servers, and endpoint devices. Acronis is compatible with all major cloud platforms.<\/p>\n<p>Acronis allows you to easily back up data to off-site cloud storage. It offers rapid retrieval, even in the case of file deletion. It offers multi-level encryption for backups when you need to meet regulatory standards for data security, or when your client\u2019s just need that added level of protection.<\/p>\n<p>It helps you protect your clients not only with its backup and recovery features but also with comprehensive data integrity and threat analytics.<\/p>\n<p>&nbsp;<\/p>\n<h2>Protect against ransomware while you grow your business<\/h2>\n<p>No threat detection system is fool-proof. That makes backup DR solutions like Veeam and Acronis the best possible ways to defend against ransomware attacks that might compromise your clients&#8217; systems and data. Rather than pay millions in ransoms, your clients just need to wait a few minutes for you to restore their servers to production. Adding another channel of reliable MRR to your MSP business isn\u2019t such a bad thing either!<\/p>\n<h3><a href=\"https:\/\/www.sherweb.com\/partners\/partnership-models\/\" class=\"track-link\"><em>Become a Sherweb Partner<\/em><\/a><em> today to strengthen your security stack, deliver quality service for clients, and above all, help make them safer.<\/em><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware remains a major threat to businesses, especially SMBs. Just a single successful ransom","protected":false},"author":177,"featured_media":22078,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[446,575,919,939],"class_list":["post-22076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-disaster-recovery","tag-veeam-cloud-connect","tag-cybersecurity","tag-acronis-online-backup"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The best ways to defend against ransomware? Backups &amp; disaster recovery | Sherweb<\/title>\n<meta name=\"description\" content=\"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The best ways to defend against ransomware? Backups &amp; disaster recovery | Sherweb\" \/>\n<meta property=\"og:description\" content=\"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T14:35:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-19T00:12:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"The best ways to defend against ransomware? Backups &#038; disaster recovery\",\"datePublished\":\"2020-10-12T14:35:57+00:00\",\"dateModified\":\"2022-07-19T00:12:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/\"},\"wordCount\":959,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Defend-against-ransomware-1200x480@2x.png\",\"keywords\":[\"Disaster Recovery\",\"Veeam Cloud Connect\",\"Cybersecurity\",\"Acronis Online Backup\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/\",\"name\":\"The best ways to defend against ransomware? Backups & disaster recovery | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Defend-against-ransomware-1200x480@2x.png\",\"datePublished\":\"2020-10-12T14:35:57+00:00\",\"dateModified\":\"2022-07-19T00:12:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Defend-against-ransomware-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Defend-against-ransomware-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/best-ways-to-defend-against-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The best ways to defend against ransomware? Backups &#038; disaster recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The best ways to defend against ransomware? Backups & disaster recovery | Sherweb","description":"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"The best ways to defend against ransomware? Backups & disaster recovery | Sherweb","og_description":"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-10-12T14:35:57+00:00","article_modified_time":"2022-07-19T00:12:21+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"The best ways to defend against ransomware? Backups &#038; disaster recovery","datePublished":"2020-10-12T14:35:57+00:00","dateModified":"2022-07-19T00:12:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/"},"wordCount":959,"commentCount":3,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png","keywords":["Disaster Recovery","Veeam Cloud Connect","Cybersecurity","Acronis Online Backup"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/","url":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/","name":"The best ways to defend against ransomware? Backups & disaster recovery | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png","datePublished":"2020-10-12T14:35:57+00:00","dateModified":"2022-07-19T00:12:21+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"There are tons of available tools to defend against ransomware. But the most reliable protection is always a solid backup and disaster recovery (DR) plan.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/Defend-against-ransomware-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The best ways to defend against ransomware? Backups &#038; disaster recovery"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Disaster Recovery","Veeam Cloud Connect","Cybersecurity","Acronis Online Backup"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=22076"}],"version-history":[{"count":3,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22076\/revisions"}],"predecessor-version":[{"id":23760,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22076\/revisions\/23760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/22078"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=22076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=22076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=22076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}