{"id":5723,"date":"2021-06-21T10:00:00","date_gmt":"2021-06-21T07:00:00","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=5723"},"modified":"2021-06-21T10:44:40","modified_gmt":"2021-06-21T07:44:40","slug":"5-essential-things-to-do-before-ransomware-strikes","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/","title":{"rendered":"5 essential things to do before ransomware strikes"},"content":{"rendered":"\n<p>While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators,&nbsp;<a href=\"https:\/\/www.reuters.com\/technology\/jbs-paid-11-mln-response-ransomware-attack-2021-06-09\/\" target=\"_blank\" rel=\"noreferrer noopener\">successful attacks<\/a>&nbsp;are still&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-hits-us-nuclear-weapons-contractor\/\" target=\"_blank\" rel=\"noreferrer noopener\">making the headlines<\/a>. It\u2019s not just large operators in the cross-hairs \u2013 ransomware gangs also go after municipalities and smaller businesses that may not have the wherewithal to defend against the attacks.<\/p>\n\n\n\n<p>If your business is hit, or you want to be ready just in case, here are five things you can do now to weather the potential storm:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Have backups<\/h2>\n\n\n\n<p>Many companies hit by ransomware find that their backups are in poor shape, or missing key data. This was highlighted in the Colonial Pipeline attack, where they paid early in the attack fearing delays restoring data from backup. The irony was that after paying they found the decryption tool was so slow they restored from backups anyway, so it\u2019s still unclear to what extent they really needed the decryptor.<\/p>\n\n\n\n<p>In the heat of the moment though, you need to have high confidence in the solidity of your backups. If you do not have a backup strategy in place, our&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2011\/08\/25\/backup-basics\/\">Backup Basics<\/a>&nbsp;article can help to serve as a starting point for your home or business, as can our overview of the various&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/05\/10\/types-backup-mistakes-avoid\/\" target=\"_blank\" rel=\"noreferrer noopener\">types of backup and five mistakes to avoid while backing up your data<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Know how to restore your backups<\/h2>\n\n\n\n<p>For years I have had backups on various compute platforms, but it\u2019s only after hardware failure and starting to restore files I have faith it will actually work. When it\u2019s crash-cart time in the middle of an incident, it\u2019s too late to find out all the fiddly missing bits slowing your backup restoration down.<\/p>\n\n\n\n<p>I also try to have multiple copies with differing technologies. This way, if one of your technologies&nbsp;<a href=\"https:\/\/www.computerweekly.com\/news\/252501665\/Exagrid-pays-26m-to-Conti-ransomware-attackers\" target=\"_blank\" rel=\"noreferrer noopener\">has issues<\/a>&nbsp;in the future, you\u2019re not stuck. Surprisingly, this has been one of the most effective time savers if I delete or overwrite files accidentally, but it also&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2021\/03\/31\/are-you-prepared-prevent-data-loss\/\">helps in disaster recovery<\/a>. Hard drives are far cheaper than your critical data, so don\u2019t be afraid to buy more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Make sure your cloud backups work<\/h2>\n\n\n\n<p>While it\u2019s&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2017\/09\/22\/cloud-services-what-to-consider\/\" target=\"_blank\" rel=\"noreferrer noopener\">convenient to back up to the cloud<\/a>, it can also be painfully slow to restore, especially large volumes. If you\u2019re missing a contact list \u2013 fine. But if you have to restore drive images across your enterprise you may find it terribly slow.<\/p>\n\n\n\n<p>Also,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2017\/09\/29\/cloud-security-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud providers themselves have security issues<\/a>&nbsp;and can get hit, potentially exposing your backups to scammers, so make sure they\u2019re locked down. For super-sensitive data, some organizations never touch the cloud, just to protect the crown jewels against attacks. For this level of security, often the backup media isn\u2019t connected to any network&nbsp;\u2014 it\u2019s separated by an air gap and physically securely stored.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Be recovery ready<\/h2>\n\n\n\n<p>It can be daunting to try an organization-wide disaster recovery drill (though if you have \u2013 congratulations!). However, picking a specific random part of the org chart and staging a disaster recovery drill can be more doable. When you do, you are almost guaranteed to find things you should change. These are great finds when you\u2019re not in the middle of an attack, so the pressure is off.<\/p>\n\n\n\n<p>Also, these provide great news to the C-suite when they understand you\u2019re learning through practice so you\u2019re more prepared. Until a backup is restored, you have no idea whether it was successful or not. You can avoid these Schr\u00f6dinger\u2019s backups by periodically testing them with a restore, ideally to a different computer so you can verify your company\u2019s valuable data is there. Remember that the best time to test a backup is&nbsp;<em>before<\/em>&nbsp;you need it due to an emergency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Have a game plan<\/h2>\n\n\n\n<p>In our next part in this series, my colleague&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/author\/tanscombe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tony Anscombe<\/a>&nbsp;will survey the legalities if you pay, but meanwhile, you should have a playbook for what to do. For example, will you hire a negotiator, or do you have the team trained to deal with vetting the attackers\u2019 claims? Decisions like this are hard to make well in the haste of an active attack, so a little preparation will go a long way.<\/p>\n\n\n\n<p>Back to the question of paying. How does that all work? Tony will do a deep dive. But if you don\u2019t have to pay, everyone will be much happier, and that\u2019s something you can work on with your team today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators,&nbsp;successful attacks&nbsp;are still&nbsp;making the headlines. It\u2019s not just large operators in the cross-hairs \u2013 ransomware gangs also go after municipalities and smaller businesses that may not have the wherewithal to defend against the attacks. If your business is hit,<\/p>\n","protected":false},"author":5,"featured_media":5724,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148],"tags":[],"class_list":["post-5723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 essential things to do before ransomware strikes - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 essential things to do before ransomware strikes\" \/>\n<meta property=\"og:description\" content=\"While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators,&nbsp;successful attacks&nbsp;are still&nbsp;making the headlines. It\u2019s not just large operators in the cross-hairs \u2013 ransomware gangs also go after municipalities and smaller businesses that may not have the wherewithal to defend against the attacks. If your business is hit,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-21T07:44:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1253\" \/>\n\t<meta property=\"og:image:height\" content=\"656\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"5 essential things to do before ransomware strikes\",\"datePublished\":\"2021-06-21T07:00:00+00:00\",\"dateModified\":\"2021-06-21T07:44:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/\"},\"wordCount\":768,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prepping-for-ransomware_Landscape-No-Logo.png\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/\",\"name\":\"5 essential things to do before ransomware strikes - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prepping-for-ransomware_Landscape-No-Logo.png\",\"datePublished\":\"2021-06-21T07:00:00+00:00\",\"dateModified\":\"2021-06-21T07:44:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prepping-for-ransomware_Landscape-No-Logo.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Prepping-for-ransomware_Landscape-No-Logo.png\",\"width\":1253,\"height\":656},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 essential things to do before ransomware strikes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2021\\\/06\\\/21\\\/5-essential-things-to-do-before-ransomware-strikes\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 essential things to do before ransomware strikes - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/","og_locale":"en_US","og_type":"article","og_title":"5 essential things to do before ransomware strikes","og_description":"While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators,&nbsp;successful attacks&nbsp;are still&nbsp;making the headlines. It\u2019s not just large operators in the cross-hairs \u2013 ransomware gangs also go after municipalities and smaller businesses that may not have the wherewithal to defend against the attacks. If your business is hit,","og_url":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2021-06-21T07:00:00+00:00","article_modified_time":"2021-06-21T07:44:40+00:00","og_image":[{"width":1253,"height":656,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"5 essential things to do before ransomware strikes","datePublished":"2021-06-21T07:00:00+00:00","dateModified":"2021-06-21T07:44:40+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/"},"wordCount":768,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png","articleSection":["cybersecurity"],"inLanguage":"en-US","copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/","url":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/","name":"5 essential things to do before ransomware strikes - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png","datePublished":"2021-06-21T07:00:00+00:00","dateModified":"2021-06-21T07:44:40+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2021\/06\/Prepping-for-ransomware_Landscape-No-Logo.png","width":1253,"height":656},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"5 essential things to do before ransomware strikes"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2021\/06\/21\/5-essential-things-to-do-before-ransomware-strikes\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=5723"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/5724"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=5723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=5723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=5723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}