{"id":16503,"date":"2020-10-26T03:05:14","date_gmt":"2020-10-26T03:05:14","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=16503"},"modified":"2020-10-30T02:27:40","modified_gmt":"2020-10-30T02:27:40","slug":"how-secure-is-my-backup-data-when-stored-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud","title":{"rendered":"How secure is my backup data when stored in the cloud?"},"content":{"rendered":"\n<p>Because&nbsp;data&nbsp;security can be a very confusing topic, I\u2019ll&nbsp;approach this discussion&nbsp;in three pragmatic&nbsp;ways:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>How secure are cloud backups against various forms of attack?<br><\/li><li>How does this level of security compare with other popular forms of on-premise backups \u2013\u00a0swapping\u00a0USB or RDX\u00a0disks, and\u00a0on-premise\u00a0NAS\u00a0backups.\u00a0<br><\/li><li>How\u00a0should\u00a0a typical SMB choose between the different options?\u00a0<\/li><\/ol>\n\n\n\n<p>This article applies to two BackupAssist products \u2013&nbsp;<a href=\"https:\/\/www.sandbox.backupassist.com\/classic\/overview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BackupAssist Classic<\/strong><\/a>&nbsp;with the&nbsp;<strong><a href=\"https:\/\/www.sandbox.backupassist.com\/classic\/cloud-offsite-backup\">Cloud Offsite add-on<\/a><\/strong>, and&nbsp;<a href=\"https:\/\/www.backupassist.com\/er\/overview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BackupAssist ER<\/strong><\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TL;DR&nbsp;summary&nbsp;<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li>BackupAssist provides\u00a0in-built security mechanisms (known as authenticated encryption) that preserve the <strong>privacy<\/strong> and <strong>integrity<\/strong> of cloud backup <strong>data<\/strong>, and cloud providers will provide multi-factor authentication to secure access to the storage <strong>account<\/strong>.\u00a0<a href=\"#security\">Read more about the security of cloud backups.<\/a><br><\/li><li>The authenticated encryption used in BackupAssist addresses requirements laid out by data handling regulations such as <strong>GDPR<\/strong> and <strong>HIPAA<\/strong>.<br><\/li><li>We rate\u00a0cloud offsite backups\u00a0<strong>as secure as\u00a0or better than\u00a0<\/strong>swapping USB or RDX disks in a typical SMB setting. Both systems have pros and cons.\u00a0<a href=\"#compare\">Our comparison between cloud and hard disk backup security.<\/a><br><\/li><li>Choosing\u00a0whether to use the cloud, or swapping hard disks,\u00a0can be a simple decision based on 2 questions\u00a0\u2013 volume of data and reliability of Internet connection.\u00a0<a href=\"#recommendation\">See our recommendations.<\/a><\/li><\/ol>\n\n\n\n<p>We also stress that no security mechanism is infallible&nbsp;\u2013&nbsp;just look at state sponsored&nbsp;or military level&nbsp;hacking attacks against classified government systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Your goal as an SMB is to be secure enough so that you can withstand and be resilient to all risks that you\u2019re likely to face&nbsp;\u2013 including&nbsp;ransomware and hacking.&nbsp;In this article, we talk&nbsp;about security in this practical sense \u2013 not the extreme cases of hundreds of hackers attacking your business over months or years.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security\">How secure is my backup data in the cloud?&nbsp;<\/h2>\n\n\n\n<p>In a practical sense, the benefit of having a cloud backup far outweighs the very slim chance of the data being compromised&nbsp;and misused. There are&nbsp;several&nbsp;layers of security provided by BackupAssist backup products and the cloud provider&nbsp;that make the overall security of cloud backups as good as traditional on-premise backups.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s delve into it.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is data security?&nbsp;<\/h3>\n\n\n\n<p>Security is a broad term that can be debated and&nbsp;analyzed&nbsp;in many ways. For the average SMB, we can define it as:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong>Aspect<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>Technical term&nbsp;<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Is my data going to be there when I need it?&nbsp;<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Availability<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>Will my data be private from everyone else?&nbsp;<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;color:#282561;text-align:center;\">Confidentiality<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Can my data be sabotaged?&nbsp;<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;color:#282561;text-align:center;\">Integrity<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>The BackupAssist backup system comprises two parts \u2013 the backup software, and the cloud storage provider.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security provided by BackupAssist&nbsp;<\/h3>\n\n\n\n<p>BackupAssist uses encryption, integrity checking and cryptographic hashes to protect your backup data.&nbsp;This mitigates against attacks even if your cloud storage account is breached.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong>Mitigated Event<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>Is it secure?<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>As long as\u2026<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Data theft &amp; leakage<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Yes, even if your cloud storage is breached. It is impractical for the cloud provider or an attacker to read your data.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\u2026 you keep your encryption password private.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>Malware injection into backups<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;color:#282561;\">Yes. Impractical for attacker to inject malware into your system images.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;color:#282561;\">\u2026 you keep your encryption password private.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Data tampering<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;color:#282561;\">Yes. Impractical for an attacker to alter data without detection.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;color:#282561;\">\u2026 you keep your encryption password private.<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>If you keep your encryption password private and strong, it will be&nbsp;impractical&nbsp;(i.e. impossible in every&nbsp;practical sense) for a&nbsp;cloud provider or an attacker to breach your data. Even if an attacker had every computer in the world trying to brute force the encryption, it would take thousands or millions of years.&nbsp;<\/p>\n\n\n\n<p>Therefore, it is vitally important to keep your encryption password private; a breached password will make&nbsp;the entire security system ineffective.&nbsp;<\/p>\n\n\n\n<p>Encryption is also a key method of satisfying regulations that govern data handling and security. For example, GDPR Article 32 states that &#8220;Personal data must be secured to a level appropriate to the risk, by technical and organisational measures including pseudonymisation and <strong>encryption<\/strong>&#8230;&#8221;<\/p>\n\n\n\n<p>Similarly, HIPAA regulations call for encryption of protected health information (PHI). The security mechanisms implemented in BackupAssist products enable you to comply with these laws.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security provided by&nbsp;your&nbsp;cloud provider&nbsp;<\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong>Aspect<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>Is it secure?<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>As long as\u2026<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Account hijack<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Yes. Authentication systems have improved dramatically to prevent unauthorized parties accessing your account.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\u2026 you keep your cloud credentials private and use multi-factor authentication, and use a separate account just for backup.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>Accidental loss of data<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;color:#282561;\">Yes. The cloud provider will use redundant hardware and perform backups to achieve its durability SLAs.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;color:#282561;\">\u2026 the cloud provider meets its SLA, and you pay your bills on time so the cloud provider doesn\u2019t delete your account.<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>If possible, for better security of your cloud backup, we recommend that your backup data is stored in a separate storage account to your normal operational accounts. <\/p>\n\n\n\n<p>For example, if you host a website in the AWS cloud, and you wish to store your backup data in\u00a0AWS\u00a0S3, you&#8217;ll get better security by signing up for two separate accounts\u00a0instead of using just one. Your web developers\u00a0or\u00a0devops\u00a0engineers (often outsourced)\u00a0will generally have administrative \u201croot level\u201d access to your AWS account, and can make catastrophic mistakes in configuration. By having two completely separate accounts, any mistakes made by your web developers in your operational account won\u2019t affect the security of your cloud backup, because it&#8217;s in a completely separate account.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"compare\">Cloud backup security compared to traditional on-premise backup security\u00a0<\/h2>\n\n\n\n<p>In&nbsp;our&nbsp;opinion, cloud backups&nbsp;are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>as secure as swapping out hard disks, and&nbsp;&nbsp;<\/li><li>more secure than&nbsp;on-premise&nbsp;NAS backups.&nbsp;<\/li><\/ul>\n\n\n\n<p>How do we reach this conclusion?&nbsp;<\/p>\n\n\n\n<p>In a practical sense, overall security is a matter of&nbsp;<strong>effectiveness<\/strong>, combining how secure a mechanism is, together with how likely it is to be used properly.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s consider the top 3 options that SMBs have when setting up backups of their systems.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Cloud backups \u2013 either with BackupAssist ER (full system) or BackupAssist Classic (files)&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>USB or RDX Hard Drive backups \u2013 swapping out disks based on a rotation schedule, to give&nbsp;calendar based&nbsp;history: daily \/ weekly \/ monthly, etc.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>NAS backups \u2013 where the NAS is usually on the LAN\u00a0and used to store backups via a network share.\u00a0<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong><\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong>Type of backup<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>Strengths<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>Weaknesses<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>Comments<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>=1st<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Cloud offsite backups<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Automatic<\/li>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Offsite storage is geographically unrestricted.<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Susceptible to cyber takeover<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Cyber takeover is unlikely if best practices are followed.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>=1st<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">Swapping hard disks<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Offline backups are immune to cyber takeover<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Susceptible to human error<\/li>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Relies on physical security<\/li>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Hard disks can fail with physical handling<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">Offers the only 100% guarantee against online cyber threats.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>3rd<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">On-premise NAS backups<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">Fully automatic<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">\n          <ul>\n            <li style=\"margin-left:-20px;line-height:16pt;\">No offsite protection<\/li>\n            <li style=\"margin-left:-20px;line-height:16pt;\">More susceptible to cyber takeover<\/li>\n          <\/ul>\n        <\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Can be strengthened by NAS to NAS replication.<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>Let\u2019s&nbsp;break down how each option performs in&nbsp;three major risk&nbsp;scenarios.&nbsp;<\/p>\n\n\n\n<p><strong>Risk of cyber takeover<\/strong>&nbsp;\u2013 a hacker overtakes your network and gains privileged (administrator) access.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud offsite \u2013&nbsp;good protection, as the cloud backup is accessed via a different protocol to your local backups, and&nbsp;therefore not vulnerable to conventional SMB-based attacks.&nbsp;Ransomware won\u2019t be able to attack the cloud backup&nbsp;as it doesn\u2019t speak the \u201csame language\u201d.&nbsp;There is a possibility that the attacker can tamper with the backup software, and&nbsp;we are&nbsp;currently improving our&nbsp;mitigations&nbsp;against this.<br>&nbsp;<\/li><li>Swapping hard disks \u2013 excellent protection, as a hard disk that is offline and disconnected from any computer is the only way to guarantee it cannot be hacked.&nbsp;Note: you should never reconnect a backup hard drive to a machine that may have ransomware on it.<br>&nbsp;<\/li><li>On-premise NAS backups \u2013&nbsp;mediocre to&nbsp;fair&nbsp;protection,&nbsp;depending on the version and security configuration of the network share or NAS device. Older versions of the SMB protocol&nbsp;suffered from&nbsp;eavesdropping&nbsp;attacks on SMB traffic and NTLM authentication, enabling brute force attacks to eventually unlock access to the backups on NAS devices.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>Risk of human error<\/strong>\u00a0\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud offsite \u2013 excellent protection, as human action is not required&nbsp;for the system to work.<br>&nbsp;<\/li><li>Swapping hard disks \u2013&nbsp;mediocre&nbsp;protection, as human errors compromise the backup scheme, meaning recovery points and offsite protection will be less than ideal.&nbsp;This can occur if:&nbsp;<\/li><\/ul>\n\n\n\n<ul style=\"padding-left:50px;list-style-type:circle;\"><li>the&nbsp;disk is not swapped&nbsp;out&nbsp;<\/li><li>the wrong disk is connected&nbsp;<\/li><li>the disk is not taken offsite&nbsp;&nbsp;<\/li><li>the disk is misplaced or lost.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>On-premise NAS backups \u2013 excellent protection, as human action is not required. However, the administrator must configure the security of the NAS well.&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>Risk of destruction of premises<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud offsite \u2013 excellent protection&nbsp;\u2013&nbsp;there is no geographical limit to where you can store your backups, so it\u2019s easy to choose a location in a different city or region.&nbsp;<br><\/li><li>Swapping hard disks \u2013&nbsp;very good&nbsp;protection, as&nbsp;an offsite hard disk will protect against the hard drive being destroyed by fire or natural disaster. However, large scale natural disasters such as earthquakes and tsunamis may also destroy the backup disks, so the protection is not infallible.&nbsp;<br><\/li><li>On-premise NAS backups \u2013 poor protection, as the NAS is likely to be&nbsp;destroyed along with your server.&nbsp;<\/li><\/ul>\n\n\n\n<p>As you can see in this summary table,&nbsp;each storage location has its strengths and weaknesses.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong><\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;text-align:center;\"><strong>Cloud backup<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>USB\/RDX disk backup<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>On-premise NAS backup<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Cyber takeover<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Very good<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Excellent<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Mediocre to fair<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>Human error<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;text-align:center;\">Excellent<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;text-align:center;\">Mediocre<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;text-align:center;\">Excellent<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Physical destruction<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Excellent<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Very good<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;text-align:center;\">Poor<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>From the table, you can draw your own conclusions. Our own view is that cloud backups are as secure as USB\/RDX disk backups, and we perform a combination of both in our data backup strategy.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"recommendation\">How do you choose?&nbsp;<\/h3>\n\n\n\n<p>For the majority of SMBs,&nbsp;the decision doesn\u2019t have to be hard. Here are two questions we recommend considering:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>How much data do you have?&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>What\u2019s more reliable \u2013 your Internet connection, or human process?&nbsp;<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;\">\n    <thead>\n      <tr>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong><\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;background:#008ECE;color:white;\"><strong>I have less than 2TB of data<\/strong><\/th>\n        <th style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;\"><strong>I have more than 2TB of data<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#d1dff1;color:#282561;\"><strong>Internet connection is more reliable<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Cloud offsite backups \u2013 practical and reliable.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#d1dff1;color:#282561;\">Cloud backups are a great supplement to on-premise backups.<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border-collapse:collapse;border:none;background:#a9c7e7;color:#282561;\"><strong>Human process is more reliable<\/strong><\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">Swapping hard disks because it\u2019s more reliable.<\/td>\n        <td style=\"border-collapse:collapse;border:none;border-left:1px solid white;background:#a9c7e7;color:#282561;\">Swapping hard disks is more practical for large volumes of data.<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>When it comes to backups, as long as you can&nbsp;maintain the&nbsp;privacy of the data (which can be achieved with the security mechanisms mentioned above),&nbsp;<strong>the more backups you have, the better.<\/strong>&nbsp;<\/p>\n\n\n\n<p>We believe the choice shouldn\u2019t be between \u201cA\u201d or \u201cB\u201d, but instead, how can I have \u201cA and B\u201d. That\u2019s why:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BackupAssist ER allows you to perform disk-to-disk-to-cloud backups, so you have system backups on-premise and in the cloud.&nbsp;<br><\/li><li>BackupAssist Classic with the Cloud Offsite add-on allows you to have on-premise system backups, and file backups in the cloud.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Further research&nbsp;<\/h2>\n\n\n\n<p>Achieving excellent data security is a moving target, as technologies&nbsp;evolve&nbsp;and cyber threats emerge.&nbsp;<\/p>\n\n\n\n<p>We\u2019re continually researching and working on enhancements to data security.&nbsp;Stay tuned for news about this topic!&nbsp;&nbsp;<\/p>\n\n\n\n<p>If you have any questions, feel free to contact our Client Success team, and we\u2019ll be happy to chat.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know that storing your backups in the cloud is a very convenient way of getting an offsite backup. But how secure is it exactly? This article explains things in plain English, comparing the security of cloud and on-premise backups, and we finish with some practical advice on how to choose between cloud backups and swapping USB or RDX hard disks. <\/p>\n","protected":false},"author":17,"featured_media":16623,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95],"tags":[],"class_list":["post-16503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security of cloud backups explained! How safe is backup data in the cloud?<\/title>\n<meta name=\"description\" content=\"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of cloud backups explained! How safe is backup data in the cloud?\" \/>\n<meta property=\"og:description\" content=\"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-26T03:05:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T02:27:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"How secure is my backup data when stored in the cloud?\",\"datePublished\":\"2020-10-26T03:05:14+00:00\",\"dateModified\":\"2020-10-30T02:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\"},\"wordCount\":1966,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg\",\"articleSection\":[\"Guides\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\",\"name\":\"Security of cloud backups explained! How safe is backup data in the cloud?\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg\",\"datePublished\":\"2020-10-26T03:05:14+00:00\",\"dateModified\":\"2020-10-30T02:27:40+00:00\",\"description\":\"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg\",\"width\":1400,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How secure is my backup data when stored in the cloud?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of cloud backups explained! How safe is backup data in the cloud?","description":"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud","og_locale":"en_US","og_type":"article","og_title":"Security of cloud backups explained! How safe is backup data in the cloud?","og_description":"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-10-26T03:05:14+00:00","article_modified_time":"2020-10-30T02:27:40+00:00","og_image":[{"width":1400,"height":478,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"How secure is my backup data when stored in the cloud?","datePublished":"2020-10-26T03:05:14+00:00","dateModified":"2020-10-30T02:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud"},"wordCount":1966,"commentCount":0,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg","articleSection":["Guides"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud","url":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud","name":"Security of cloud backups explained! How safe is backup data in the cloud?","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg","datePublished":"2020-10-26T03:05:14+00:00","dateModified":"2020-10-30T02:27:40+00:00","description":"Moving backup data to the cloud can seem risky. What are the security implications? How do I stay legally compliant? Encryption, MFA are explained here.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/10\/hero-live.jpg","width":1400,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-secure-is-my-backup-data-when-stored-in-the-cloud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How secure is my backup data when stored in the cloud?"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=16503"}],"version-history":[{"count":36,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16503\/revisions"}],"predecessor-version":[{"id":16635,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/16503\/revisions\/16635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/16623"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=16503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=16503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=16503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}