{"id":19910,"date":"2024-11-13T05:33:10","date_gmt":"2024-11-13T05:33:10","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=19910"},"modified":"2026-04-03T09:21:12","modified_gmt":"2026-04-03T09:21:12","slug":"protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","title":{"rendered":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks"},"content":{"rendered":"\n<p>In recent months, the cybersecurity landscape has seen an alarming rise in <strong>remote code execution (RCE) attacks<\/strong>, underscoring the urgent need for\u00a0remote code execution attack prevention efforts. Two prominent cases in particular\u2014attacks on <a href=\"https:\/\/thehackernews.com\/2024\/11\/new-flaws-in-citrix-virtual-apps-enable.html\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a> and <a href=\"https:\/\/cybersecuritynews.com\/veeam-rce-frag-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Veeam<\/a> systems\u2014have revealed just how vulnerable organizations are to exploitation, highlighting the need for comprehensive IT security and robust BDR strategies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Remote Code Execution (RCE) Attack?<\/h2>\n\n\n\n<p>A remote code execution (RCE) attack allows malicious actors to execute code on a target device from a remote location, bypassing conventional security boundaries. Exploiting vulnerabilities in software or applications, attackers use RCE to install malware, steal data, or even take control of an entire network. This type of attack is especially dangerous because it requires minimal interaction from the end user\u2014just one unpatched vulnerability can give an attacker the access they need to cause widespread damage.<\/p>\n\n\n\n<p>In the recent Citrix incident, attackers leveraged an RCE vulnerability within Citrix Virtual Apps and Desktops, gaining unauthorized control over users&#8217; systems. Similarly, Veeam&#8217;s vulnerability led to Frag Ransomware infections, where attackers exploited an RCE flaw to spread ransomware. Both cases illustrate how quickly malicious actors can exploit software flaws when security patches are delayed or overlooked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Need for Vigilance and Prompt Security Patching<\/h2>\n\n\n\n<p>For IT security professionals, staying vigilant against RCE attacks is essential. Part of this responsibility includes closely monitoring emerging threats, acting swiftly to apply patches, and ensuring that all systems are fully updated. However, patching alone isn&#8217;t always enough. In today&#8217;s rapidly evolving cyber environment, even the most secure systems can still fall victim to a well-orchestrated attack. That&#8217;s why it\u2019s crucial for every organization, regardless of industry, to establish a <strong>resilient backup and disaster recovery strategy<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of Backup and Disaster Recovery in RCE Resilience<\/h2>\n\n\n\n<p>In the face of RCE threats, backups become the ultimate safety net. When disaster strikes\u2014be it an RCE attack, ransomware, or another form of cyber attack\u2014having reliable, uninfected backups ensures your business can recover quickly without paying a ransom or losing valuable data.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.backupassist.com\/blog\/building-a-comprehensive-data-backup-strategy-key-aims-and-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">robust BDR strategy<\/a> incorporates recommended best practices such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The <a href=\"https:\/\/www.backupassist.com\/blog\/the-3-2-1-1-0-backup-rule-your-ultimate-data-protection-strategy\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1-1-1 backup rule<\/a> \u2013 comprised of a combination of onsite, offsite, and offline backups stored on a variety of media types<\/li><li>Defined <strong>RPOs <\/strong>and <strong>RTOs <\/strong>based on data classification and industry regulations<\/li><li><a href=\"https:\/\/www.backupassist.com\/blog\/securing-your-backups-best-practice-for-modern-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Securing and limiting access to backups<\/a> with dedicated administrator accounts<\/li><\/ul>\n\n\n\n<p>At BackupAssist, we recognize the importance of backups being the &#8220;last line of defense.&#8221; Our\u00a0<strong>CryptoSafeGuard<\/strong>\u00a0feature, specifically designed to <a href=\"https:\/\/www.backupassist.com\/blog\/bulletproof-your-backups-the-new-age-of-ransomware-protection\" target=\"_blank\" rel=\"noreferrer noopener\">protect your backups against ransomware<\/a>, detects ransomware on the system and shields your backups from infection. This ensures that even if a ransomware or RCE attack infiltrates your system, your backup data remains safe and untouched.<\/p>\n\n\n\n<p>Additionally, our\u00a0<strong>Test Restore<\/strong>\u00a0feature allows you to routinely and <a href=\"https:\/\/www.backupassist.com\/blog\/non-negotiable-why-your-business-needs-an-automated-backup-test-plan\" target=\"_blank\" rel=\"noreferrer noopener\">automatically test the validity of your backups<\/a>, giving you confidence that, in the event of an attack, your data is recoverable and ready for restore. Regular testing eliminates unpleasant surprises by verifying that your backups are not only intact but fully functional, enabling a seamless recovery process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Every Business Needs a Backup and Disaster Recovery Plan<\/h2>\n\n\n\n<p>These recent RCE incidents are a stark reminder that no organization is immune to cyber threats. But with a robust BDR strategy in place, the impact of an attack can be minimized, if not entirely mitigated. BackupAssist is here to help businesses of all sizes ensure data security and resilience against cyber threats.<\/p>\n\n\n\n<p>No matter your industry, investing in a comprehensive backup solution is essential. Protect your business, your data, and your future by securing your backups and testing them regularly. In an increasingly digital world, resilience against RCE attacks and other cyber threats begins with preparation\u2014and a reliable backup system is the foundation of that preparedness.<\/p>\n\n\n\n<p>New to BackupAssist? Start your <a href=\"https:\/\/www.backupassist.com\/classic\/downloads\/\" target=\"_blank\" rel=\"noreferrer noopener\">30-day free trial<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay protected against remote code execution (RCE) attacks. Discover how reliable backups and robust disaster recovery strategies can shield your business from the latest cybersecurity threats.<\/p>\n","protected":false},"author":33,"featured_media":19913,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-19910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks<\/title>\n<meta name=\"description\" content=\"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks\" \/>\n<meta property=\"og:description\" content=\"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T05:33:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T09:21:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/6d1a0d1e76f8ffe01f5b8fb5f8a3719e\"},\"headline\":\"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks\",\"datePublished\":\"2024-11-13T05:33:10+00:00\",\"dateModified\":\"2026-04-03T09:21:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\",\"name\":\"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg\",\"datePublished\":\"2024-11-13T05:33:10+00:00\",\"dateModified\":\"2026-04-03T09:21:12+00:00\",\"description\":\"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/6d1a0d1e76f8ffe01f5b8fb5f8a3719e\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks","description":"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","og_locale":"en_US","og_type":"article","og_title":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks","og_description":"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","og_site_name":"Cyber Resilience Blog","article_published_time":"2024-11-13T05:33:10+00:00","article_modified_time":"2026-04-03T09:21:12+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/6d1a0d1e76f8ffe01f5b8fb5f8a3719e"},"headline":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks","datePublished":"2024-11-13T05:33:10+00:00","dateModified":"2026-04-03T09:21:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks"},"wordCount":650,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","url":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks","name":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg","datePublished":"2024-11-13T05:33:10+00:00","dateModified":"2026-04-03T09:21:12+00:00","description":"Stay protected from RCE attacks. Learn how reliable backups and strong disaster recovery can shield your business from the latest cybersecurity threats.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/11\/shutterstock_2052828527.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/protecting-your-business-against-the-rising-threat-of-remote-code-execution-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Protecting Your Business Against the Rising Threat of Remote Code Execution Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/6d1a0d1e76f8ffe01f5b8fb5f8a3719e","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=19910"}],"version-history":[{"count":1,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19910\/revisions"}],"predecessor-version":[{"id":19912,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19910\/revisions\/19912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19913"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=19910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=19910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=19910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}