{"id":178,"date":"2017-03-30T11:58:33","date_gmt":"2017-03-30T09:58:33","guid":{"rendered":"http:\/\/blog.xopero.com\/?p=178"},"modified":"2020-06-17T15:49:34","modified_gmt":"2020-06-17T13:49:34","slug":"backup-how-to-protect-ourselves","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/","title":{"rendered":"Backup &#8211; How to protect ourselves"},"content":{"rendered":"<p><b>How to protect ourselves<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It can be seen that cybercriminals are motivated by money and all computer users, without any exceptions, are vulnerable. If you get attacked by a ransomware virus, first switch your computer off. Some malicious software first shows the message concerning infection and then it encrypts our files. In such case we can prevent the encryption of at least some data. Files should then be restored by connecting the disc to a different computer, which hasn\u2019t been connected to the network in order to eliminate for the virus the possibility to connect with the CnC server. Without this it is unable to encrypt files.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">However, protection relies on good antivirus software and computer hygiene. Do not click in every link and do not open all attachments to your e-mails, on social networking sites as well as in communicators. We should also avoid logging in to the account with administrator privileges. On a daily basis we should work from the user account and the administrative account should be used only when necessary \u2013 for example for software installation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the company it is necessary to correctly assign permissions to the resources of company network and company cloud made available to the users. Providing company managers with the access to all company resources constitutes a very common mistake. These people are the most frequently at the risk of personalized attacks of cybercriminals and it has frequently been the case during ransomware attacks that all files with documents on all company servers and in all locations were encrypted from CEO\u2019s laptop, thus paralyzing company\u2019s activity for a few days, until the ransom was paid. <\/span><\/p>\n<p><b>Backup \u2013 most important defense line<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Backup constitutes the best way to protect the company against ransomware attack. In case of the infection it is often much easier to format the entire hard disc and load the data from backup copy than to bother with removing the virus or paying cybercriminals. Backup enables fast and trouble-free going back to the moment before the attack. In addition, in such solutions as Xopero QNAP Appliance, which cooperates with QNAP NAS servers, it is possible to launch the image of restored computer in virtual environment from USB key. Image downloaded from the NAS server remains then in safe virtual environment, where we can without any problem check whether the restored data has been infected. Often before encrypting the data, ransomware for several days remains hidden on the victim\u2019s computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automatic cloud backup constitutes a recommended solution. It is worth to remember that at the moment of the attack, data is encrypted in all locations accessible from the operating system level \u2013 including external and network carriers, including portable hard discs or NAS servers (when it comes to QNAP NAS, the functionality of system\/data restoring from the snapshot prepared in advance turns out to be particularly useful). Cloud backup is not easily accessible from the user level. In this way, ransomware does not have direct access to backed up data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For cloud backup, automatic tools performing the work for us are a good idea. We do not have to remember about physical backup activity as it will be performed in the background without our participation always at a given time or moment when the computer or network are not overloaded. Cloud backup systems Xopero Cloud and Xopero Cloud Personal are among others equipped with mechanisms of this type.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is worth to remember that backup technology may without any problem provide protection against ransomware attack not only to the computers and laptops of subsequent users, but also to servers \u2013 physical and virtual ones. In this way we are sure that in case of any trouble, we will overcome it without paying cybercriminals a single penny. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to protect ourselves It can be seen that cybercriminals are motivated by money and all computer users, without any exceptions, are vulnerable. If you get attacked by a ransomware virus, first switch your computer off. Some malicious software first shows the message concerning infection and then it encrypts our files. In such case we can prevent the encryption of at least some data. Files should then be restored by connecting the disc to a different computer, which hasn\u2019t been connected to the network in order to eliminate for the virus the possibility to connect with the CnC server. Without [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":690,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-all-around","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backup - How to protect ourselves - Xopero Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup - How to protect ourselves - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"How to protect ourselves It can be seen that cybercriminals are motivated by money and all computer users, without any exceptions, are vulnerable. If you get attacked by a ransomware virus, first switch your computer off. Some malicious software first shows the message concerning infection and then it encrypts our files. In such case we can prevent the encryption of at least some data. Files should then be restored by connecting the disc to a different computer, which hasn\u2019t been connected to the network in order to eliminate for the virus the possibility to connect with the CnC server. Without [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-30T09:58:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-17T13:49:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1842\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Backup &#8211; How to protect ourselves\",\"datePublished\":\"2017-03-30T09:58:33+00:00\",\"dateModified\":\"2020-06-17T13:49:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/dr-2.jpg\",\"articleSection\":[\"100% backup\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/\",\"name\":\"Backup - How to protect ourselves - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/dr-2.jpg\",\"datePublished\":\"2017-03-30T09:58:33+00:00\",\"dateModified\":\"2020-06-17T13:49:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/dr-2.jpg\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/dr-2.jpg\",\"width\":1842,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/backup-how-to-protect-ourselves\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup &#8211; How to protect ourselves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backup - How to protect ourselves - Xopero Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/","og_locale":"pl_PL","og_type":"article","og_title":"Backup - How to protect ourselves - Xopero Blog","og_description":"How to protect ourselves It can be seen that cybercriminals are motivated by money and all computer users, without any exceptions, are vulnerable. If you get attacked by a ransomware virus, first switch your computer off. Some malicious software first shows the message concerning infection and then it encrypts our files. In such case we can prevent the encryption of at least some data. Files should then be restored by connecting the disc to a different computer, which hasn\u2019t been connected to the network in order to eliminate for the virus the possibility to connect with the CnC server. Without [&hellip;]","og_url":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2017-03-30T09:58:33+00:00","article_modified_time":"2020-06-17T13:49:34+00:00","og_image":[{"width":1842,"height":625,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg","type":"image\/jpeg"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Backup &#8211; How to protect ourselves","datePublished":"2017-03-30T09:58:33+00:00","dateModified":"2020-06-17T13:49:34+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg","articleSection":["100% backup"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/","url":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/","name":"Backup - How to protect ourselves - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg","datePublished":"2017-03-30T09:58:33+00:00","dateModified":"2020-06-17T13:49:34+00:00","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2018\/03\/dr-2.jpg","width":1842,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/backup-how-to-protect-ourselves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Backup &#8211; How to protect ourselves"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":3,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions\/334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/690"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}