{"id":2330,"date":"2017-02-14T08:00:36","date_gmt":"2017-02-14T08:00:36","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2330"},"modified":"2021-08-09T06:05:59","modified_gmt":"2021-08-09T10:05:59","slug":"can-business-survive-ransomware-attack","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2330","title":{"rendered":"How to Recover From Ransomware: Can Your Business Survive a Ransomware Attack?"},"content":{"rendered":"<p style=\"text-align: justify;\">When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015.<\/p>\n<p style=\"text-align: justify;\">The exponential growth can be easily attributed to one factor, its effectiveness.\u00a0 The first quarter of 2016 alone garnered $209 million in paid ransoms from businesses. 2017 is predicted to continue the meteoric rise and increased liability to businesses who fall victim to this highly volatile malware.<\/p>\n<p style=\"text-align: justify;\">Small &amp; Medium Sized Businesses are particularly vulnerable targets, as we\u2019ve discussed before, their security budgets are typically nominal with a higher rate of success for infiltrators. A few of our clients have experienced the misfortune of these forms of attack.\u00a0 Luckily, they had taken the time to implement the proper preparations and security tools, allowing them to quickly recover without being held captive by a malicious party.\u00a0 Learn the steps you can take to protect your business\u2026<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>What is Ransomware &amp; How Do the Attacks Infiltrate My Network<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">While the topic of Ransomware is nothing new, a brief overview is always helpful.\u00a0 Ransomware is a type of malware which encrypts your data and holds it for ransom for payment in the hopes of receiving a decryption key. Unfortunately, there is no guarantee your data will be handed over even after payment.\u00a0 You can learn more from our other stories <a href=\"https:\/\/tsisupport.com\/tsistaging\/ransomware-and-the-cryptolocker-threat\/\">here<\/a>, as well as <a href=\"https:\/\/tsisupport.com\/tsistaging\/new-hipaa-guidelines-on-ransomware-disclosures\/\">here<\/a>, and <a href=\"https:\/\/tsisupport.com\/tsistaging\/what-to-do-during-a-ransomware-attack\/\">here<\/a>.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8526\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/unnamed-file-1024x256-1.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/unnamed-file-1024x256-1.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/unnamed-file-1024x256-1-300x75.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/unnamed-file-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\">While there are many ways in which an attack can be delivered onto machines and devices within your network, there are two which stand out as the most common.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8527\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Access-Points.fw_-1024x427-1.png\" alt=\"\" width=\"1024\" height=\"427\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Access-Points.fw_-1024x427-1.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Access-Points.fw_-1024x427-1-300x125.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Access-Points.fw_-1024x427-1-768x320.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\">One of the most important things to remember is that a Ransomware Attack aims to encrypt a wide range of devices.\u00a0 This includes PCs, Macs, Android and Smartphones, as well as Virtual Desktops.\u00a0 It is also important to understand that if the device in question is connected to a network drive, then all data and files can quickly become compromised.\u00a0 Regardless of the operating system or the administrative rights\/restrictions of the user.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Paying the Ransom Is Only the Beginning<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">The payment request from cybercriminals is only a small representation of the total cost to your business.\u00a0 Losing access to all customer data, sales records, and financial information, can bring entire business operations to a halt until your network can be brought back online.\u00a0 We live in the \u2018information age\u2019 so even a temporary shutdown can result in a loss in sales, productivity, as well as the costs associated with recovery.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8528\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Tech-Facts.fw_-1024x256-1.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Tech-Facts.fw_-1024x256-1.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Tech-Facts.fw_-1024x256-1-300x75.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Tech-Facts.fw_-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\">The loss is even more devastating in the event of permanent data loss when an organization is ill-prepared to manage such a far-reaching attack.\u00a0 It can permanently reduce new business opportunities over the long term and open the possibility for intellectual property\/design data to be released for public consumption, diminishing the competitive advantage you had before the breach.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>How to Protect Your Business<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">When discussing the ways to protect your business from the onslaught of attacks, a few areas are often neglected, but play an equally vital part to the overall protection of your network.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8529\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Protect-Business.fw_-1024x661-1.png\" alt=\"\" width=\"1024\" height=\"661\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Protect-Business.fw_-1024x661-1.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Protect-Business.fw_-1024x661-1-300x194.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Protect-Business.fw_-1024x661-1-768x496.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Get a Real Security Solution<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">TSI offers a wide-range of award-winning security products delivering multi-layered solutions to protect your business against advanced threats, including Ransomware.\u00a0 To learn why our clients trust our security experts to not only identify vulnerabilities, but maximize protection, including complete employee education programs, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>When your business is hit by crypto-malware, you become keenly aware of just how little preparation and planning you have done to prevent your data from being compromised. SonicWALL reported Ransomware Attacks on businesses of all sizes reached $638 million in 2016, a considerable uptick from the $3.8 million reported in 2015. The exponential growth&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[254,328,129,107,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Recover From Ransomware | How to Stop Ransomware | TSI<\/title>\n<meta name=\"description\" content=\"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Recover From Ransomware | How to Stop Ransomware | TSI\" \/>\n<meta property=\"og:description\" content=\"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2330\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-14T08:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T10:05:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330\",\"name\":\"How to Recover From Ransomware | How to Stop Ransomware | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png\",\"datePublished\":\"2017-02-14T08:00:36+00:00\",\"dateModified\":\"2021-08-09T10:05:59+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2330\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png\",\"width\":1024,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2330#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Recover From Ransomware: Can Your Business Survive a Ransomware Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Recover From Ransomware | How to Stop Ransomware | TSI","description":"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Recover From Ransomware | How to Stop Ransomware | TSI","og_description":"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2330","og_site_name":"TSI Support","article_published_time":"2017-02-14T08:00:36+00:00","article_modified_time":"2021-08-09T10:05:59+00:00","og_image":[{"width":1024,"height":341,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2330","name":"How to Recover From Ransomware | How to Stop Ransomware | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png","datePublished":"2017-02-14T08:00:36+00:00","dateModified":"2021-08-09T10:05:59+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Would your business survive a ransomware attack? Read on to learn how SMBs can prevent attacks and, if necessary, how to recover from ransomware.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2330"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Can-Your-Business-Survive-A-Ransomware-Attack-1140x380-1.png","width":1024,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2330#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"How to Recover From Ransomware: Can Your Business Survive a Ransomware Attack?"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2330"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2330"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2330\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8525"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}