{"id":6976,"date":"2019-07-18T04:25:36","date_gmt":"2019-07-18T08:25:36","guid":{"rendered":"https:\/\/tsisupport.com\/?p=6976"},"modified":"2021-07-07T05:17:54","modified_gmt":"2021-07-07T09:17:54","slug":"msps-are-giving-clients-ransomware-the-top-questions-to-ask-your-msp-yesterday","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=6976","title":{"rendered":"Managed IT services: MSPs Could Be Giving Clients Ransomware"},"content":{"rendered":"<p>A part of my week here at TSI is always spent wading through news stories to stay ahead of all the latest trends and best practices in our industry. After all, how can I provide clients with the most complete, accurate and actionable information to work from if I don&#8217;t have access to that data myself?<\/p>\n<p>Most of the time, the trends I spend so much time researching fall squarely in the &#8220;positive&#8221; category&#8230; though unfortunately, that isn&#8217;t always the case. Recently, I&#8217;ve been reading a lot about the spread of ransomware and what I&#8217;ve been finding has been concerning to say the least.<\/p>\n<p>It isn&#8217;t just that ransomware is on the rise, although anyone who has ever been a victim themselves can tell you how distressing that is. No, what&#8217;s really given me pause has to do with how that ransomware is spreading:<\/p>\n<p>Managed services providers!<\/p>\n<p>It&#8217;s absolutely true, and it&#8217;s something that is happening far more frequently that one could even imagine. In June, <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/msp-pays-150000-to-recover-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">one MSP actually gave more than $150,000<\/a> to recover client data after a ransomware attack where in another situation, <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/customers-of-3-msps-hit-in-ransomware-attacks\/d\/d-id\/1335025\" target=\"_blank\" rel=\"noopener noreferrer\">customers of three MSPs<\/a> were impacted by a totally separate incident that encrypted the entirety of their customers\u2019 networks.<\/p>\n<p>All of this recent activity is certainly worth a closer look, not only so that you can understand as much about what is going on as possible &#8211; but so that you can also take steps to<em> avoid it altogether<\/em>.<\/p>\n<p><span style=\"color: #800000;\"><strong>What do These MSPs have in Common?<\/strong><\/span><\/p>\n<p>Other than the fact that they&#8217;re all managed services providers, the major factor that all of these instances have in common is that the ransomware targeted the MSPs\u2019 remote monitoring and management tools. Such tools from Webroot and Kaseya were used to distribute the malware in these different instances, and all of this was possible due to stolen or otherwise compromised credentials. Unfortunatley, the troubling questions of how these credentials were stolen is still up in the air.<\/p>\n<p>The incidents were so severe that in their immediate aftermath, Webroot actually sent out an email to customers letting them know that two-factor authentication (otherwise known as multi-factor authentication) was now being enforced on their own remote management portal. This is a significant step, but also a critical one, as it requires not one but two forms of identification before access to the system is granted.<\/p>\n<p>Had this step been in place earlier, those compromised credentials wouldn&#8217;t have been as much of a problem. But sadly, some lessons need to be learned the hard way.<\/p>\n<p>The other thing that these MSPs have in common is that they were simply behind the fast-changing IT security curve. The fault for this isn&#8217;t all (if any) on Webroot and Kaseya &#8211; had those providers been more proactive about their own security, a lot of the risk could have been mitigated entirely. But they&#8217;re managed services providers, not managed security services providers &#8211; they were simply unequipped to deal with the changes taking place all around them.<\/p>\n<p>Likewise, some of the blame for this situation has to fall squarely on the impacted clients and the MSP Managing their environment. Yes, you need to put a certain amount of faith in your MSP to handle your security needs in an adequate way,but that doesn&#8217;t mean that you shouldn&#8217;t still make sure that your own house is in order, so to speak. We saw this recently when businesses who failed to update their Microsoft Windows-based systems were hit with the WannaCry worm. All told, <a href=\"https:\/\/www.insurancejournal.com\/news\/international\/2017\/05\/16\/451196.htm\" target=\"_blank\" rel=\"noopener noreferrer\">that incident impacted more than 200,000 Windows computers<\/a> around the world &#8211; not all of that is the fault of a lackadaisical MSP.<\/p>\n<p><span style=\"color: #800000;\"><strong>The Major Lessons to Be Learned<\/strong><\/span><\/p>\n<p>All told, many of the incidents I just told you about are still playing out &#8211; meaning that we still don&#8217;t know precisely what happened, and whether everything was decrypted or not after the ransoms were paid. There are, however, a number of important lessons that we should ALL be paying attention in the future.<\/p>\n<p>First, this is nothing if not a reminder on the importance of a quality backup plan. <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/msp-pays-150000-to-recover-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">One of the impacted MSPs was able to quickly recover about 30% of their end-user systems<\/a> in less than a half hour because those clients employed the company&#8217;s Veeam-powered air-gapped offsite backups.<\/p>\n<p>Another consideration to keep in mind is that hackers themselves are quickly becoming more sophisticated all the time. Many of the hackers repeatedly targeted not only RMM platforms but also remote access, remote control and remote desktop services. <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/dhs-warning-msps-csps\/\" target=\"_blank\" rel=\"noopener noreferrer\">The FBI and the United States Department of Homeland Security<\/a> have even taken the extraordinary step of repeatedly warning MSPs about these types of vulnerabilities.<\/p>\n<p>All told, hackers are repeatedly targeting MSPs due to the sheer volume of data (and the value of that data) that they can potentially access. Why spend your time going after one company when you can target an MSP and gain access to all of their client information in one fell swoop?<\/p>\n<p>In an effort to combat this, the FBI (and technology vendors, for that matter) have recommended that MSPs follow the NIST Cybersecurity Requirements and Guidelines. This allows businesses to better assess the unique risks they face by looking at areas like operations, their workforce, their customers, their strategy and even their leadership. It provides guidelines on identifying threats, protecting against those threats, detecting incidents, responding to incidents and recovery.<\/p>\n<p><span style=\"color: #800000;\"><strong>How to Protect Yourself: The Questions You Need to Ask Your MSP.<\/strong><\/span><\/p>\n<p>All of this also proves that businesses will need to be proactive about making sure that their MSP is acting with their own best interests at heart in the first place. To help guarantee that they are &#8211; and to better protect yourself &#8211; you should ask any MSP that you&#8217;re thinking of partnering with the following questions:<\/p>\n<ul class=\"ULStyle\">\n<li>Is your MSP actually following the NIST requirements and guidelines? If not, why aren&#8217;t they?<\/li>\n<li>Are they up-to-date on all related compliance matters, like PCI compliance for the storing and transmission of credit card information? Never forget that if your MSP isn&#8217;t compliant, your business isn&#8217;t likely compliant, either.<\/li>\n<li>How are they managing your passwords? What steps are in place to make sure that credentials aren&#8217;t stolen and used against you? Is multi-factor authentication enabled wherever and whenever possible?<\/li>\n<li>How are their own end users educated as to all the latest security best practices? Remember that the vast majority of all incidents <a href=\"https:\/\/chiefexecutive.net\/almost-90-cyber-attacks-caused-human-error-behavior\/\" target=\"_blank\" rel=\"noopener noreferrer\">still occur because of user-related activities<\/a>.<\/li>\n<li>Are they using Webroot or Kaseya? Have they gone to the measures needed to make sure that they don&#8217;t fall victim to ransomware like all those MSPs outlined above?<\/li>\n<li>Do they use proactive or reactive anti-virus products? Reactive products are designed to respond to a security issue after it has already occurred. A proactive product is one designed to immediately detect suspicious activity to stop that issue from happening in the first place.<\/li>\n<li>How often do they review the IT security landscape? In my opinion, they should be reading industry news daily. Things are changing incredibly quickly &#8211; you need to be proactive about staying ahead of the curve or you WILL get left behind.<\/li>\n<\/ul>\n<p><span style=\"color: #800000;\"><strong>Looking Forward: The Future of Cybersecurity<\/strong><\/span><\/p>\n<p>Ultimately, it&#8217;s important to understand that when it comes to cybersecurity, we&#8217;re all in this together. Yes, those news stories I referenced above involved significant security failures at the MSP level, but they also represent major shortcomings at ALL levels of a relationship, up to and including end users as well. We ALL need to take the most proactive approach possible to keeping our critical information safe from harm. Hackers are getting more advanced all the time, and that isn&#8217;t going to stop anytime soon. Therefore, the only choice we have is to advance right along with them &#8211; for the benefit of all of us, everywhere.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8757 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8757\"><div class=\"fl-row fl-row-full-width fl-row-bg-color fl-node-5ecf4c2920ab3 fl-row-default-height fl-row-align-center BlogCTA\" data-node=\"5ecf4c2920ab3\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecf4c2921a42 fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecf4c2921a42\">\n\t\t\t<div class=\"fl-col fl-node-5ecf4c2921e5b fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecf4c2921e5b\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5ecf4c980bc8a\" data-node=\"5ecf4c980bc8a\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">It\u2019s Your Move!<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5ecf4cbfdf673\" data-node=\"5ecf4cbfdf673\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you'd like to take a more proactive approach to cybersecurity, I recommend giving us a call. It'll give us a chance to learn as much about your business as possible, so that we can figure out how to mount the specific, organic cybersecurity defense you need.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecf4cad72fd8 primary-btn\" data-node=\"5ecf4cad72fd8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecf4c816ff34 fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecf4c816ff34\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-photo fl-node-5ecf4cdccdd76\" data-node=\"5ecf4cdccdd76\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div role=\"figure\" class=\"fl-photo fl-photo-align-right\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t<div class=\"fl-photo-content fl-photo-img-png\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"fl-photo-img wp-image-8765 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/Shield-graphic.png\" alt=\"Shield-graphic\" height=\"524\" width=\"526\" title=\"Shield-graphic\"  itemprop=\"image\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/Shield-graphic.png 526w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/Shield-graphic-300x300.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/Shield-graphic-150x150.png 150w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A part of my week here at TSI is always spent wading through news stories to stay ahead of all the latest trends and best practices in our industry. After all, how can I provide clients with the most complete, accurate and actionable information to work from if I don&#8217;t have access to that data&hellip;<\/p>\n","protected":false},"author":7,"featured_media":8756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13,12,5],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed IT Service Providers Are Giving Clients Ransomware | TSI<\/title>\n<meta name=\"description\" content=\"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed IT Service Providers Are Giving Clients Ransomware | TSI\" \/>\n<meta property=\"og:description\" content=\"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=6976\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-18T08:25:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:17:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeremy Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976\",\"name\":\"Managed IT Service Providers Are Giving Clients Ransomware | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg\",\"datePublished\":\"2019-07-18T08:25:36+00:00\",\"dateModified\":\"2021-07-07T09:17:54+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\"},\"description\":\"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=6976\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6976#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed IT services: MSPs Could Be Giving Clients Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\",\"name\":\"Jeremy Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"caption\":\"Jeremy Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=7\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed IT Service Providers Are Giving Clients Ransomware | TSI","description":"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Managed IT Service Providers Are Giving Clients Ransomware | TSI","og_description":"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=6976","og_site_name":"TSI Support","article_published_time":"2019-07-18T08:25:36+00:00","article_modified_time":"2021-07-07T09:17:54+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg","type":"image\/jpeg"}],"author":"Jeremy Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeremy Louise","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976","url":"https:\/\/tsisupport.com\/tsistaging\/?p=6976","name":"Managed IT Service Providers Are Giving Clients Ransomware | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg","datePublished":"2019-07-18T08:25:36+00:00","dateModified":"2021-07-07T09:17:54+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926"},"description":"Is ransomware spreading through managed services providers? Read this post by our experts to know more about ransomware attacks.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=6976"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/07\/MSPs-are-Giving-clients-ransomware-1140x380-1.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6976#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Managed IT services: MSPs Could Be Giving Clients Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926","name":"Jeremy Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","caption":"Jeremy Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=7"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/6976"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6976"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/6976\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8756"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}