
{"id":3185,"date":"2017-01-25T00:00:00","date_gmt":"2017-01-25T00:00:00","guid":{"rendered":"http:\/\/otava.test\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/"},"modified":"2017-01-25T00:00:00","modified_gmt":"2017-01-25T00:00:00","slug":"seven-best-practices-for-securing-yourself-against-ransomware-in-2017","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/","title":{"rendered":"Seven best practices for securing yourself against ransomware in 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17060\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\" alt=\"Military-grade security for your computer\" width=\"350\" height=\"233\" \/>Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. The healthcare industry is a particularly attractive target, because hospital systems are often vulnerable and the critical nature of patient data means they are more likely to pay out than risk being locked out of their files. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 alone. In Q3, <a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/76482\/it-threat-evolution-q3-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kaperseky Labs<\/a> reported more than 170 million malicious attacks from all over the world, meaning this threat isn\u2019t going anyway anytime soon.<\/p>\n<p>What can you do to protect yourself from this major and ongoing threat? Below are some seven tips to get you started.<\/p>\n<ul>\n<li><strong>Run a strong antivirus program<\/strong>: Most programs scan for viruses in attachments, which is how most ransomware is spread. Having a strong AV means you get alerts when something suspicious might be trying to get into your systems. Of course, AV should be only a component of your network security strategy, along with firewalls and <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/a-quick-tech-tutorial-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">two factor authentication<\/a>. There are strains of ransomware that have learned to avoid detection from AV programs, so it\u2019s important to have other means of defense as well.<\/li>\n<li><strong>Disable macros on your Office programs<\/strong>: Malware of all shapes and sizes likes to hang out in macros, and it\u2019s best to disable them entirely. Talk to your sys admin about disabling macros across your\u00a0organization.<\/li>\n<li><strong>Update your plugins<\/strong>: Criminals regularly take advantage of zero-day vulnerabilities in Java and Adobe Flash, so when they issue updates, be sure to stay on top of it. If you don\u2019t need Java or Flash to run your business, consider disabling them altogether. Malvertising is proving to be another very effective way of delivering malicious payloads to victims, oftentimes without them knowing it. These payloads are often delivered via exploit kits found in Java or Flash<\/li>\n<li><strong>Never run executables in email attachments<\/strong>. Ever. Ever ever. If there\u2019s one basic security policy to follow, this is it.<\/li>\n<li><strong>Back up your files and have more than one copy<\/strong>: Follow the 3-2-1 rule: Three different copies of your data, on two different media, one being offsite. There are many strains of ransomware that look for network backups and encrypt them to prevent victims from being able to restore their files. Having a copy that is stored offsite can protect the integrity of your data. To that end, it\u2019s also important to consider your current backup strategy: How easy it is to restore your files in case of an emergency?<\/li>\n<li><strong>Have a strong disaster recovery strategy in place<\/strong>: If you need to shut down your network and therefore your primary patient portal, how quickly can you spin up your <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-the-difference-between-a-cold-warm-and-hot-disaster-recovery-site\/\" target=\"_blank\" rel=\"noopener noreferrer\">recovery site?<\/a>\u00a0Ransomware hits healthcare because criminals know the criticality of the data it protects, and know hospitals and healthcare insurers are more likely to pay out in order to get their systems back. If you have a strong <a href=\"https:\/\/www.onlinetech.com\/products\/offsite-backup-and-recovery\" target=\"_blank\" rel=\"noopener noreferrer\">backup<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">recovery system<\/a>, you can thwart the malware and restore your data with a minimal amount of loss.<\/li>\n<li><strong>Question everything<\/strong>: Emails that ask you to download invoices, enter information into a spreadsheet, or send back personal information are almost guaranteed to be phishing emails that not only try to suck information from you but install ransomware as well. According to Barkly, <a href=\"https:\/\/blog.barkly.com\/ransomware-statistics-2016\" target=\"_blank\" rel=\"noopener noreferrer\">email<\/a> is the No. 1 delivery method for ransomware and accounted for 59% of all attacks against healthcare in 2016. It\u2019s not rude to double check with a purported sender that they really do need the information they\u2019re requesting. Building a culture of security in the workplace goes a long way towards protecting an organization\u2014after all, there\u2019s only so much technology can do before humans start interacting with it.<\/li>\n<\/ul>\n<p>Ransomware has exploded onto the scene and was a <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ransomware-facts-and-figures\/\" target=\"_blank\" rel=\"noopener noreferrer\">billion dollar crime<\/a> in 2016. This year is sure to be just as bad, if not worse. But if you follow the above tips, you can protect your organization now before you\u2019re locked out of your files.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Other_ransomware_resources\"><\/span>Other ransomware resources<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you&#8217;re curious about ransomware, learn more from these blog posts:<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is ransomware and how do you protect against it?<\/a><\/strong>\u00a0Ransomware has been rising at an \u201calarming rate,\u201d according to security researchers, with a 3,500 percent increase in criminal use of net infrastructure that helps run ransomware campaigns.\u00a0It can affect anyone with a computer or mobile device, and there are already plenty of examples&#8230; (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ransomware-facts-and-figures\/\">Ransomware and healthcare: What you need to know<\/a><\/strong>: Ransomware was\u00a0officially a\u00a0billion dollar crime\u00a0in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would\u00a0discover more than 100 variants before year\u2019s end&#8230; (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ransomware-facts-and-figures\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">How does Ransomware as a Service work?<\/a><\/strong> Ransomware has made headlines time and again for its devastating effectiveness on governments and organizations, but researchers are starting to pay attention to a developing trend within ransomware: Ransomware as a Service (RaaS)\u2026 (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. The healthcare industry is a particularly attractive target, because hospital systems are often vulnerable and the critical nature of patient data means they are more likely to pay out than risk being locked out of their files. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 alone. In Q3, Kaperseky Labs reported more than 170 million malicious attacks from all over the world, meaning this threat isn\u2019t going anyway anytime soon. What can you do to protect yourself from this major and ongoing threat? Below are some seven tips to get you started. Run a strong antivirus program: Most programs scan for viruses in attachments, which is how most ransomware is spread. Having a strong AV means you get alerts when something suspicious might be trying to get into your systems. Of course, AV should be only a component of your network security strategy, along with firewalls and two factor authentication. There are strains of ransomware that have learned to avoid detection from AV programs, so&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3185","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Seven best practices for securing yourself against ransomware in 2017 | OTAVA<\/title>\n<meta name=\"description\" content=\"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seven best practices for securing yourself against ransomware in 2017\" \/>\n<meta property=\"og:description\" content=\"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Seven best practices for securing yourself against ransomware in 2017\",\"datePublished\":\"2017-01-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\"},\"wordCount\":845,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\",\"url\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\",\"name\":\"Seven best practices for securing yourself against ransomware in 2017 | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\",\"datePublished\":\"2017-01-25T00:00:00+00:00\",\"description\":\"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seven best practices for securing yourself against ransomware in 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seven best practices for securing yourself against ransomware in 2017 | OTAVA","description":"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/","og_locale":"en_US","og_type":"article","og_title":"Seven best practices for securing yourself against ransomware in 2017","og_description":"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.","og_url":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/","og_site_name":"OTAVA","article_published_time":"2017-01-25T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Seven best practices for securing yourself against ransomware in 2017","datePublished":"2017-01-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/"},"wordCount":845,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/","url":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/","name":"Seven best practices for securing yourself against ransomware in 2017 | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg","datePublished":"2017-01-25T00:00:00+00:00","description":"Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Army-security-01.11.17-BLOG-4717793.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Seven best practices for securing yourself against ransomware in 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3185"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3185\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3185"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}