
{"id":3193,"date":"2017-03-22T00:00:00","date_gmt":"2017-03-22T00:00:00","guid":{"rendered":"http:\/\/otava.test\/the-best-ransomware-articles-on-the-web\/"},"modified":"2017-03-22T00:00:00","modified_gmt":"2017-03-22T00:00:00","slug":"the-best-ransomware-articles-on-the-web","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/","title":{"rendered":"The 6 best ransomware resources on the web"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17128\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\" alt=\"Ransomware attacking data\" width=\"300\" height=\"225\" \/>Ransomware has exploded in popularity during the past two years, with the number of identified families growing <a href=\"https:\/\/blog.trendmicro.com\/ransomware-growth-will-plateau-in-2017-but-attack-methods-and-targets-will-diversify\/\" target=\"_blank\" rel=\"noopener noreferrer\">400 percent<\/a> since 2015. It affects individuals, nonprofits and enterprises alike, but it&#8217;s is particularly fond of the <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ransomware-facts-and-figures\/\" target=\"_blank\" rel=\"noopener noreferrer\">healthcare industry<\/a> because of the value of patient data and the criticality of hospitals. To help the healthcare IT industry (and others) learn more about ransomware, I\u2019ve compiled a list of the most informational articles on the web to date.<\/p>\n<ol>\n<li><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/RansomwareFactSheet.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Health and Human Services Department fact sheet on ransomware<\/a>: This brief guidance issued by the HHS in July 2016 specifically addresses ransomware and HIPAA, the standard all healthcare entities and their <a href=\"https:\/\/www.onlinetech.com\/resources\/references\/hipaa-glossary-of-terms#business-associates\" target=\"_blank\" rel=\"noopener noreferrer\">business associates<\/a>\u00a0must adhere to. It addresses HIPAA guidelines as they pertain to preventing and handling a ransomware attack, as well whether an attack constitutes a reportable data breach. There has been some confusion over what that part of the HHS guidance really means, so Palo Alto Networks has published a <a href=\"https:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/how-to-interpret-hhs-guidance-on-ransomware-as-a-hipaa-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">helpful guide<\/a> to the HHS bulletin.<\/li>\n<li><a href=\"https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/ISTR2016_Ransomware_and_Businesses.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware and Businesses 2016 special report<\/a>: This white paper from Symantec is long (30 pages) but chock full of valuable information about ransomware and worth the read. It discusses all things ransomware and enterprise, including how ransomware can be used not just to encrypt files but as a distraction for outright <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-data-jacking-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">data theft<\/a>. It also breaks down the impact of ransomware and uses the case of Presbyterian Hospital in California as a <a href=\"https:\/\/www.latimes.com\/business\/technology\/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">specific example<\/a>. Finally, it offers tools and tips for the enterprise to protect itself.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/ransomware.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s Malware Protection Center<\/a>, which offers a variety of resources on ransomware, what it is, and examples of ransomware in action. No matter if you\u2019re a hospital struggling to regain control of your network or an individual victim who\u2019s had priceless photos and videos encrypted, the website is very easy to understand, and it\u2019s easy to jump around and read different articles. <strong>Note:<\/strong> Microsoft does not offer a way to decrypt your files if you have been attacked by ransomware; it only offers ransomware prevention tips. <strong>If you\u2019re looking to decrypt your files<\/strong>, <a href=\"https:\/\/success.trendmicro.com\/solution\/1114221-downloading-and-using-the-trend-micro-ransomware-file-decryptor\" target=\"_blank\" rel=\"noopener noreferrer\">TrendMicro<\/a> and Kaspersky Labs both offer <a href=\"https:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">decryptor tools<\/a> that work on a variety of ransomware strains (but not all.)<\/li>\n<\/ol>\n<p>Even though ransomware is most prevalent on Windows machines, if you\u2019re a Linux or OSX user, you\u2019re not free from risk. <a href=\"https:\/\/thehackernews.com\/2017\/01\/linux-ransomware-malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">Killdisk<\/a>\u00a0is a ransomware variant that affects Linux users (and despite what the article says, the <a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/09\/fbi-ransomware-extortionists\/\" target=\"_blank\" rel=\"noopener noreferrer\">FBI does <strong>not<\/strong> recommend paying the ransom<\/a>). There aren\u2019t many ransomware strains <a href=\"https:\/\/techcrunch.com\/2016\/03\/07\/apple-has-shut-down-the-first-fully-functional-mac-os-x-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeting OSX users<\/a>, but they <a href=\"https:\/\/www.welivesecurity.com\/2017\/02\/22\/new-crypto-ransomware-hits-macos\/\" target=\"_blank\" rel=\"noopener noreferrer\">are there<\/a>, and it&#8217;s very likely that more will crop up. Make sure your machines are patched and up to date.<\/p>\n<ol start=\"4\">\n<li>Carbon Black\u2019s webinar \u201c<a href=\"https:\/\/www.carbonblack.com\/webinars\/decoding-ransomware-how-to-reduce-your-risk-of-attack\" target=\"_blank\" rel=\"noopener noreferrer\">Decoding Ransomware: How to Reduce Your Risk of Attack<\/a>\u201d: This webinar from January 2016 starts off with Rick McElroy of Carbon Black giving a high-level overview of ransomware, offering statistics into how widespread it is and how it works. About 15 minutes in, Ryan Nolette, also with Carbon Black, delivers an excellent deep dive into the anatomy of a ransomware attack, from a very technical and systematic overview. If you\u2019re a sys admin, enjoy coding or are interested in network security even in the slightest, this is for you.<\/li>\n<li><a href=\"https:\/\/www.globalsign.com\/en\/blog\/how-to-run-a-simulated-phishing-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to run a phishing simulation<\/a>: One of the biggest steps you can take to prevent or mitigate a ransomware attack is employee security. More than 90 percent of all ransomware attacks are spread through phishing emails, where users inadvertently download ransomware onto their machines. GlobalSign, a Belgian-based Certificate Authority (CA), offers different scenarios you can try to lure your employees into clicking on a link, so you can measure your employees\u2019 cybersecurity strengths and weaknesses. <a href=\"https:\/\/blogs.bromium.com\/cisos-its-time-to-take-your-employees-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bromium<\/a>, an antivirus software provider,\u00a0also gives advice on how to get started and offers other resources that are readily available, including a \u201cPhishing 101\u201d article from <a href=\"https:\/\/krebsonsecurity.com\/2012\/01\/phishing-your-employees-101\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brian Krebs<\/a>\u00a0and phishing kits.<\/li>\n<li>If you want even more information, check out our own posts about ransomware! We have a variety of articles that discuss it, including <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">what it is<\/a>, simple ways to <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">mitigate the threat<\/a> it poses, how it <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ransomware-facts-and-figures\/\" target=\"_blank\" rel=\"noopener noreferrer\">particularly affects the healthcare industry<\/a>, and the rise of <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware as a Service<\/a>. You need many different tools to fight ransomware, such as <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">trained employees<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">strong infrastructure<\/a>, <a href=\"https:\/\/www.onlinetech.com\/products\/offsite-backup-and-recovery\" target=\"_blank\" rel=\"noopener noreferrer\">simple\u00a0backup<\/a>, and an effective <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">disaster recovery plan<\/a>. Our posts walk you through those tools and why they&#8217;re effective.<\/li>\n<\/ol>\n<p>I hope these resources help you arm yourself in preventing ransomware from affecting you. It takes the power of information and a strong will to fight cybercriminals. They\u2019re relying on you and your employees to be tricked into clicking malicious links or believing you won&#8217;t\u00a0be a victim. Insider threats, accidental or malicious, pose a huge security risk to any organization and must be managed accordingly.<\/p>\n<p>It\u2019s a continually evolving world where criminals adapt faster than security experts can keep up. Make sure you\u2019re doing everything you can to protect your network and be ready for the inevitable attacks upon it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015. It affects individuals, nonprofits and enterprises alike, but it&#8217;s is particularly fond of the healthcare industry because of the value of patient data and the criticality of hospitals. To help the healthcare IT industry (and others) learn more about ransomware, I\u2019ve compiled a list of the most informational articles on the web to date. Health and Human Services Department fact sheet on ransomware: This brief guidance issued by the HHS in July 2016 specifically addresses ransomware and HIPAA, the standard all healthcare entities and their business associates\u00a0must adhere to. It addresses HIPAA guidelines as they pertain to preventing and handling a ransomware attack, as well whether an attack constitutes a reportable data breach. There has been some confusion over what that part of the HHS guidance really means, so Palo Alto Networks has published a helpful guide to the HHS bulletin. Ransomware and Businesses 2016 special report: This white paper from Symantec is long (30 pages) but chock full of valuable information about ransomware and worth the read. It discusses all things ransomware and enterprise, including how ransomware can&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3193","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The 6 best ransomware resources on the web | OTAVA<\/title>\n<meta name=\"description\" content=\"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 6 best ransomware resources on the web\" \/>\n<meta property=\"og:description\" content=\"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"The 6 best ransomware resources on the web\",\"datePublished\":\"2017-03-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\"},\"wordCount\":835,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\",\"url\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\",\"name\":\"The 6 best ransomware resources on the web | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\",\"datePublished\":\"2017-03-22T00:00:00+00:00\",\"description\":\"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 6 best ransomware resources on the web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The 6 best ransomware resources on the web | OTAVA","description":"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/","og_locale":"en_US","og_type":"article","og_title":"The 6 best ransomware resources on the web","og_description":"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.","og_url":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/","og_site_name":"OTAVA","article_published_time":"2017-03-22T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"The 6 best ransomware resources on the web","datePublished":"2017-03-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/"},"wordCount":835,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/","url":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/","name":"The 6 best ransomware resources on the web | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg","datePublished":"2017-03-22T00:00:00+00:00","description":"Ransomware has exploded in popularity during the past two years, with the number of identified families growing 400 percent since 2015.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-data-03.17.17.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/the-best-ransomware-articles-on-the-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"The 6 best ransomware resources on the web"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3193"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3193\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3193"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}