{"id":103785,"date":"2021-12-21T08:52:23","date_gmt":"2021-12-21T16:52:23","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=103785"},"modified":"2025-12-11T14:13:43","modified_gmt":"2025-12-11T22:13:43","slug":"testing-your-ransomware-readiness","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/","title":{"rendered":"Testing Your Ransomware Readiness"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-104490\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png\" alt=\"\" width=\"1440\" height=\"820\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1-768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1-560x319.png 560w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p id=\"bzdropcap\">Every eleven seconds. That\u2019s how frequently ransomware attacks were predicted to happen this year according to <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a>. And if <a href=\"https:\/\/www.fincen.gov\/news\/news-releases\/ransomware-trends-bank-secrecy-act-data-between-january-2021-and-june-2021\" target=\"_blank\" rel=\"noopener\">U.S. Treasury<\/a> predictions are correct, the payouts from those attacks will exceed a billion dollars by the end of the year.<\/p>\n<p>Despite taking steps to be better prepared, many companies still end up paying ransoms because the cost of extended downtime to restore from backups with limited resources exceeds the ransom demand. Even then, assuming the decryption key even works, there\u2019s no reason to assume threat actors won\u2019t make additional modifications, leave backdoors they can exploit again, or use exfiltrated data against you.<\/p>\n<p>But, you don\u2019t have to let that be your story. Today, we\u2019re explaining the reasons for testing your security stance, different testing strategies and best practices including penetration testing and recovery testing, and steps you can take to develop a testing protocol.<\/p>\n<p>Ransomware is on the rise. Level up your security practices along with it.<\/p>\n<div style=\"padding: 24px; border: 4px solid #eeeeee; border-radius: 12px; max-width: 88%; margin: 25px auto; box-shadow: #aaaaaa 10px 10px 5px; text-align: center;\"><strong><a href=\"https:\/\/hub.backblaze.com\/complete-guide-to-ransomware\" target=\"_blank\" rel=\"noopener\">Download The Complete Guide to Ransomware E-book<\/a><\/strong><\/div>\n<h2><strong>First, Implement a Strong Backup Practice<\/strong><\/h2>\n<p>Backups are a critical piece of your ransomware defense strategy. Before thinking about testing, take the time to shore up your ransomware defenses by implementing at least a <a href=\"\/blog\/the-3-2-1-backup-strategy\/\" target=\"_blank\" rel=\"noopener\">3-2-1 backup strategy<\/a>, if not a more comprehensive strategy like <a href=\"\/blog\/whats-the-diff-3-2-1-vs-3-2-1-1-0-vs-4-3-2\/\" target=\"_blank\" rel=\"noopener\">3-2-1-1-0 or 4-3-2<\/a>.<\/p>\n<p>If you\u2019re unfamiliar with these strategies, they advise keeping at least three copies of your data on two different media with <a href=\"https:\/\/www.backblaze.com\/cloud-storage\" target=\"_blank\" rel=\"noopener\">at least one off-site<\/a>. Strategies like 3-2-1-1-0 and 4-3-2 go a step further, advising you to keep a copy offline or protected by <a href=\"\/blog\/object-lock-101-protecting-data-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">Object Lock<\/a>, ensure your data has zero errors, and\/or keeping additional backup copies for good measure.<\/p>\n<h2><strong>Ransomware Readiness Resources<\/strong><\/h2>\n<p>The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), publishes a set of guidelines that support the development of secure information systems. These controls cover operational, technical, and management practices for information security teams, including:<\/p>\n<ul>\n<li>How to <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1800-25.pdf\" target=\"_blank\" rel=\"noopener\">identify and protect<\/a> assets against ransomware.<\/li>\n<li>How to <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1800-26.pdf\" target=\"_blank\" rel=\"noopener\">detect and respond<\/a> to ransomware incidents.<\/li>\n<li>Recommended <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2021\/NIST.IR.8374-draft.pdf\" target=\"_blank\" rel=\"noopener\">controls<\/a> to mitigate ransomware risk.<\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-184.pdf\" target=\"_blank\" rel=\"noopener\">Guidelines<\/a> for <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1800-11.pdf\" target=\"_blank\" rel=\"noopener\">cybersecurity event recovery<\/a>.<\/li>\n<\/ul>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<p><strong>What Is the National Cybersecurity Center of Excellence?<\/strong>NCCoE is a collaboration between industry organizations, government agencies, and academic institutions that work together to address the most important cybersecurity challenges facing businesses today. NCCoE develops modular, adaptable example cybersecurity solutions that demonstrate how to apply standards and best practices using commercially available technology.<\/p>\n<\/div>\n<p>The Cybersecurity and Infrastructure Agency (CISA) also offers a module, the <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2021\/06\/30\/cisas-cset-tool-sets-sights-ransomware-threat\" target=\"_blank\" rel=\"noopener\">Cybersecurity Evaluation Tool<\/a>, that guides network administrators through a process to evaluate the cybersecurity practices on their networks. When it comes to evaluating your cybersecurity defensive stance, these resources are a good place to start.<\/p>\n<h2><strong>Why Test Your Ransomware Defenses?<\/strong><\/h2>\n<p>Weathering a ransomware incident depends on how prepared you are before the attack. First, by establishing a solid backup strategy. Second, by analyzing your vulnerabilities in a penetration test. And third, by testing recovery procedures to prepare and familiarize your team with your defense systems and your recovery plans. While there are many, the biggest reasons for testing your ransomware defenses include:<\/p>\n<ol>\n<li><strong>Shifting threats:<\/strong> Cybersecurity threats are always evolving and changing. Regularly evaluating potential vulnerabilities and testing your recovery practices prepares you for unforeseen situations.<\/li>\n<li><strong>Compliance:<\/strong> Companies in certain industries are required to show proof of vulnerability assessments and recovery testing in order to comply with regulations.<\/li>\n<li><strong>Creating a culture of preparedness:<\/strong> Familiarizing your staff with testing and recovery procedures better prepares them if the real thing happens. In the moment, they\u2019ll know exactly what to do.<\/li>\n<li><strong>Prioritizing budgets:<\/strong> Identifying threats and potential vulnerabilities helps your team prioritize spending around the most mission critical efforts to protect your company.<\/li>\n<\/ol>\n<p>Maybe your backup system is functioning well, but the effort to test recovery scenarios or analyze your environment for vulnerabilities is lower priority than day-to-day demands. Or maybe you\u2019ve looked into vulnerability testing or recovery planning, but it\u2019s out of scope for your organization\u2014you may not need enterprise-scale solutions.<\/p>\n<p>Either way, if you need any more justification to implement a vulnerability testing program or recovery solution, look no further than the many companies scrambling to respond to the Log4j vulnerability. A security engineer from a major software company explained it well in a <a href=\"https:\/\/www.wired.com\/story\/log4j-flaw-hacking-internet\/\" target=\"_blank\" rel=\"noopener\">WIRED article<\/a>, \u201cSecurity-mature organizations will start trying to assess their exposure within hours of an exploit like this, but some organizations will take a few weeks, and some will never look at it.\u201d Any amount of time you can spend on preparation brings you that much closer to security maturity.<\/p>\n<h2><strong>Testing Your Cybersecurity Readiness<\/strong><\/h2>\n<p>Two security practices that security-mature organizations regularly undertake include penetration testing and disaster recovery testing. When thinking about your overall cybersecurity readiness, it helps to have an understanding of these key practices.<\/p>\n<h3><strong>What Is Penetration Testing?<\/strong><\/h3>\n<p>Penetration testing or pen testing is a broad term that covers many different levels of testing from phishing assessments, to vulnerability identification, to full on adversarial hacking simulations. Most organizations will choose to work with an outside consultant to conduct penetration testing and will scope out the depth and breadth of the testing procedures. Ideally, you want to work with someone with little or no knowledge of your systems so they can uncover vulnerabilities you might not see.<\/p>\n<p>Those vulnerabilities are the output of a pen test, and they help organizations identify and prioritize steps to address in order to implement security upgrades.<\/p>\n<h3><strong>What Is Disaster Recovery Testing?<\/strong><\/h3>\n<p>Disaster recovery testing involves going through a simulated recovery scenario to make sure you can recover quickly and completely from backups. In the event of a ransomware attack or identification of a breach, the last thing you want is chaos. Regularly testing your recovery protocols helps you and your team build familiarity with the procedures. If you ever are attacked by ransomware, you\u2019ll be much more comfortable knowing exactly what to do to bring your systems safely back up.<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<p><strong>Disaster Recovery With a Single Command<\/strong>If you\u2019re using Veeam to manage backups, you can use <a href=\"\/blog\/disaster-recovery-with-a-single-command\/\" target=\"_blank\" rel=\"noopener\">Backblaze Instant Recovery in Any Cloud<\/a> to quickly recover your systems without the overhead of an enterprise-scale solution. Instant Recovery in Any Cloud is an infrastructure as code package that makes ransomware recovery into a VMware\/Hyper-V based cloud easy to plan and execute. Read more <a href=\"\/blog\/disaster-recovery-with-a-single-command\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<\/div>\n<h3><strong>The Testing Process<\/strong><\/h3>\n<p>Whether you\u2019re approaching a pen test or a recovery test, the overall steps in the process are generally similar:<\/p>\n<ol>\n<li><strong>Design test objectives:<\/strong> Testing consumes time and resources, so it is essential to be thoughtful about what exactly you decide to test. If you are new to cybersecurity testing, you might find it helpful to start by running a simple small-scale test. At a minimum, define the business function you\u2019re testing, the test duration, test method, the test objective, and any secondary objectives.<\/li>\n<li><strong>Execute the test:<\/strong> Make early decisions about execution, including when you\u2019ll conduct the test, if the test will interrupt production, and whether you\u2019ll make employees aware of the test. There are pros and cons to most execution methods, so it really depends on your overall objectives.<\/li>\n<li><strong>Analyze test results:<\/strong> When analyzing test results, identify both technical issues and business impacts. Did the process substantially disrupt production resulting in extensive downtime? How can you work to minimize that business impact?<\/li>\n<li><strong>Implement continuous improvements:<\/strong> If you find gaps in your process during testing, celebrate that fact. You now know where you need to boost defenses or strengthen your recovery protocol before a real attack comes along. Generally speaking, focus your continuous improvement efforts on two principles: impact and likelihood. For example, a vulnerability capable of taking your payment system offline would have a high impact. If that vulnerability is also highly likely, addressing this issue may be a top priority.<\/li>\n<li><strong>Schedule the next test:<\/strong> In IT security, there is no such thing as \u201cdone\u201d because threats are constantly evolving. Tomorrow\u2019s threats may require different safeguards. That\u2019s why experts advise conducting annual testing of cybersecurity programs and recovery procedures as a starting point.<\/li>\n<\/ol>\n<h2><strong>You Can Reduce Your Security Risk<\/strong><\/h2>\n<p>By using regular testing and continuous improvement, you can reduce the likelihood of a severe IT security incident. Of course, there are other ways you can enhance your safeguards. If you\u2019re looking for more detailed information on ransomware and how to protect data, identify threats, and recover from an attack, download our <a href=\"https:\/\/hub.backblaze.com\/complete-guide-to-ransomware\" target=\"_blank\" rel=\"noopener\">Complete Guide to Ransomware<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this post to learn why you should test your ransomware defense strategy and ways you can develop a testing protocol.<\/p>\n","protected":false},"author":159,"featured_media":104490,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[475],"tags":[468],"class_list":["post-103785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Testing: How to Test Your Ransomware Readiness<\/title>\n<meta name=\"description\" content=\"Ransomware attacks happen astonishingly frequently in the United States. Are you really ready for a ransomware attack? Find out with this blog post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Testing: How to Test Your Ransomware Readiness\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks happen astonishingly frequently in the United States. Are you really ready for a ransomware attack? Find out with this blog post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-21T16:52:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T22:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Molly Clancy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Molly Clancy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Testing: How to Test Your Ransomware Readiness","description":"Ransomware attacks happen astonishingly frequently in the United States. Are you really ready for a ransomware attack? Find out with this blog post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Testing: How to Test Your Ransomware Readiness","og_description":"Ransomware attacks happen astonishingly frequently in the United States. Are you really ready for a ransomware attack? Find out with this blog post.","og_url":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2021-12-21T16:52:23+00:00","article_modified_time":"2025-12-11T22:13:43+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","type":"image\/png"}],"author":"Molly Clancy","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Molly Clancy","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/"},"author":{"name":"Molly Clancy","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/a92e54b3011e599a575611dbbb443b5c"},"headline":"Testing Your Ransomware Readiness","datePublished":"2021-12-21T16:52:23+00:00","dateModified":"2025-12-11T22:13:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/"},"wordCount":1423,"commentCount":0,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","keywords":["B2Cloud"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/","url":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/","name":"Ransomware Testing: How to Test Your Ransomware Readiness","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","datePublished":"2021-12-21T16:52:23+00:00","dateModified":"2025-12-11T22:13:43+00:00","description":"Ransomware attacks happen astonishingly frequently in the United States. Are you really ready for a ransomware attack? Find out with this blog post.","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","width":1440,"height":820},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/testing-your-ransomware-readiness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Testing Your Ransomware Readiness"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/a92e54b3011e599a575611dbbb443b5c","name":"Molly Clancy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/02\/ClancyMolly_Headshot_reduced-150x150.png","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/02\/ClancyMolly_Headshot_reduced-150x150.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/02\/ClancyMolly_Headshot_reduced-150x150.png","caption":"Molly Clancy"},"description":"Molly Clancy is a content writer who specializes in explaining tech concepts in an easy, approachable way. With more than 15 years of experience, she has a broad background in industries ranging from B2B tech to engineering to luxury travel. A deep curiosity drives her repeated success explaining what terms like OS kernel and preflight request mean so that anyone can understand them.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/molly\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/bb-bh-Testing-Your-Ransomware-Protection-1.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/103785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/159"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=103785"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/103785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/104490"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=103785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=103785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=103785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}