{"id":106117,"date":"2022-07-07T09:00:40","date_gmt":"2022-07-07T16:00:40","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=106117"},"modified":"2025-12-14T15:29:50","modified_gmt":"2025-12-14T23:29:50","slug":"ransomware-takeaways-from-q2-2022","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/","title":{"rendered":"Ransomware Takeaways From Q2 2022"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-106124\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png\" alt=\"\" width=\"1440\" height=\"820\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways-768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways-560x319.png 560w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p id=\"bzdropcap\">When you\u2019re responsible for protecting your company\u2019s data from ransomware, you don\u2019t need to be convinced of the risks an attack poses. Staying up to date on the latest ransomware trends is probably high on your radar. But sometimes it\u2019s not as easy to convince others in your organization to take the necessary precautions. Protecting your data from ransomware might require operational changes and investments, and that can be hard to advance, especially when headlines report that <a href=\"https:\/\/www.washingtonpost.com\/technology\/2022\/02\/28\/internet-war-cyber-russia-ukraine\/\" target=\"_blank\" rel=\"noopener\">dire predictions haven\u2019t come true<\/a>.<\/p>\n<p>To help you stay up to date and inform others in your organization of the latest threats and what you can do about them, we put together five quick, timely, shareable takeaways from our monitoring over Q2 2022.<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<p>This post is a part of our ongoing series on ransomware. Take a look at our other posts for more information on how businesses can defend themselves against a ransomware attack, and more.<\/p>\n<ul>\n<li><a href=\"\/blog\/complete-guide-ransomware\/\" target=\"_blank\" rel=\"noopener\">\u201cRansomware: How to Prevent or Recover From an Attack\u201d<\/a><\/li>\n<li><a href=\"\/blog\/ransomware-economy\/\" target=\"_blank\" rel=\"noopener\">&#8220;Introducing the Ransomware Economy&#8221;<\/a><\/li>\n<li><a href=\"\/blog\/object-lock-101-protecting-data-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">\u201cObject Lock 101: Protecting Data From Ransomware\u201d<\/a><\/li>\n<li><a href=\"\/blog\/the-true-cost-of-ransomware\/\" target=\"_blank\" rel=\"noopener\">&#8220;The True Cost of Ransomware&#8221;<\/a><\/li>\n<li>2021 Ransomware Takeaways: <a href=\"\/blog\/ransomware-takeaways-2021-to-date\/\" target=\"_blank\" rel=\"noopener\">Q1<\/a>, <a href=\"\/blog\/ransomware-takeaways-q2-2021\/\" target=\"_blank\" rel=\"noopener\">Q2<\/a>, <a href=\"\/blog\/ransomware-takeaways-q3-2021\/\" target=\"_blank\" rel=\"noopener\">Q3<\/a>, <a href=\"\/blog\/ransomware-takeaways-from-q4-2021\/\" target=\"_blank\" rel=\"noopener\">Q4<\/a><\/li>\n<li>2022 Ransomware Takeaways: <a href=\"\/blog\/ransomware-takeaways-from-q1-2022\/\" target=\"_blank\" rel=\"noopener\">Q1<\/a><\/li>\n<\/ul>\n<\/div>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-bcb54d8e-f8c9-4feb-b802-5dfd0042e420\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-bcb54d8e-f8c9-4feb-b802-5dfd0042e420\" class=\"hs-cta-node hs-cta-bcb54d8e-f8c9-4feb-b802-5dfd0042e420\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2832298\/bcb54d8e-f8c9-4feb-b802-5dfd0042e420\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"hs-cta-img-bcb54d8e-f8c9-4feb-b802-5dfd0042e420\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2832298\/bcb54d8e-f8c9-4feb-b802-5dfd0042e420.png\" alt=\"\u2794 Download The Complete Guide to Ransomware E-book\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(2832298, 'bcb54d8e-f8c9-4feb-b802-5dfd0042e420', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>1. Sanctions Are Changing the Ransomware Game<\/h2>\n<p>Things have been somewhat quieter on the ransomware front, and many security experts point out that the <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-has-gone-down-because-sanctions-against-russia-are-making-life-harder-for-attackers\/\" target=\"_blank\" rel=\"noopener\">sanctions<\/a> against Russia have made it harder for cybercriminals to ply their trade. The sanctions make it harder to receive payments, move money around, and provision infrastructure. As such, The Wall Street Journal <a href=\"https:\/\/www.wsj.com\/articles\/russia-linked-ransomware-groups-are-changing-tactics-to-dodge-crackdowns-11654178400\" target=\"_blank\" rel=\"noopener\">reported<\/a> that the <a href=\"\/blog\/ransomware-economy\/\" target=\"_blank\" rel=\"noopener\">ransomware economy<\/a> in Russia is changing. Groups are reorganizing, splintering off into smaller gangs, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/evil-corp-switches-to-lockbit-ransomware-to-evade-sanctions\/\" target=\"_blank\" rel=\"noopener\">changing up the software they use<\/a> to avoid detection.<\/p>\n<p><strong>Key Takeaway:<\/strong> Cybercriminals are working harder to avoid revealing their identities, making it challenging for victims to know whether they\u2019re dealing with a sanctioned entity or not. Especially at a time when the federal government is cracking down on companies that violate sanctions, the best fix is to put an ironclad sanctions compliance program in place before you\u2019re asked about it.<\/p>\n<h2>2. AI-powered Ransomware Is Coming<\/h2>\n<p>The idea of AI-powered ransomware is not new, but we\u2019ve seen predictions in Q2 that it\u2019s closer to reality than we might think. To date, the AI advantage in the ransomware wars has fallen squarely on the defense. Security firms employ top talent to automate ransomware detection and prevention.<\/p>\n<p>Meanwhile, ransomware profits have escalated in recent years. Chainalysis, a firm that analyzes crypto payments, <a href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> ransomware payments in excess of $692 million in 2020 and $602 million in 2021 (which they expect to continue to go up with further analysis), up from just $152 million in 2019. With business booming, some security experts warn that, while cybercrime syndicates haven\u2019t been able to afford developer talent to build AI capabilities yet, <a href=\"https:\/\/www.protocol.com\/enterprise\/ai-ml-ransomware-cyberattacks-automation\" target=\"_blank\" rel=\"noopener\">that might not be the case for long<\/a>.<\/p>\n<p>They predict that, in the coming 12 to 24 months, ransomware groups could start employing AI capabilities to get more efficient in their ability to target a broader swath of companies and even individuals\u2014small game for cybercriminals at the moment but not with the power of machine learning and automation on hand.<\/p>\n<p><strong>Key Takeaway:<\/strong> Small to medium-sized enterprises can take simple steps now to prevent future \u201cspray and pray\u201d style attacks. It may seem too easy, but fundamental steps like staying up to date on security patches and implementing multi-factor authentication can make a big difference in keeping your company safe.<\/p>\n<h2>3. Conti Ransomware Group Still In Business<\/h2>\n<p>In <a href=\"\/blog\/ransomware-takeaways-from-q1-2022\/\" target=\"_blank\" rel=\"noopener\">Q1<\/a>, we reported that the ransomware group Conti suffered a data leak after pledging allegiance to Russia in the wake of the Ukraine invasion. Despite the leak, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-conti-gang-is-still-in-business-despite-its-own-massive-data-leak\/\" target=\"_blank\" rel=\"noopener\">business seems to be trucking along<\/a> over at Conti HQ. Despite suffering a leak of its own sensitive data, Conti doesn\u2019t seem to have learned a lesson. The group continues threatening to publish stolen data in return for encryption keys\u2014a hallmark of the group\u2019s tactics.<\/p>\n<p><strong>Key Takeaway:<\/strong> As detailed in <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-conti-gang-is-still-in-business-despite-its-own-massive-data-leak\/\" target=\"_blank\" rel=\"noopener\">ZDnet<\/a>, Conti tends to exploit unpatched vulnerabilities, so, again, staying up to date on security patches is advised, as is ramping up monitoring of your networks for suspicious activity.<\/p>\n<h2>4. Two-thirds of Victims Paid Ransoms Last Year<\/h2>\n<p><a href=\"https:\/\/cyber-edge.com\/cdr\/\" target=\"_blank\" rel=\"noopener\">New analyses<\/a> that came out in Q2 from CyberEdge group, covering the span of 2021 overall, found that two-thirds of ransomware victims paid ransoms in 2021. The firm surveyed 1,200 IT security professionals, and found three reasons why firms choose to make the payments:<\/p>\n<ol>\n<li>Concerns about exfiltrated data getting out.<\/li>\n<li>Increased confidence they\u2019ll be able to recover their data.<\/li>\n<li>Decreasing cost of recoveries.<\/li>\n<\/ol>\n<p>When recoveries are easier, more firms are opting just to pay the attackers to go away, avoid downtime, and recover from some mix of backups and unencrypted data.<\/p>\n<p><strong>Key Takeaway:<\/strong> While we certainly don\u2019t advocate for paying ransoms, having a robust <a href=\"\/blog\/disaster-recovery-with-a-single-command\/\" target=\"_blank\" rel=\"noopener\">disaster recovery plan<\/a> in place can help you survive an attack and even avoid paying the ransom altogether.<\/p>\n<h2>5. Hacktivism Is on the Rise<\/h2>\n<p>With as much doom and gloom as we cover in the ransomware space, it seems hacking for a good cause is on the rise. CloudSEK, an AI firm, <a href=\"https:\/\/cloudsek.com\/threatintelligence\/goodwill-ransomware-forces-victims-to-donate-to-the-poor-and-provides-financial-assistance-to-patients-in-need\/\" target=\"_blank\" rel=\"noopener\">profiled the hacking group GoodWill\u2019s efforts<\/a> to force\u2026well, some goodwill. Instead of astronomical payments in return for decryption keys, GoodWill simply asks that victims do some good in the world. One request: \u201cTake any five less fortunate children to Pizza Hut or KFC for a treat, take pictures and videos, and post them on social media.\u201d<\/p>\n<p><strong>Key Takeaway:<\/strong> While the hacktivists seem to have good intentions at heart, is it truly goodwill if it\u2019s coerced with your company\u2019s data held hostage? If you\u2019ve been paying attention, you have a strong disaster recovery plan in place, and you can restore from backups in any situation. Then, consider their efforts a good reminder to revisit your corporate social responsibility program as well.<\/p>\n<h2>The Bottom Line: What This Means for You<\/h2>\n<p>Ransomware gangs are always changing tactics, and even more so in the wake of stricter sanctions. That, combined with the potential emergence of AI-powered ransomware means a wider range of businesses could be targets in the coming months and years. As noted above, applying good security practices and developing a disaster recovery plan are excellent steps towards becoming more resilient as tactics change. And the good news, at least for now, is that not all hackers are forces for evil even if some of their tactics to spread goodwill are a bit brutish.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read the latest trends and news in ransomware from Q2 2022.<\/p>\n","protected":false},"author":157,"featured_media":106124,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[468],"class_list":["post-106117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Ransomware Trends and Takeaways From Our Q2 2022 Report<\/title>\n<meta name=\"description\" content=\"Stay informed on ransomware trends with five key takeaways to protect your organization\u2019s data and enhance your cybersecurity measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Ransomware Trends and Takeaways From Our Q2 2022 Report\" \/>\n<meta property=\"og:description\" content=\"Stay informed on ransomware trends with five key takeaways to protect your organization\u2019s data and enhance your cybersecurity measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T16:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-14T23:29:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeremy Milk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Milk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Ransomware Trends and Takeaways From Our Q2 2022 Report","description":"Stay informed on ransomware trends with five key takeaways to protect your organization\u2019s data and enhance your cybersecurity measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/","og_locale":"en_US","og_type":"article","og_title":"Key Ransomware Trends and Takeaways From Our Q2 2022 Report","og_description":"Stay informed on ransomware trends with five key takeaways to protect your organization\u2019s data and enhance your cybersecurity measures.","og_url":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2022-07-07T16:00:40+00:00","article_modified_time":"2025-12-14T23:29:50+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","type":"image\/png"}],"author":"Jeremy Milk","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Jeremy Milk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/"},"author":{"name":"Jeremy Milk","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/37a379303af13f87deb643d2c512675c"},"headline":"Ransomware Takeaways From Q2 2022","datePublished":"2022-07-07T16:00:40+00:00","dateModified":"2025-12-14T23:29:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/"},"wordCount":1072,"commentCount":2,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","keywords":["B2Cloud"],"articleSection":["Cloud Storage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/","url":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/","name":"Key Ransomware Trends and Takeaways From Our Q2 2022 Report","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","datePublished":"2022-07-07T16:00:40+00:00","dateModified":"2025-12-14T23:29:50+00:00","description":"Stay informed on ransomware trends with five key takeaways to protect your organization\u2019s data and enhance your cybersecurity measures.","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","width":1440,"height":820},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q2-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Takeaways From Q2 2022"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/37a379303af13f87deb643d2c512675c","name":"Jeremy Milk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","caption":"Jeremy Milk"},"description":"Jeremy Milk is a storybuilder who heads the Backblaze Product Marketing team. He's spent more than two decades honing his craft in product and consumer goods marketing leadership roles at companies including Intuit, WePay (acquired by JPMorgan Chase), and The Clorox Company. Outside the office, he can often be found near a soccer field, on a running trail, or fueling on coffee and tacos. Follow him on LinkedIn or Twitter.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/jeremy\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/bb-bh-Q2-2022-Ransomware-Takeaways.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/106117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=106117"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/106117\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/106124"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=106117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=106117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=106117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}