{"id":107065,"date":"2022-10-21T09:06:41","date_gmt":"2022-10-21T16:06:41","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=107065"},"modified":"2025-12-14T15:30:13","modified_gmt":"2025-12-14T23:30:13","slug":"ransomware-takeaways-from-q3-2022","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/","title":{"rendered":"Ransomware Takeaways From Q3 2022"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107073 size-full\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png\" alt=\"\" width=\"1440\" height=\"820\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842-768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842-560x319.png 560w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p id=\"bzdropcap\">No matter which way war, the global economy, or superstorms are headed, one thing remains constant: ransomware threats continue to persist and evolve. That&#8217;s not new information, of course, but understanding the sophistication of emerging attacks is useful for anyone responsible for defending vulnerable infrastructure. Cybercriminals continue to target more industries such as healthcare and education that might not be as well-equipped to defend themselves. New strategies have allowed them to do more damage.<\/p>\n<p>The landscape continues to change, but staying informed is one of the best ways to protect your organization against the ever-present threat of ransomware. It\u2019s no substitute for comprehensive training for your team and a <a href=\"https:\/\/help.backblaze.com\/hc\/en-us\/articles\/360052973274-Object-Lock-FAQs\" target=\"_blank\" rel=\"noopener\">safely object-locked backup solution<\/a>, but it never hurts to know too much. Here are a few of the biggest stories in ransomware from Q3.<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<p>This post is a part of our ongoing series on ransomware. Take a look at our other posts for more information on how businesses can defend themselves against a ransomware attack, and more.<\/p>\n<ul>\n<li><a href=\"\/blog\/complete-guide-ransomware\/\" target=\"_blank\" rel=\"noopener\">\u201cRansomware: How to Prevent or Recover From an Attack&#8221;<\/a><\/li>\n<li><a href=\"\/blog\/ransomware-economy\/\" target=\"_blank\" rel=\"noopener\">\u201cIntroducing the Ransomware Economy\u201d<\/a><\/li>\n<li><a href=\"\/blog\/object-lock-101-protecting-data-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">\u201cObject Lock 101: Protecting Data From Ransomware\u201d<\/a><\/li>\n<li><a href=\"\/blog\/the-true-cost-of-ransomware\/\" target=\"_blank\" rel=\"noopener\">&#8220;The True Cost of Ransomware&#8221;<\/a><\/li>\n<li>2021 Ransomware Takeaways: <a href=\"\/blog\/ransomware-takeaways-2021-to-date\/\" target=\"_blank\" rel=\"noopener\">Q1<\/a>, <a href=\"\/blog\/ransomware-takeaways-q2-2021\/\" target=\"_blank\" rel=\"noopener\">Q2<\/a>, <a href=\"\/blog\/ransomware-takeaways-q3-2021\/\" target=\"_blank\" rel=\"noopener\">Q3<\/a>, <a href=\"\/blog\/ransomware-takeaways-from-q4-2021\/\" target=\"_blank\" rel=\"noopener\">Q4<\/a><\/li>\n<li>2022 Ransomware Takeaways: <a href=\"\/blog\/ransomware-takeaways-from-q1-2022\/\" target=\"_blank\" rel=\"noopener\">Q1<\/a>, <a href=\"\/blog\/ransomware-takeaways-from-q2-2022\/\" target=\"_blank\" rel=\"noopener\">Q2<\/a><\/li>\n<\/ul>\n<\/div>\n<p><span id=\"hs-cta-wrapper-907e1e54-cf11-453f-9eee-4b8f02745211\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-907e1e54-cf11-453f-9eee-4b8f02745211\" class=\"hs-cta-node hs-cta-907e1e54-cf11-453f-9eee-4b8f02745211\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2832298\/907e1e54-cf11-453f-9eee-4b8f02745211\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"hs-cta-img-907e1e54-cf11-453f-9eee-4b8f02745211\" class=\"hs-cta-img aligncenter\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2832298\/907e1e54-cf11-453f-9eee-4b8f02745211.png\" alt=\"\u2794 Download The Complete Guide to Ransomware\" \/><\/a><\/span><\/span><\/p>\n<h2>1. Threats to \u201cSoft Targets\u201d Are Growing<\/h2>\n<p>With businesses ramping up their ransomware protection, cybercriminals have begun shifting toward more so-called \u201csoft targets\u201d including hospitals and small municipal governments. This has proven dangerous, as not only do these targets have fewer resources to devote to cybersecurity, but a compromise of their systems can lead to real-world disaster.<\/p>\n<p>Three different hospitals around the country\u2014CHI Memorial Hospital in Tennessee, hospitals in the St. Luke\u2019s system within Texas, and Virginia Mason Franciscan Health in Seattle\u2014were all recently <a href=\"https:\/\/www.nbcnews.com\/news\/amp\/rcna50919\" target=\"_blank\" rel=\"noopener\">hit with ransomware attacks<\/a>, causing widespread delays in patient care. This has become a sadly common story, as attacks continue on healthcare targets.<\/p>\n<p>Ransomware groups have increasingly been targeting school systems as well. One such group, The Vice Society, were recently the subject of an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warns-of-vice-society-ransomware-attacks-on-school-districts\/\" target=\"_blank\" rel=\"noopener\">FBI warning<\/a>, identifying their activity as \u201cdisproportionately targeting the education sector\u201d and that those attacks against school districts \u201cmay increase as the 2022\/2023 school year begins and criminal ransomware groups perceive opportunities for successful attacks.&#8221;<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\"><strong>Key Takeaway:<\/strong> No vertical is safe from the threat of ransomware, but the rise of these threats has led to greater protections specifically for soft target sectors. Cybersecurity and Infrastructure Security Agency (CISA) has provided a <a href=\"https:\/\/www.cisa.gov\/stopransomware\/ransomware-reference-materials-k-12-school-and-school-district-it-staff\" target=\"_blank\" rel=\"noopener\">wealth of tools<\/a> for education, and companies have begun pivoting to create <a href=\"\/blog\/backblaze-and-carahsoft-help-public-sector-cios-optimize-cloud-spend\/\" target=\"_blank\" rel=\"noopener\">budget-friendly options<\/a> for cash-strapped public sector CIOs.<\/div>\n<h2>2. Ransomware Gangs May Now Be Deploying \u201cTriple Extortion\u201d<\/h2>\n<p>This past quarter saw several high-profile attacks against larger businesses, including <a href=\"https:\/\/www.crn.com.au\/news\/yanluowang-ransomware-gang-posts-stolen-cisco-data-online-585143\" target=\"_blank\" rel=\"noopener\">Cisco<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/uber-links-breach-to-lapsus-group-blames-contractor-for-hack\/\" target=\"_blank\" rel=\"noopener\">Uber<\/a>, and <a href=\"https:\/\/www.ign.com\/articles\/grand-theft-auto-6-leaks-everything-thats-happened-so-far\" target=\"_blank\" rel=\"noopener\">Rockstar Games<\/a>, but it also saw signs that the ongoing war between black hat and white hat hackers may be entering a new realm.<\/p>\n<p>In June, LockBit Ransomware was able to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-claims-ransomware-attack-on-security-giant-entrust-leaks-data\/\" target=\"_blank\" rel=\"noopener\">infect systems at Entrust<\/a>, giving the ransomware gang access to nearly 300GB of data which they threatened to publish if their demands were not met. Entrust did not pay the ransom, and while the company did not claim credit for it, someone shortly after launched a DDoS attack against the site that LockBit was going to use to publish the data.<\/p>\n<p>In retaliation, the Lockbit ransomware gang began actively recruiting DDoSers to begin executing a \u201c<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-gang-gets-aggressive-with-triple-extortion-tactic\/\" target=\"_blank\" rel=\"noopener\">triple extortion<\/a>\u201d tactic, layering the possibility of a DDoS attack on top of attacks via ransomware. In a post to a popular forum for black hat hackers, LockBit\u2019s public face LockBitSupp wrote, \u201chave felt the power of dudos [DDoS] and how it invigorates and makes life more interesting.\u201d<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\"><strong>Key Takeaway:<\/strong> Time and time again we see hackers creating new tactics, and simple non-negotiation doesn&#8217;t protect your business or solve for operational downtime. We&#8217;ve seen that paying ransoms doesn&#8217;t stop attacks, and engaging in counterattacks rarely has the desired outcome. Strong defensive strategies, like object lock capability, can&#8217;t block cybercriminals from accessing and publishing information, but it does ensure that you have everything you need to bring your business back online as quickly as possible.<\/div>\n<h2>3. The Geopolitical Landscape is Impacting Cybercrime<\/h2>\n<p>The Council on Foreign Relations recently released <a href=\"https:\/\/www.cfr.org\/report\/confronting-reality-in-cyberspace\" target=\"_blank\" rel=\"noopener\">a bombshell report<\/a> titled, \u201cConfronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet\u201d that outlined the extent to which state-sponsored hackers have begun undermining American sovereignty through attacks. This dovetails with recent reports of the information wars between Russia and Ukraine spilling out beyond the battlefield. A <a href=\"https:\/\/www.wired.com\/story\/russia-hacking-xaknet-killnet\/\" target=\"_blank\" rel=\"noopener\">report from Wired<\/a> showed how pro-Russia group Killnet has launched cyberattacks against 10 different countries for supporting Ukraine.<\/p>\n<p>This isn\u2019t necessarily new information: the <a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/2020_10_06_homeland-threat-assessment.pdf\" target=\"_blank\" rel=\"noopener\">2020 Homeland Security Threat Assessment<\/a> calls out several nations, including Russia, China, North Korea, and Iran, as likely to employ cybersecurity attacks against the U.S. What is new is that the Senate voted <a href=\"http:\/\/energy.gov\/articles\/doe-announces-45-million-next-generation-cyber-tools-protect-power-grid\" target=\"_blank\" rel=\"noopener\">$45 million in support of cybertools<\/a> that are specifically earmarked to protect the U.S. power grid. Some groups\u2014including the U.S. Government Accountability Office\u2014<a href=\"https:\/\/www.gao.gov\/products\/gao-21-81\" target=\"_blank\" rel=\"noopener\">don\u2019t think that we\u2019re doing enough<\/a>. The impact here is that we\u2019re not just talking about ransomware attacks exposing private data; we\u2019ve evaluated as likely, and have started protecting ourselves against, attacks that will functionally shut down basic utilities.<\/p>\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\"><strong>Key Takeaway:<\/strong> As the lines blur between malicious hacking and state-sponsored attacks, the sophistication of the threats faced by most businesses and individuals will only grow. New laws and policies may eventually emerge to combat this trend, but until then it will be on you to ensure your infrastructure is safe.<\/div>\n<h2>The Bottom Line<\/h2>\n<p>The threat of cybercrime will only continue to expand in coming years. No matter what industry you\u2019re in or what size organization\u2019s infrastructure you have been tasked with protecting, continuous vigilance is crucial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are on the rise. Read more about recent trends and cyberattacks. <\/p>\n","protected":false},"author":157,"featured_media":107073,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7,475],"tags":[468],"class_list":["post-107065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","category-ransomware","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Ransomware Trends and Takeaways From Our Q3 2022 Report<\/title>\n<meta name=\"description\" content=\"Ransomware attacks are on the rise. Read more about recent trends and cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Ransomware Trends and Takeaways From Our Q3 2022 Report\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are on the rise. Read more about recent trends and cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T16:06:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-14T23:30:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeremy Milk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Milk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Ransomware Trends and Takeaways From Our Q3 2022 Report","description":"Ransomware attacks are on the rise. Read more about recent trends and cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/","og_locale":"en_US","og_type":"article","og_title":"Key Ransomware Trends and Takeaways From Our Q3 2022 Report","og_description":"Ransomware attacks are on the rise. Read more about recent trends and cyberattacks.","og_url":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2022-10-21T16:06:41+00:00","article_modified_time":"2025-12-14T23:30:13+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","type":"image\/png"}],"author":"Jeremy Milk","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Jeremy Milk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/"},"author":{"name":"Jeremy Milk","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/37a379303af13f87deb643d2c512675c"},"headline":"Ransomware Takeaways From Q3 2022","datePublished":"2022-10-21T16:06:41+00:00","dateModified":"2025-12-14T23:30:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/"},"wordCount":958,"commentCount":2,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","keywords":["B2Cloud"],"articleSection":["Cloud Storage","Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/","url":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/","name":"Key Ransomware Trends and Takeaways From Our Q3 2022 Report","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","datePublished":"2022-10-21T16:06:41+00:00","dateModified":"2025-12-14T23:30:13+00:00","description":"Ransomware attacks are on the rise. Read more about recent trends and cyberattacks.","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","width":1440,"height":820},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/ransomware-takeaways-from-q3-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Takeaways From Q3 2022"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/37a379303af13f87deb643d2c512675c","name":"Jeremy Milk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2020\/10\/IMG_20200218_083152-150x150.jpg","caption":"Jeremy Milk"},"description":"Jeremy Milk is a storybuilder who heads the Backblaze Product Marketing team. He's spent more than two decades honing his craft in product and consumer goods marketing leadership roles at companies including Intuit, WePay (acquired by JPMorgan Chase), and The Clorox Company. Outside the office, he can often be found near a soccer field, on a running trail, or fueling on coffee and tacos. Follow him on LinkedIn or Twitter.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/jeremy\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/bb-bh-Q3-Ransomware-Takeaways-e1666366549842.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/107065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=107065"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/107065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/107073"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=107065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=107065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=107065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}