{"id":1417,"date":"2021-06-23T13:59:00","date_gmt":"2021-06-23T13:59:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/3-2-1-backup\/"},"modified":"2023-05-17T00:28:13","modified_gmt":"2023-05-17T00:28:13","slug":"3-2-1-backup","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/","title":{"rendered":"3-2-1 backup best practices"},"content":{"rendered":"<p>Help clients get started with data protection.<\/p>\n<p>From user error to ransomware to natural disasters, data is at risk for companies of every size. More than <a href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2022\/01\/21\/cybersecurity-in-2022--a-fresh-look-at-some-very-alarming-stats\/?sh=1230b99d6b61\" target=\"_blank\" rel=\"noopener\">43% of cyberattacks<\/a> were aimed at small businesses in 2021,\u00a0and 32% of all companies lose data in the cloud due to accidental or malicious deletion, hackers, and software issues.<\/p>\n<p><strong>These stats are all the more concerning when you learn that <\/strong><a href=\"https:\/\/www.securitymagazine.com\/articles\/92064-new-infrascale-research-indicates-more-than-1-in-5-smbs-lacks-proper-data-protection\" target=\"_blank\" rel=\"noopener\"><strong>21% of SMBs<\/strong><\/a><strong> do not have any data protection solutions in place!<\/strong> It&#8217;s critical to get your SMB clients started <em>somewhere<\/em> with a plan for data backup, storage, and recovery.<\/p>\n<p>One often-recommended rule of thumb for backup is known as the &#8220;3-2-1 backup rule,&#8221; which can be a great starting point for SMBs. It entails:<\/p>\n<p><strong>&#8211; 3<\/strong> copies of data<\/p>\n<p><strong>&#8211; 2 <\/strong>copies stored on different storage media\/devices<\/p>\n<p><strong>&#8211; 1<\/strong> copy stored offsite (in the modern digital age, this is recommended to be in the cloud)<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-4896 size-full\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1_Backup_Best_Practices_Blog_Article_Image-01.png\" alt=\"the 3-2-1 backup rule\" width=\"1001\" height=\"594\" \/><\/p>\n<p>This strategy provides broader data protection coverage through multiple layers of copies and locations. It can be quite simple in action \u2014 for example, you have a photo saved locally on your computer, that\u2019s backed up to an external hard drive you keep in your basement, and it also lives in the cloud on Google photos.<\/p>\n<p>Below we\u2019ll dive a little deeper into why the 3-2-1 backup strategy is a great method to protect data.<\/p>\n<h3>On-site vs. off-site<\/h3>\n<p>With the 3-2-1 backup rule, you have two copies of data on-site and one off-site. Why is it so important to cover both locations?<\/p>\n<p>The on-site copies provide speedy access to recover data \u2014 sort of like having liquid assets in your investment portfolio that can quickly be converted to cash when needed. This is important because every second of downtime costs business, so the faster you can restore data, the less impact you\u2019ll face.<\/p>\n<p>On the other hand, the off-site copy is one of the most crucial components of the 3-2-1 backup strategy because it provides the deepest layer of protection. There are many events that could potentially take out both of your on-site copies, which leaves your off-site copy as the last resort. Depending on the type of storage used, it might take some time to retrieve the off-site backup, but the key thing is that the data is there and can be restored.<\/p>\n<h3><\/h3>\n<h3>Redundancy<\/h3>\n<p>Why three copies of data? It\u2019s kind of like diversifying your investment portfolio to spread out your exposure risk. With three copies of data stored, you have less chance of wholesale data loss.<\/p>\n<p>Basically, you should consider \u2014 can a single event take out all of my data and backups at once? Whether it\u2019s a fire or flood in your office or an attacker in your network, there\u2019s always a chance you could lose both your primary and secondary local backups at the same time. That\u2019s why to cover all your bases you need truly redundant off-site storage in the cloud as well.<\/p>\n<h3>Why cloud backup?<\/h3>\n<p>Back when the 3-2-1 backup rule was first created, data backups were all physical. Your off-site backup would be actual tapes or disks that you would store in a geographically disparate location.<\/p>\n<p>These days, cloud backups are an easier way to achieve redundant off-site storage \u2014 and can often provide much faster access to data. Modern cloud backup solutions that offer frequent, automated backups and speedy restoration can help with two elements of business continuity planning known as RTO and RPO.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Recovery time objective (RTO): <\/strong>How long your business can tolerate downtime before facing consequences (e.g., lost sales, angry customers, etc.). This means that the faster you can access, retrieve, and restore data, the better.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Recovery point objective (RPO): <\/strong>How much data you can tolerate losing. This is measured in units of time back to the most recent backup. The more frequently you can backup data, the less you\u2019ll lose. If you backup hourly, at most you would lose an hour of data, whereas if you only backup monthly, you could potentially lose up to a month\u2019s worth of data.<\/p>\n<h2>3\u20262\u20261\u2026 Go!<\/h2>\n<p>The truth is, in today\u2019s threat-heavy cyber landscape, <a href=\"https:\/\/www.pax8.com\/blog\/how-to-sell-data-backup\/\" target=\"_blank\" rel=\"noopener\">data backup isn\u2019t optional anymore<\/a> for any business. As your clients\u2019 trusted tech advisor, it\u2019s up to you to help change their misconceptions about data loss and help them establish a foundational data protection strategy. For SMB clients, the 3-2-1 backup rule is a great starting point and an easy-to-remember best practice to help them better protect their data.<\/p>\n<p>However, there are a lot of backup solutions out there that all ultimately perform the same function \u2014 backing up data. Finding the right fit for your clients depends on factors unique to their business, such as their budget, downtime tolerance, and data volumes.<\/p>\n<p>Pax8 is here to help! Our continuity solution consultants can help you identify and layer solutions from top vendors to achieve the right data protection coverage for your stack. We\u2019ve also developed a library of resources such as the <em>MSP\u2019s Guide to Selling Backup<\/em>, a downtime calculator, ransomware infographic, and white-labeled sales fact sheet and slide deck \u2014 all designed to help you sell.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/marketplace\">Explore the Pax8 Marketplace<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Help clients get started with data protection. From user error to ransomware to natural disasters, data is at risk for companies of every size. More than 43% of cyberattacks were aimed at small businesses in 2021,\u00a0and 32% of all companies lose data in the cloud due to accidental or malicious deletion, hackers, and software issues. [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":220,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17],"tags":[],"class_list":["post-1417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-continuity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3-2-1 backup best practices - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3-2-1 backup best practices - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-23T13:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T00:28:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1597\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"3-2-1 backup best practices\",\"datePublished\":\"2021-06-23T13:59:00+00:00\",\"dateModified\":\"2023-05-17T00:28:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/\"},\"wordCount\":869,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/3-2-1-backup-rule-e1624384053637.png\",\"articleSection\":[\"Continuity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/\",\"name\":\"3-2-1 backup best practices - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/3-2-1-backup-rule-e1624384053637.png\",\"datePublished\":\"2021-06-23T13:59:00+00:00\",\"dateModified\":\"2023-05-17T00:28:13+00:00\",\"description\":\"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/3-2-1-backup-rule-e1624384053637.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/3-2-1-backup-rule-e1624384053637.png\",\"width\":1597,\"height\":910,\"caption\":\"3-2-1 backup rule\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/3-2-1-backup\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3-2-1 backup best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3-2-1 backup best practices - Pax8 Blog","description":"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/","og_locale":"en_US","og_type":"article","og_title":"3-2-1 backup best practices - Pax8 Blog","og_description":"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.","og_url":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/","og_site_name":"Pax8 Blog","article_published_time":"2021-06-23T13:59:00+00:00","article_modified_time":"2023-05-17T00:28:13+00:00","og_image":[{"width":1597,"height":910,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"3-2-1 backup best practices","datePublished":"2021-06-23T13:59:00+00:00","dateModified":"2023-05-17T00:28:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/"},"wordCount":869,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png","articleSection":["Continuity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/","url":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/","name":"3-2-1 backup best practices - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png","datePublished":"2021-06-23T13:59:00+00:00","dateModified":"2023-05-17T00:28:13+00:00","description":"Learn why the 3-2-1 backup strategy is a great rule of thumb to help SMB clients get started with data protection and how you can help them.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/3-2-1-backup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/3-2-1-backup-rule-e1624384053637.png","width":1597,"height":910,"caption":"3-2-1 backup rule"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/3-2-1-backup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"3-2-1 backup best practices"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1417"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1417\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/220"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}