{"id":1532,"date":"2022-12-06T22:16:00","date_gmt":"2022-12-06T22:16:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/rackspace-ransomware-attack\/"},"modified":"2023-05-15T17:26:43","modified_gmt":"2023-05-15T17:26:43","slug":"rackspace-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/","title":{"rendered":"What to do in the wake of the Rackspace Exchannge Incident"},"content":{"rendered":"<p>Ransomware attack reveals the need for a response plan.<\/p>\n<p>Rackspace, one of the leading remaining providers of Hosted Exchange, experienced an outage beginning December 2, 2022, declared it a security incident on December 3, and has been encouraging customers to move to Exchange Online from Microsoft. On the morning of December 6, Rackspace acknowledged that the incident was related to ransomware.<\/p>\n<p>For every professional responsible for ensuring critical cloud infrastructure availability, this is an opportunity to evaluate the use of legacy hosting and to beef up incident response (IR) and disaster recovery (DR) plans to be prepared for potential outages or incidents.<\/p>\n<p>Your IR and DR plans should include scenarios in which your cloud provider is unavailable. Incidents and outages of this magnitude are exceedingly rare and unlikely for hyperscalers like Microsoft and Amazon Web Services, but that doesn\u2019t mean they are immune from them. Preparations are crucial for even minor outages and incidents, such as normal service interruptions or local compromise of your own tenant.<\/p>\n<h2>Questions to Consider for Your DR and IR Plans<\/h2>\n<p>These questions can help jumpstart your DR and IR thinking and planning:<\/p>\n<ul>\n<li>What critical applications and services are running on which cloud or clouds? (In the case of Rackspace, email was down, which dealt a crushing blow to organizations hosted on HEX, not just for communications but also the files shared via email.)<\/li>\n<li>How are you backing up your critical data?<\/li>\n<li>How do you restore it?<\/li>\n<li>How much downtime can the company survive?<\/li>\n<li>How much downtime do you tolerate before enacting a disaster recovery process?<\/li>\n<li>Who is your backup provider going to be?<\/li>\n<li>How are you going to get critical data into that backup provider?<\/li>\n<li>How are you going to get users up and running?<\/li>\n<li>How are you (the IT administrators and incident responders) going to communicate if your primary communication tools are compromised or unavailable?<\/li>\n<\/ul>\n<p>Once the proposed answers have been addressed in your DR and IR plans, test your plans. Practice pulling data from your backup provider and importing it into test accounts. Test your backup communication lines, and make sure the new systems will perform in a way that enables the business to keep moving forward.<\/p>\n<p>Even if you\u2019re in the cloud, you still need backup. Most small and medium-sized businesses (SMBs) and large enterprises leverage Microsoft 365 for their communications, collaboration, and security. However, third-party backups, at a minimum, are non-negotiable. Data needs to be in more than one place, always.<\/p>\n<h2>Key Cybersecurity Considerations<\/h2>\n<p>From the outside, it\u2019s impossible to know the full extent of the Rackspace security incident. Given the available communications from the company and the nature of the incident, I would make the following assumptions and recommendations:<\/p>\n<ul>\n<li>There is no indication that data in the Rackspace environment is recoverable. Customers should be prepared to move forward without it. For those Rackspace customers using Outlook, Microsoft provides an option to <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/back-up-your-email-e5845b0b-1aeb-424f-924c-aa1c33b18833\" target=\"_blank\" rel=\"noopener\">export a PST file<\/a> of cached data. This likely won\u2019t be the entire mailbox, but it\u2019s better than nothing.<\/li>\n<li>It is likely that credentials used in the environment were compromised. Take an &#8220;assume compromise&#8221; approach, and any passwords used on Rackspace\u2019s environment should not be used anywhere else (this should also be passed down to all users).<\/li>\n<li>Take the same &#8220;assume compromise&#8221; approach when it comes to the data stored within that environment. There\u2019s no way of knowing exactly which data was or wasn\u2019t exfiltrated. As a result, you must assume all data in the Hosted Exchange environment is no longer confidential and take appropriate action.<\/li>\n<li>The directory data within the Exchange environment is also likely compromised. Depending on what was filled out, names and emails were likely taken, at a minimum. It\u2019s also possible that job titles, personal phone numbers, supervisory relationships, and other valuable intelligence were taken. Users should be hyper-vigilant for business email compromise, spear phishing, and other highly-targeted attacks.<\/li>\n<\/ul>\n<h2>Time to Modernize?<\/h2>\n<p>The Hosted Exchange model was the original &#8220;cloud business email&#8221; but has suffered from a lack of innovation in recent years. As demonstrated here, it doesn\u2019t provide a great level of isolation and is subject to total compromise.<\/p>\n<p>This incident might just be the &#8220;shot heard \u2018round the world&#8221; for legacy hosting, and it may be time to move to modern cloud-native environments like Microsoft 365.<\/p>\n<h2>How Can Pax8 Help?<\/h2>\n<p>Pax8 can assist in multiple ways. Your channel account manager and account team can help order the right licensing to get your clients moved to Microsoft as soon as possible.<\/p>\n<p>In addition, Pax8 Professional Services is offering an emergency tenant setup service at <strong>no cost to partners impacted by this incident<\/strong> through December 31, 2022, and can help get your clients set up on Microsoft 365. Schedule a call or reach out to your channel account manager for more information.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attack reveals the need for a response plan. Rackspace, one of the leading remaining providers of Hosted Exchange, experienced an outage beginning December 2, 2022, declared it a security incident on December 3, and has been encouraging customers to move to Exchange Online from Microsoft. On the morning of December 6, Rackspace acknowledged that [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":1533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2,17,4,7,5],"tags":[],"class_list":["post-1532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-management","category-continuity","category-msp","category-pax8-partners","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-06T22:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-15T17:26:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"What to do in the wake of the Rackspace Exchannge Incident\",\"datePublished\":\"2022-12-06T22:16:00+00:00\",\"dateModified\":\"2023-05-15T17:26:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/\"},\"wordCount\":812,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/red-risk-icon-on-grid.jpg\",\"articleSection\":[\"Business management\",\"Continuity\",\"MSPs\",\"Pax8 partners\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/\",\"name\":\"What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/red-risk-icon-on-grid.jpg\",\"datePublished\":\"2022-12-06T22:16:00+00:00\",\"dateModified\":\"2023-05-15T17:26:43+00:00\",\"description\":\"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/red-risk-icon-on-grid.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/05\\\/red-risk-icon-on-grid.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/rackspace-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do in the wake of the Rackspace Exchannge Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog","description":"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog","og_description":"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.","og_url":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/","og_site_name":"Pax8 Blog","article_published_time":"2022-12-06T22:16:00+00:00","article_modified_time":"2023-05-15T17:26:43+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"What to do in the wake of the Rackspace Exchannge Incident","datePublished":"2022-12-06T22:16:00+00:00","dateModified":"2023-05-15T17:26:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/"},"wordCount":812,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg","articleSection":["Business management","Continuity","MSPs","Pax8 partners","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/","url":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/","name":"What to do in the wake of the Rackspace Exchannge Incident - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg","datePublished":"2022-12-06T22:16:00+00:00","dateModified":"2023-05-15T17:26:43+00:00","description":"Rackspace ransomware attack puts MSPs at risk. Here\u2019s what you need to know.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/05\/red-risk-icon-on-grid.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/rackspace-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What to do in the wake of the Rackspace Exchannge Incident"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1532"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/1533"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}