{"id":1884,"date":"2017-03-21T12:45:37","date_gmt":"2017-03-21T16:45:37","guid":{"rendered":"http:\/\/www.produceinventory.com\/blog\/?p=1884"},"modified":"2017-03-21T12:45:37","modified_gmt":"2017-03-21T16:45:37","slug":"ransomware-secrets-small-businesses-keep-attacks-quiet","status":"publish","type":"post","link":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/","title":{"rendered":"Ransomware Secrets: Small businesses keep attacks quiet"},"content":{"rendered":"<p><a href=\"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1797\" src=\"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\" alt=\"cybercriminal\" width=\"300\" height=\"200\" \/><\/a>More and more companies are being threatened by cybercriminals using ransomware, a type of malicious software designed to hold a company&#8217;s data hostage until a sum of money is paid by its owner. Norman Guadagno published an insightful article on Carbonite discussing this alarming trend and the fact that nearly half the victims do not report the attacks.<\/p>\n<p>A recent survey by the Ponemon Institute reveals that many small and midsize businesses pay ransomware demands\u2014and then keep it a secret to avoid any negative publicity. The survey, sponsored by Carbonite, confirms widespread reports that SMBs are increasingly targeted by cybercriminals. It also shows that nearly half the victims do not report the attacks.<\/p>\n<p>The most common reason companies do not report ransomware attacks, according to the survey, is to avoid having the information made public. The survey focused on 618 respondents whose organizational roles require them to help contain ransomware. About half of the survey respondents had suffered a ransomware attack, and about half of the victims paid the ransom. The average amount of the ransom requests was $2,500. <a href=\"https:\/\/www.carbonite.com\/en\/cloud-backup\/business\/resources\/carbonite-blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/?utm_campaign=10539&amp;utm_source=smartbrief&amp;utm_medium=display&amp;utm_content=3027&amp;c3placement=3027\">Continue reading&#8230; <\/a><\/p>\n<p>If you want to learn more about systems and data protection and\/or disaster recovery <a href=\"http:\/\/www.produceinventory.com\/contact-us.html\">contact us<\/a> for help. Don&#8217;t be a victim of cybercrime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More and more companies are being threatened by cybercriminals using ransomware, a type of malicious software designed to hold a company&#8217;s data hostage until a sum of money is paid by its owner. Norman Guadagno published an insightful article on Carbonite discussing this alarming trend and the fact that nearly half the victims do not &#8230; <a title=\"Ransomware Secrets: Small businesses keep attacks quiet\" class=\"read-more\" href=\"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/\" aria-label=\"Read more about Ransomware Secrets: Small businesses keep attacks quiet\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[344,726,1017,1384],"class_list":["post-1884","post","type-post","status-publish","format-standard","hentry","category-stuff-were-working-on","category-whats-new-at-waudware","tag-cybercriminals","tag-malicious-software","tag-ransomware","tag-why-businesses-dont-report-ransomware","infinite-scroll-item","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware -Data held ransom<\/title>\n<meta name=\"description\" content=\"Cybercriminals using ransomware, a type of malicious software, are holding sme companys&#039; data as hostage until a sum of money is paid by its owner.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware -Data held ransom\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals using ransomware, a type of malicious software, are holding sme companys&#039; data as hostage until a sum of money is paid by its owner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/\" \/>\n<meta property=\"og:site_name\" content=\"Produce Inventory Control System Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ProduceInventory\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-21T16:45:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\" \/>\n<meta name=\"author\" content=\"Wendy Marlow\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/\"},\"author\":{\"name\":\"Wendy Marlow\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\"},\"headline\":\"Ransomware Secrets: Small businesses keep attacks quiet\",\"datePublished\":\"2017-03-21T16:45:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/\"},\"wordCount\":214,\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"keywords\":[\"cybercriminals\",\"malicious software\",\"ransomware\",\"why businesses don't report ransomware\"],\"articleSection\":[\"Improving Your Business\",\"What\u2019s New @ WaudWare\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/\",\"name\":\"Ransomware -Data held ransom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"datePublished\":\"2017-03-21T16:45:37+00:00\",\"description\":\"Cybercriminals using ransomware, a type of malicious software, are holding sme companys' data as hostage until a sum of money is paid by its owner.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\",\"contentUrl\":\"http:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2016\\\/08\\\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/ransomware-secrets-small-businesses-keep-attacks-quiet\\\/2017\\\/03\\\/21\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Secrets: Small businesses keep attacks quiet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"name\":\"Produce Inventory Control System Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\",\"name\":\"Produce Inventory Control System Blog\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"width\":217,\"height\":75,\"caption\":\"Produce Inventory Control System Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ProduceInventory\",\"https:\\\/\\\/www.youtube.com\\\/@PICS-Software\\\/videos\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fcharleswaud\\\/\",\"https:\\\/\\\/www.instagram.com\\\/waudwarepics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\",\"name\":\"Wendy Marlow\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"caption\":\"Wendy Marlow\"},\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/author\\\/wendymarlow\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware -Data held ransom","description":"Cybercriminals using ransomware, a type of malicious software, are holding sme companys' data as hostage until a sum of money is paid by its owner.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware -Data held ransom","og_description":"Cybercriminals using ransomware, a type of malicious software, are holding sme companys' data as hostage until a sum of money is paid by its owner.","og_url":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/","og_site_name":"Produce Inventory Control System Blog","article_publisher":"https:\/\/www.facebook.com\/ProduceInventory","article_published_time":"2017-03-21T16:45:37+00:00","og_image":[{"url":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","type":"","width":"","height":""}],"author":"Wendy Marlow","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#article","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/"},"author":{"name":"Wendy Marlow","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a"},"headline":"Ransomware Secrets: Small businesses keep attacks quiet","datePublished":"2017-03-21T16:45:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/"},"wordCount":214,"publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#primaryimage"},"thumbnailUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","keywords":["cybercriminals","malicious software","ransomware","why businesses don't report ransomware"],"articleSection":["Improving Your Business","What\u2019s New @ WaudWare"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/","url":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/","name":"Ransomware -Data held ransom","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#primaryimage"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#primaryimage"},"thumbnailUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","datePublished":"2017-03-21T16:45:37+00:00","description":"Cybercriminals using ransomware, a type of malicious software, are holding sme companys' data as hostage until a sum of money is paid by its owner.","breadcrumb":{"@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#primaryimage","url":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg","contentUrl":"http:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2016\/08\/bigstock-Hacker-in-front-of-his-compute-127222697-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.produceinventory.com\/blog\/ransomware-secrets-small-businesses-keep-attacks-quiet\/2017\/03\/21\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.produceinventory.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Secrets: Small businesses keep attacks quiet"}]},{"@type":"WebSite","@id":"https:\/\/www.produceinventory.com\/blog\/#website","url":"https:\/\/www.produceinventory.com\/blog\/","name":"Produce Inventory Control System Blog","description":"","publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.produceinventory.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.produceinventory.com\/blog\/#organization","name":"Produce Inventory Control System Blog","url":"https:\/\/www.produceinventory.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","contentUrl":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","width":217,"height":75,"caption":"Produce Inventory Control System Blog"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ProduceInventory","https:\/\/www.youtube.com\/@PICS-Software\/videos","https:\/\/www.linkedin.com\/in\/fcharleswaud\/","https:\/\/www.instagram.com\/waudwarepics"]},{"@type":"Person","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a","name":"Wendy Marlow","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","caption":"Wendy Marlow"},"url":"https:\/\/www.produceinventory.com\/blog\/author\/wendymarlow\/"}]}},"_links":{"self":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/1884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/comments?post=1884"}],"version-history":[{"count":0,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/1884\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/media?parent=1884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/categories?post=1884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/tags?post=1884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}