{"id":987497199,"date":"2024-12-02T14:59:12","date_gmt":"2024-12-02T13:59:12","guid":{"rendered":"https:\/\/tyrex-cyber.com\/ransomware-en-entreprise-que-faire\/"},"modified":"2024-12-02T15:06:55","modified_gmt":"2024-12-02T14:06:55","slug":"ransomware-workplace-what-to-do","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/","title":{"rendered":"Ransomware in the workplace: what to do?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">59% of French companies say they will have been the victim of a ransomware attack in 2023. This figure shows just how much of a threat ransomware represents for organizations. Faced with this cybersecurity challenge, how can you put measures in place to guard against ransomware? TYREX gives you some advice.\u00a0<\/span><\/p>\n<h2><b>First of all, what is ransomware?<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Ransomware is one of the <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/what-are-the-main-categories-of-malware\/\"><span style=\"font-weight: 400\">main types of malware<\/span><\/a><span style=\"font-weight: 400\">. Ransomware is malware that blocks access to a computer or files by encrypting them, demanding payment of a ransom to restore access. Infection can occur in a number of ways:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">opening a malicious attachment,\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">clicking on a fraudulent link in an e-mail,\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">using a USB flash drive, etc.\u00a0<\/span><\/li>\n<\/ul>\n<p><b>Cybercriminals often exploit known security holes to infiltrate victims&#8217; systems.<\/b> <b>And ransomware can be very costly.<\/b> <b>When they attack, hackers demand an average ransom of over $4 million.<\/b><\/p>\n<h2><b>What are the essential preventive measures against ransomware?<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In the face of these existing and emerging threats, there are several <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"><span style=\"font-weight: 400\">good cybersecurity practices<\/span><\/a><span style=\"font-weight: 400\"> to put in place. These include:\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400\"><b>Regular updates<\/b><span style=\"font-weight: 400\">: Make sure all operating systems and software are regularly updated with the latest security patches. Updates plug vulnerabilities that ransomware could exploit.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Robust security solutions<\/b><span style=\"font-weight: 400\">: Install and keep up-to-date effective antivirus software and firewalls. These tools detect and block potential threats before they damage the system.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Employee awareness<\/b><span style=\"font-weight: 400\">: Train staff in good cybersecurity practices, including how to recognize phishing attempts and the importance of not opening attachments or links from unverified sources.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Regular backups<\/b><span style=\"font-weight: 400\">: Make frequent backups of critical data and store them offline or on media not connected to the main network. This ensures that data can be restored in the event of an attack.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Install a USB decontamination station<\/b><span style=\"font-weight: 400\">: USB devices are a common route of infection for ransomware. Devices such as USB sticks or external hard drives can introduce malware into the corporate network if they are not properly controlled. To mitigate this risk, the installation of USB decontamination stations, also known as \u201cwhite stations\u201d, is highly recommended.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">Good to know: At TYREX, our white stations adapt to your work environment. They are compatible with fixed workstations or nomadic use, to protect you at all times.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/tyrex-cyber.com\/en\/la-solution\/\"><span style=\"font-weight: 400\">Discover the TYREX solution<\/span><\/a><\/p>\n<h2><b>What to do in the event of ransomware infection?<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">If, despite preventive measures, a company falls victim to ransomware, it&#8217;s important to know how to react. Here are a few tips:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Isolate damaged files or networks immediately: Disconnect infected systems from the network to prevent the malware from spreading.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Don&#8217;t pay the ransom: Paying offers no guarantee of data recovery and encourages cybercriminals to continue their activities.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">File a complaint: Report the incident to the appropriate authorities, such as the police or gendarmerie, to help in the fight against cybercrime.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Keep evidence: Keep copies of ransomware messages, infected files and system logs to facilitate subsequent investigations.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Identify the origin of the attack: Analyze how the infection occurred to correct security flaws and prevent future attacks.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Get help: Call in cybersecurity experts to assess the extent of the infection, restore systems and reinforce security measures.<\/span><\/li>\n<\/ul>\n<h3><b>Outsource your cybersecurity management to specialized professionals<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Outsourced cyber management means handing over responsibility for your IT systems and network infrastructure to an expert service provider. This centralized solution simplifies IT management while strengthening the protection of sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As a subsidiary of the RAS Group, TYREX works closely with <a href=\"https:\/\/www.armada.info\/\">ARMADA<\/a> Infog\u00e9rance to offer comprehensive solutions: state-of-the-art antivirus, VPN, secure servers, SOC and various levels of protection. These services ensure both operational continuity and the security of your company&#8217;s data.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.<\/p>\n","protected":false},"author":7,"featured_media":987497194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987497199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"description\" content=\"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T13:59:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-02T14:06:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre-Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre-Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\"},\"author\":{\"name\":\"Alexandre-Admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\"},\"headline\":\"Ransomware in the workplace: what to do?\",\"datePublished\":\"2024-12-02T13:59:12+00:00\",\"dateModified\":\"2024-12-02T14:06:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\"},\"wordCount\":603,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\",\"name\":\"Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg\",\"datePublished\":\"2024-12-02T13:59:12+00:00\",\"dateModified\":\"2024-12-02T14:06:55+00:00\",\"description\":\"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg\",\"width\":1080,\"height\":1080,\"caption\":\"Ransomware entreprise\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware in the workplace: what to do?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\",\"name\":\"Alexandre-Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"caption\":\"Alexandre-Admin\"},\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB","description":"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB","og_description":"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.","og_url":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2024-12-02T13:59:12+00:00","article_modified_time":"2024-12-02T14:06:55+00:00","og_image":[{"width":2000,"height":2000,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg","type":"image\/jpeg"}],"author":"Alexandre-Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre-Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/"},"author":{"name":"Alexandre-Admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b"},"headline":"Ransomware in the workplace: what to do?","datePublished":"2024-12-02T13:59:12+00:00","dateModified":"2024-12-02T14:06:55+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/"},"wordCount":603,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/","url":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/","name":"Ransomware in the workplace: what to do? - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg","datePublished":"2024-12-02T13:59:12+00:00","dateModified":"2024-12-02T14:06:55+00:00","description":"Find out how to protect your company from ransomware: prevention, best practices and solutions for responding effectively to attacks.","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/7107870.jpg","width":1080,"height":1080,"caption":"Ransomware entreprise"},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"Ransomware in the workplace: what to do?"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b","name":"Alexandre-Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","caption":"Alexandre-Admin"},"url":"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987497199"}],"version-history":[{"count":3,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497199\/revisions"}],"predecessor-version":[{"id":987497208,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497199\/revisions\/987497208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987497194"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987497199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987497199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987497199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}