{"id":2816,"date":"2014-08-07T10:54:03","date_gmt":"2014-08-07T09:54:03","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2014\/08\/07\/how-to-protect-against-ransomware-like-cryptolocker\/"},"modified":"2024-02-06T12:21:29","modified_gmt":"2024-02-06T12:21:29","slug":"how-to-protect-against-ransomware-like-cryptolocker","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/","title":{"rendered":"How to Protect Against Ransomware Like CryptoLocker"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2816\" class=\"elementor elementor-2816\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2742e0a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2742e0a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-794efb47\" data-id=\"794efb47\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23ed83a0 elementor-widget elementor-widget-text-editor\" data-id=\"23ed83a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>How Ransomware Works<\/h2>\n<p>Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware will either encrypt files, make the computer unusable or make threats, all to extort money to fix the problem. CryptoLocker encrypts documents on the computer, shared network drives and connected devices, and then demands a payment in bitcoins to decrypt the files. For a typical organisation with staff having access to multiple documents on shared drives, a CryptoLocker incident can mean serious damage and lost resource, even if the organisation has backups, pays the ransom or manages to find another way to clean up the problem.<br>To reduce the risk of getting affected by ransomware and to limit the damage if affected, there are layers of security that you can make sure you have in place. Having overlapping security controls means that if one layer is penetrated, the other layers may prevent a breach.<\/p>\n<h2>Backups<\/h2>\n<p>Make sure you have regular backups that are tested and are kept offline. Regularly test backups to see if they can be restored. If the backups are to another hard disk or to the cloud and the backups are accessible on the network, then even if it is offsite, this may still be accessed and encrypted by ransomware.<\/p>\n<h2>Effective and Up-to-Date Antivirus<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Many organisations have antivirus software installed on all PCs, however at Dionach we often find PCs with antivirus definitions that are quite out of date or have important features such as on-access scanning disabled. Ensure that antivirus is managed centrally, with someone regularly checking that all PCs have up-to-date signatures and that staff are not disabling antivirus features. Consider using an external mail filtering company for spam filtering and malware filtering. Many of these companies also offer web filtering. This can check and prevent common malware when staff are browsing the Internet. Although antivirus is an important security control it is far from infallible, as new variants of malware will not always be picked up quickly.<\/p>\n<h2>Software Security Updates<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Some ransomware will exploit vulnerabilities in unpatched software to get onto a computer. Commonly targeted software includes browsers such as Internet Explorer and applications such as Adobe Reader. Although many desktops will be configured to auto-update through Microsoft Update, typically we see a proportion of PCs that have not been updated for some time, and have non-Microsoft software that is not kept up-to-date. Ensure that software updates are managed centrally and regularly checked. Windows Software Update Services (WSUS) is very useful for central management, but does not cover non-Microsoft software. There are other products that centrally manage security updates to all software.<\/p>\n<h2>Limit Staff Access<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CryptoLocker will try and encrypt documents on the PC and any network drives to which the victim has access. Therefore the damage can be limited if the victim user only has access to documents specifically required for their job role. In your organisation review the use of local and domain administrator accounts and access to shared network drives. Although some users may need read access to some documents, they may not need write access to many of these. Setup a regular review of user access rights, as privilege creep is a common problem.<\/p>\n<h2>Penetration Testing<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">An email phishing test will determine how susceptible your organisation is to general phishing and spear phishing attacks, and how effective some of the technical and staff security controls are. Internal penetration testing on your internal network and systems can reveal network access control problems, configuration weaknesses, missing security updates.<\/p>\n<h2>Staff Training<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Technical security controls are ineffective if a member of staff manages to opens a malicious attachment or downloads and runs a Trojan, all the while ignoring security warnings. Some staff may think that information security is an IT problem, so isn\u2019t their responsibility. Ensure that staff are made aware of how ransomware and other malware can get onto their PC and what damage it can do, and how vital they as individuals are in trying to prevent this from happening. Having email phishing tests can help with this, as this demonstrates that it can really happen to them. A regular awareness exercise with examples of how recent malware works can be very effective.<\/p>\n<h2>Incident Response Plans<\/h2>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Finally, ensure that you have effective incident response plans in place, so that if and when you are affected by ransomware or have another type of breach you have proper procedures in place. This should at a minimum ensure that your organisation returns to normal operations as soon as possible.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Many of these layers of security can be found as security controls within ISO 27001, the international standard for information security. Using a framework such as ISO 27001 for managing information security means that not only will you cover these layers, but also you will have the means to identify and deal with threats other than ransomware, through a formal risk assessment process.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware will either encrypt files, make the computer unusable or make threats, all to extort money to fix the problem. CryptoLocker encrypts documents on the computer, shared network drives and connected devices, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209],"class_list":["post-2816","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Protect Against Ransomware Like CryptoLocker<\/title>\n<meta name=\"description\" content=\"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Against Ransomware Like CryptoLocker\" \/>\n<meta property=\"og:description\" content=\"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-07T09:54:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T12:21:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"How to Protect Against Ransomware Like CryptoLocker\",\"datePublished\":\"2014-08-07T09:54:03+00:00\",\"dateModified\":\"2024-02-06T12:21:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/\"},\"wordCount\":827,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"keywords\":[\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/\",\"name\":\"How to Protect Against Ransomware Like CryptoLocker\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"datePublished\":\"2014-08-07T09:54:03+00:00\",\"dateModified\":\"2024-02-06T12:21:29+00:00\",\"description\":\"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/how-to-protect-against-ransomware-like-cryptolocker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Against Ransomware Like CryptoLocker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Against Ransomware Like CryptoLocker","description":"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/","og_locale":"nl_NL","og_type":"article","og_title":"How to Protect Against Ransomware Like CryptoLocker","og_description":"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware","og_url":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2014-08-07T09:54:03+00:00","article_modified_time":"2024-02-06T12:21:29+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"How to Protect Against Ransomware Like CryptoLocker","datePublished":"2014-08-07T09:54:03+00:00","dateModified":"2024-02-06T12:21:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/"},"wordCount":827,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"keywords":["infrastructure"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/","url":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/","name":"How to Protect Against Ransomware Like CryptoLocker","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"datePublished":"2014-08-07T09:54:03+00:00","dateModified":"2024-02-06T12:21:29+00:00","description":"How Ransomware Works Ransomware such as CryptoLocker typically gets onto your PC either through a phishing email or a web site hosting malware. Ransomware","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/how-to-protect-against-ransomware-like-cryptolocker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"How to Protect Against Ransomware Like CryptoLocker"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Jq","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2816"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2816\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}