{"id":921,"date":"2021-08-05T16:44:34","date_gmt":"2021-08-05T16:44:34","guid":{"rendered":"http:\/\/box5442.temp.domains\/~arpioio\/?p=921"},"modified":"2022-05-31T15:37:24","modified_gmt":"2022-05-31T15:37:24","slug":"how-to-protect-your-aws-environment-from-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/arpio.io\/staging\/8013\/how-to-protect-your-aws-environment-from-ransomware-attacks\/","title":{"rendered":"How to protect your AWS Environment from Ransomware attacks."},"content":{"rendered":"<body>[vc_row type=\u201din_container\u201d full_screen_row_position=\u201dmiddle\u201d column_margin=\u201ddefault\u201d column_direction=\u201ddefault\u201d column_direction_tablet=\u201ddefault\u201d column_direction_phone=\u201ddefault\u201d scene_position=\u201dcenter\u201d text_color=\u201ddark\u201d text_align=\u201dleft\u201d row_border_radius=\u201dnone\u201d row_border_radius_applies=\u201dbg\u201d overflow=\u201dvisible\u201d overlay_strength=\u201d0.3\u2033 gradient_direction=\u201dleft_to_right\u201d shape_divider_position=\u201dbottom\u201d bg_image_animation=\u201dnone\u201d][vc_column column_padding=\u201dno-extra-padding\u201d column_padding_tablet=\u201dinherit\u201d column_padding_phone=\u201dinherit\u201d column_padding_position=\u201dall\u201d column_element_spacing=\u201ddefault\u201d background_color_opacity=\u201d1\u2033 background_hover_color_opacity=\u201d1\u2033 column_shadow=\u201dnone\u201d column_border_radius=\u201dnone\u201d column_link_target=\u201d_self\u201d column_position=\u201ddefault\u201d gradient_direction=\u201dleft_to_right\u201d overlay_strength=\u201d0.3\u2033 width=\u201d1\/1\u2033 tablet_width_inherit=\u201ddefault\u201d tablet_text_alignment=\u201ddefault\u201d phone_text_alignment=\u201ddefault\u201d animation_type=\u201ddefault\u201d bg_image_animation=\u201dnone\u201d border_type=\u201dsimple\u201d column_border_width=\u201dnone\u201d column_border_style=\u201dsolid\u201d][vc_column_text]Hopefully, ransomware protection has been an essential part of your threat management for years now. But based on the recent widespread ransomware attacks, it\u2019s clear that the risks are still underestimated, and the attackers are more successful than we\u2019d like. On top of that, cloud environments like AWS have more attack vectors and vulnerabilities to take into account than conventional on-premise systems.\r\n\r\n<p>At Arpio, we recommend a three-pronged approach to preventing and managing ransomware attacks.<\/p>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>1. Prevent ransomware from getting into your environment.<\/strong><\/h3>\r\n\r\n<p>The best way to handle ransomware attacks is not to get infected! On top of vigilance and discipline, here are our top must do\u2019s based on what we have seen go wrong:<\/p>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Enable MFA for the root account and all user access,<a href=\"https:\/\/arpio.io\/staging\/8013\/iam-user-command-line-mfa\/\"> including when using access tokens from programmatic and command-line access<\/a>. The extra step might be cumbersome at first, but it will improve the security of your environment. Using federated logins might lighten the burden as well!<\/li>\r\n<li>Maintain a program to apply security patches to EC2 instances in a timely manner. <a href=\"https:\/\/aws.amazon.com\/blogs\/mt\/patching-your-windows-ec2-instances-using-aws-systems-manager-patch-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0AWS Systems Manager Patch Manager can automate this for you<\/a>. If you haven\u2019t automated the process \u2013 make sure to schedule regular (at least weekly) reviews.<\/li>\r\n<li>Use managed services and serverless technologies to eliminate the need to patch at all. \u00a0 If you don\u2019t run an EC2 instance, there\u2019s no way for ransomware to exploit it.<\/li>\r\n<li>Use IAM roles instead of IAM users for programmatic access from your applications. This eliminates the need for access tokens, which can accidentally get leaked or maliciously get compromised.<\/li>\r\n<li>Grant least-privileged access to IAM roles and users so that privileges cannot be escalated in the event of a compromise. Do not allow access to services you do not use or that they do not need access to.<\/li>\r\n<\/ul>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>2. Prevent ransomware from spreading within your environment.<\/strong><\/h3>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Use distinct AWS accounts to operate distinct workloads. Each AWS account is a natural security domain so that if one account is compromised, others are not.<\/li>\r\n<li>Use security groups to control what network traffic is allowed to traverse your network to minimize the ability for ransomware to spread.<\/li>\r\n<\/ul>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<h3 class=\"wp-block-heading\"><strong>3. Ensure you can recover your environment if steps 1 and 2 fail<\/strong><\/h3>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Make sure to backup your data in a different security domain than your production environment. Backups stored inside your production AWS account will be identified and deleted or encrypted by the attacker as part of executing the attack.<\/li>\r\n<li>Make sure to\u00a0 retain a history of recent backups so that you can roll back to unencrypted data.<\/li>\r\n<li>Practice recovery regularly in a clean environment, so you\u2019re confident in your ability to fully restore your service (and you know your recovery time!). This clean environment should be a different AWS account.\u00a0 If ransomware penetrates your production AWS account, it should be considered lost.<\/li>\r\n<\/ul>\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<p>The last step (practice recovery)\u00a0 is the most undervalued \/ under prioritized activity that will show you how hard (or hopefully easy) it will be to recover from a successful attack. It will also give you \u2018food for thought\u2019 on changes in production, backups, and tools that will make it easier and faster to recover. When was your last fire drill?<\/p>\r\n\r\n<p>We would love to hear your best practice for ransomware attack prevention. Please drop us a note!<\/p>\r\n[\/vc_column_text][vc_row_inner column_margin=\u201ddefault\u201d column_direction=\u201ddefault\u201d column_direction_tablet=\u201ddefault\u201d column_direction_phone=\u201ddefault\u201d text_align=\u201dleft\u201d row_position=\u201ddefault\u201d row_position_tablet=\u201dinherit\u201d row_position_phone=\u201dinherit\u201d overflow=\u201dvisible\u201d pointer_events=\u201dall\u201d][vc_column_inner column_padding=\u201dno-extra-padding\u201d column_padding_tablet=\u201dinherit\u201d column_padding_phone=\u201dinherit\u201d column_padding_position=\u201dall\u201d column_element_spacing=\u201ddefault\u201d background_color_opacity=\u201d1\u2033 background_hover_color_opacity=\u201d1\u2033 column_shadow=\u201dnone\u201d column_border_radius=\u201dnone\u201d column_link_target=\u201d_self\u201d gradient_direction=\u201dleft_to_right\u201d overlay_strength=\u201d0.3\u2033 width=\u201d1\/1\u2033 tablet_width_inherit=\u201ddefault\u201d animation_type=\u201ddefault\u201d bg_image_animation=\u201dnone\u201d border_type=\u201dsimple\u201d column_border_width=\u201dnone\u201d column_border_style=\u201dsolid\u201d][nectar_btn size=\u201dmedium\u201d button_style=\u201dregular\u201d button_color_2=\u201dAccent-Color\u201d icon_family=\u201dnone\u201d button_id=\u201darpio-button\u201d text=\u201dSchedule a demo\u201d url=\u201dhttps:\/\/arpio.io\/staging\/8013\/request-demo\/\u201d margin_left=\u201dauto\u201d margin_right=\u201dauto\u201d][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/body>","protected":false},"excerpt":{"rendered":"<p>[vc_row type=\u201din_container\u201d full_screen_row_position=\u201dmiddle\u201d column_margin=\u201ddefault\u201d column_direction=\u201ddefault\u201d column_direction_tablet=\u201ddefault\u201d column_direction_phone=\u201ddefault\u201d scene_position=\u201dcenter\u201d text_color=\u201ddark\u201d text_align=\u201dleft\u201d row_border_radius=\u201dnone\u201d row_border_radius_applies=\u201dbg\u201d overflow=\u201dvisible\u201d overlay_strength=\u201d0.3\u2033 gradient_direction=\u201dleft_to_right\u201d shape_divider_position=\u201dbottom\u201d bg_image_animation=\u201dnone\u201d][vc_column column_padding=\u201dno-extra-padding\u201d column_padding_tablet=\u201dinherit\u201d column_padding_phone=\u201dinherit\u201d column_padding_position=\u201dall\u201d column_element_spacing=\u201ddefault\u201d background_color_opacity=\u201d1\u2033 background_hover_color_opacity=\u201d1\u2033 column_shadow=\u201dnone\u201d column_border_radius=\u201dnone\u201d column_link_target=\u201d_self\u201d column_position=\u201ddefault\u201d gradient_direction=\u201dleft_to_right\u201d overlay_strength=\u201d0.3\u2033&#8230;<\/p>\n","protected":false},"author":1,"featured_media":922,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","content-type":"","inline_featured_image":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-921","post","type-post","status-publish","format-standard","has-post-thumbnail","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=\u201din_container\u201d full_screen_row_position=\u201dmiddle\u201d column_margin=\u201ddefault\u201d column_direction=\u201ddefault\u201d column_direction_tablet=\u201ddefault\u201d column_direction_phone=\u201ddefault\u201d scene_position=\u201dcenter\u201d text_color=\u201ddark\u201d text_align=\u201dleft\u201d row_border_radius=\u201dnone\u201d row_border_radius_applies=\u201dbg\u201d overflow=\u201dvisible\u201d overlay_strength=\u201d0.3\u2033 gradient_direction=\u201dleft_to_right\u201d shape_divider_position=\u201dbottom\u201d bg_image_animation=\u201dnone\u201d][vc_column column_padding=\u201dno-extra-padding\u201d column_padding_tablet=\u201dinherit\u201d column_padding_phone=\u201dinherit\u201d column_padding_position=\u201dall\u201d column_element_spacing=\u201ddefault\u201d background_color_opacity=\u201d1\u2033 background_hover_color_opacity=\u201d1\u2033 column_shadow=\u201dnone\u201d column_border_radius=\u201dnone\u201d column_link_target=\u201d_self\u201d column_position=\u201ddefault\u201d gradient_direction=\u201dleft_to_right\u201d overlay_strength=\u201d0.3\u2033...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Arpio Disaster Recovery Made Easy\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-05T16:44:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-31T15:37:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arpio.io\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"746\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"6805pwpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"6805pwpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\"},\"author\":{\"name\":\"6805pwpadmin\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\"},\"headline\":\"How to protect your AWS Environment from Ransomware attacks.\",\"datePublished\":\"2021-08-05T16:44:34+00:00\",\"dateModified\":\"2022-05-31T15:37:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\"},\"wordCount\":857,\"image\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\",\"url\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\",\"name\":\"How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy\",\"isPartOf\":{\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg\",\"datePublished\":\"2021-08-05T16:44:34+00:00\",\"dateModified\":\"2022-05-31T15:37:24+00:00\",\"author\":{\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\"},\"breadcrumb\":{\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg\",\"contentUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg\",\"width\":1280,\"height\":746},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/arpio.io\/staging\/8013\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your AWS Environment from Ransomware attacks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#website\",\"url\":\"https:\/\/arpio.io\/staging\/8013\/\",\"name\":\"Arpio Disaster Recovery Made Easy\",\"description\":\"AWS Disaster Recovery\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/arpio.io\/staging\/8013\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\",\"name\":\"6805pwpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g\",\"caption\":\"6805pwpadmin\"},\"sameAs\":[\"http:\/\/support.pagely.com\"],\"url\":\"https:\/\/arpio.io\/staging\/8013\/author\/6805pwpadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy","og_description":"[vc_row type=\u201din_container\u201d full_screen_row_position=\u201dmiddle\u201d column_margin=\u201ddefault\u201d column_direction=\u201ddefault\u201d column_direction_tablet=\u201ddefault\u201d column_direction_phone=\u201ddefault\u201d scene_position=\u201dcenter\u201d text_color=\u201ddark\u201d text_align=\u201dleft\u201d row_border_radius=\u201dnone\u201d row_border_radius_applies=\u201dbg\u201d overflow=\u201dvisible\u201d overlay_strength=\u201d0.3\u2033 gradient_direction=\u201dleft_to_right\u201d shape_divider_position=\u201dbottom\u201d bg_image_animation=\u201dnone\u201d][vc_column column_padding=\u201dno-extra-padding\u201d column_padding_tablet=\u201dinherit\u201d column_padding_phone=\u201dinherit\u201d column_padding_position=\u201dall\u201d column_element_spacing=\u201ddefault\u201d background_color_opacity=\u201d1\u2033 background_hover_color_opacity=\u201d1\u2033 column_shadow=\u201dnone\u201d column_border_radius=\u201dnone\u201d column_link_target=\u201d_self\u201d column_position=\u201ddefault\u201d gradient_direction=\u201dleft_to_right\u201d overlay_strength=\u201d0.3\u2033...","og_url":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/","og_site_name":"Arpio Disaster Recovery Made Easy","article_published_time":"2021-08-05T16:44:34+00:00","article_modified_time":"2022-05-31T15:37:24+00:00","og_image":[{"width":1280,"height":746,"url":"https:\/\/arpio.io\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg","type":"image\/jpeg"}],"author":"6805pwpadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"6805pwpadmin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/"},"author":{"name":"6805pwpadmin","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095"},"headline":"How to protect your AWS Environment from Ransomware attacks.","datePublished":"2021-08-05T16:44:34+00:00","dateModified":"2022-05-31T15:37:24+00:00","mainEntityOfPage":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/"},"wordCount":857,"image":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/","url":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/","name":"How to protect your AWS Environment from Ransomware attacks. - Arpio Disaster Recovery Made Easy","isPartOf":{"@id":"https:\/\/arpio.io\/staging\/8013\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg","datePublished":"2021-08-05T16:44:34+00:00","dateModified":"2022-05-31T15:37:24+00:00","author":{"@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095"},"breadcrumb":{"@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#primaryimage","url":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg","contentUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/08\/ransomware-2315203_1280.jpg","width":1280,"height":746},{"@type":"BreadcrumbList","@id":"https:\/\/arpio.io\/how-to-protect-your-aws-environment-from-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arpio.io\/staging\/8013\/"},{"@type":"ListItem","position":2,"name":"How to protect your AWS Environment from Ransomware attacks."}]},{"@type":"WebSite","@id":"https:\/\/arpio.io\/staging\/8013\/#website","url":"https:\/\/arpio.io\/staging\/8013\/","name":"Arpio Disaster Recovery Made Easy","description":"AWS Disaster Recovery","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arpio.io\/staging\/8013\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095","name":"6805pwpadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g","caption":"6805pwpadmin"},"sameAs":["http:\/\/support.pagely.com"],"url":"https:\/\/arpio.io\/staging\/8013\/author\/6805pwpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/comments?post=921"}],"version-history":[{"count":1,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/921\/revisions"}],"predecessor-version":[{"id":1586,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/921\/revisions\/1586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/media\/922"}],"wp:attachment":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/media?parent=921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/categories?post=921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/tags?post=921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}