{"id":1043,"date":"2023-05-14T23:58:48","date_gmt":"2023-05-14T16:58:48","guid":{"rendered":"https:\/\/insideofcode.com\/blog\/?p=1043"},"modified":"2023-05-14T23:59:45","modified_gmt":"2023-05-14T16:59:45","slug":"8-cara-menghindari-ransomware","status":"publish","type":"post","link":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/","title":{"rendered":"8 Cara Menghindari Ransomware"},"content":{"rendered":"\n<p>Ransomware adalah perangkat lunak jahat yang dirancang untuk mengenkripsi file pada komputer atau jaringan korban, membuatnya tidak dapat diakses sampai tebusan dibayarkan. <\/p>\n\n\n\n<p>Ini merupakan bentuk serangan siber yang semakin umum dalam beberapa tahun terakhir. Ransomware umumnya masuk ke dalam sistem melalui email phishing, situs web yang telah diretas, atau unduhan berbahaya.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Memahami Serangan Ransomware<\/strong><\/h2>\n\n\n\n<p>Serangan ransomware dapat memiliki konsekuensi serius bagi individu, bisnis, dan organisasi. Memahami jenis-jenis ransomware dapat membantu dalam menerapkan langkah-langkah pencegahan yang efektif. Jenis-jenis umum meliputi:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Encrypting Ransomware<\/strong><\/h3>\n\n\n\n<p>Jenis ini mengenkripsi file dan menuntut tebusan agar file tersebut bisa didekripsi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Locker Ransomware<\/strong><\/h3>\n\n\n\n<p>Jenis ini mengunci korban dari perangkat mereka, memblokir akses ke file dan aplikasi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Master Boot Record (MBR) Ransomware<\/strong><\/h3>\n\n\n\n<p>Jenis ini mengubah MBR hard drive komputer, sehingga sistem tidak bisa di-boot.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Langkah-langkah Pencegahan<\/h2>\n\n\n\n<p>Mencegah serangan ransomware penting untuk melindungi data dan meminimalkan risiko kerugian finansial. Berikut adalah beberapa langkah pencegahan yang perlu dipertimbangkan:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Backup Data Secara Teratur<\/strong><\/h3>\n\n\n\n<p>Buatlah kebiasaan untuk secara rutin melakukan backup (pencadangan) data dan file penting Anda. Lakukan backup ke penyimpanan offline, seperti hard drive eksternal atau USB, serta ke penyimpanan cloud yang terpercaya. <\/p>\n\n\n\n<p>Pastikan backup dilakukan secara teratur agar Anda memiliki salinan data yang terbaru. Dengan memiliki salinan cadangan, Anda dapat mengembalikan file yang terenkripsi tanpa harus membayar tebusan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Pasang Pembaruan dan Patch<\/strong><\/h3>\n\n\n\n<p>Sistem operasi, perangkat lunak antivirus, dan aplikasi Anda harus selalu diperbarui dengan pembaruan keamanan terbaru yang disediakan oleh produsen. <\/p>\n\n\n\n<p>Pastikan untuk mengaktifkan fitur pembaruan otomatis agar Anda tidak melewatkan pembaruan penting yang dapat melindungi sistem Anda dari kerentanan yang dieksploitasi oleh ransomware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Gunakan <strong>Perangkat Lunak Keamanan<\/strong> Terpercaya<\/strong><\/h3>\n\n\n\n<p>Pasanglah perangkat lunak antivirus dan antimalware yang terpercaya pada sistem Anda. Pilih solusi keamanan yang memiliki reputasi baik dan secara teratur diperbarui dengan definisi virus yang baru. Selalu perbarui perangkat lunak keamanan Anda untuk mendapatkan perlindungan terbaru dari ancaman ransomware dan jenis malware lainnya.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Berhati-hati dengan Lampiran Email<\/strong><\/h3>\n\n\n\n<p>Ransomware sering kali menyebar melalui lampiran email yang berbahaya. Oleh karena itu, sangat penting untuk berhati-hati saat membuka lampiran email, terutama jika email tersebut berasal dari sumber yang tidak dikenal atau mencurigakan. <\/p>\n\n\n\n<p>Jangan membuka lampiran jika Anda merasa ada sesuatu yang tidak benar. Pastikan Anda memverifikasi keaslian dan kepercayaan sumber pengirim sebelum membuka atau mengunduh lampiran yang ada.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. <strong>Waspada terhadap Upaya Phishing<\/strong><\/h3>\n\n\n\n<p>Phishing adalah teknik yang umum digunakan oleh penyerang ransomware. Mereka akan mengirimkan email palsu atau pesan yang mencoba memancing Anda untuk mengungkapkan informasi pribadi, seperti kata sandi atau data keuangan, atau mengunduh file yang berbahaya. <\/p>\n\n\n\n<p>Selalu waspada terhadap tanda-tanda email atau pesan phishing, seperti tautan yang mencurigakan, bahasa yang memaksa, atau permintaan informasi sensitif yang tidak biasa. Jangan pernah memberikan informasi pribadi atau mengklik tautan yang mencurigakan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. <strong>Gunakan Kata Sandi Kuat dan Otentikasi Dua Faktor (2FA)<\/strong><\/h3>\n\n\n\n<p>Pastikan Anda menggunakan kata sandi yang kuat untuk akun online Anda. Kata sandi harus panjang, mengandung kombinasi huruf besar dan kecil, angka, dan simbol. Selain itu, aktifkan fitur otentikasi dua faktor (2FA) di akun-akun yang mendukungnya. <\/p>\n\n\n\n<p>2FA menambahkan lapisan keamanan tambahan dengan meminta verifikasi tambahan, seperti kode yang dikirimkan melalui pesan teks atau aplikasi otentikator, saat Anda  mencoba masuk ke akun Anda. Dengan menggunakan 2FA, bahkan jika kata sandi Anda bocor, penyerang masih akan kesulitan untuk mengakses akun Anda tanpa verifikasi tambahan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. <strong>Edukasi Karyawan dan Individu<\/strong><\/h3>\n\n\n\n<p>Edukasi adalah kunci dalam melawan ransomware. Berikan pelatihan kepada karyawan dan individu mengenai risiko ransomware, praktik terbaik dalam keamanan cyber, dan cara mengidentifikasi serta melaporkan aktivitas mencurigakan. <\/p>\n\n\n\n<p>Ajarkan mereka tentang pentingnya tidak mengklik tautan atau membuka lampiran yang mencurigakan, serta pentingnya menjaga kerahasiaan informasi pribadi dan kata sandi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. <strong>Batasi Hak Pengguna<\/strong><\/h3>\n\n\n\n<p>Batasi akses administratif hanya kepada personel yang membutuhkannya. Pengguna yang memiliki akses administratif memiliki kekuatan penuh untuk menginstal perangkat lunak berbahaya atau melakukan tindakan yang dapat membahayakan sistem. <\/p>\n\n\n\n<p>Dengan membatasi hak pengguna, Anda dapat mencegah instalasi perangkat lunak berbahaya yang tidak diizinkan dan mengurangi risiko serangan ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Penutup<\/h2>\n\n\n\n<p>Dengan menerapkan langkah-langkah pencegahan ini secara konsisten, Anda dapat mengurangi risiko serangan ransomware dan melindungi data dan sistem Anda dari ancaman tersebut.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware adalah perangkat lunak jahat yang dirancang untuk mengenkripsi file pada komputer atau jaringan korban, membuatnya tidak dapat diakses sampai tebusan dibayarkan. <\/p>\n","protected":false},"author":1,"featured_media":1046,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[38,61],"tags":[],"class_list":["post-1043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Cara Menghindari Ransomware - Inside of Code<\/title>\n<meta name=\"description\" content=\"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Cara Menghindari Ransomware - Inside of Code\" \/>\n<meta property=\"og:description\" content=\"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside of Code\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-14T16:58:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-14T16:59:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png\" \/>\n\t<meta property=\"og:image:width\" content=\"710\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\"},\"author\":{\"name\":\"Dani\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/1c6cafc6659067aa7ac1fd1a5ced218d\"},\"headline\":\"8 Cara Menghindari Ransomware\",\"datePublished\":\"2023-05-14T16:58:48+00:00\",\"dateModified\":\"2023-05-14T16:59:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\"},\"wordCount\":654,\"publisher\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png\",\"articleSection\":[\"Security\",\"Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\",\"url\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\",\"name\":\"8 Cara Menghindari Ransomware - Inside of Code\",\"isPartOf\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png\",\"datePublished\":\"2023-05-14T16:58:48+00:00\",\"dateModified\":\"2023-05-14T16:59:45+00:00\",\"description\":\"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...\",\"breadcrumb\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage\",\"url\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png\",\"contentUrl\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png\",\"width\":710,\"height\":400,\"caption\":\"Cara menghindari Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insideofcode.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Cara Menghindari Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#website\",\"url\":\"https:\/\/insideofcode.com\/blog\/\",\"name\":\"Inside of Code\",\"description\":\"A software engineer who wants to share what he has learned, and document his journey.\",\"publisher\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insideofcode.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#organization\",\"name\":\"Inside of Code\",\"url\":\"https:\/\/insideofcode.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2022\/10\/logo-ioc.png\",\"contentUrl\":\"https:\/\/insideofcode.com\/wp-content\/uploads\/2022\/10\/logo-ioc.png\",\"width\":324,\"height\":324,\"caption\":\"Inside of Code\"},\"image\":{\"@id\":\"https:\/\/insideofcode.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/1c6cafc6659067aa7ac1fd1a5ced218d\",\"name\":\"Dani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a4b1e4251720747aef0418e09fe0f6e7786ff89358b57f76822f1c52c286552b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a4b1e4251720747aef0418e09fe0f6e7786ff89358b57f76822f1c52c286552b?s=96&d=mm&r=g\",\"caption\":\"Dani\"},\"sameAs\":[\"https:\/\/insideofcode.com\/blog\"],\"url\":\"https:\/\/insideofcode.com\/blog\/author\/daniwork\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Cara Menghindari Ransomware - Inside of Code","description":"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"8 Cara Menghindari Ransomware - Inside of Code","og_description":"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...","og_url":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/","og_site_name":"Inside of Code","article_published_time":"2023-05-14T16:58:48+00:00","article_modified_time":"2023-05-14T16:59:45+00:00","og_image":[{"width":710,"height":400,"url":"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png","type":"image\/png"}],"author":"Dani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dani","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#article","isPartOf":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/"},"author":{"name":"Dani","@id":"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/1c6cafc6659067aa7ac1fd1a5ced218d"},"headline":"8 Cara Menghindari Ransomware","datePublished":"2023-05-14T16:58:48+00:00","dateModified":"2023-05-14T16:59:45+00:00","mainEntityOfPage":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/"},"wordCount":654,"publisher":{"@id":"https:\/\/insideofcode.com\/blog\/#organization"},"image":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png","articleSection":["Security","Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/","url":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/","name":"8 Cara Menghindari Ransomware - Inside of Code","isPartOf":{"@id":"https:\/\/insideofcode.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png","datePublished":"2023-05-14T16:58:48+00:00","dateModified":"2023-05-14T16:59:45+00:00","description":"Cara Menghindari Ransomware: Backup data, pasang pembaruan, gunakan perangkat lunak keamanan, waspada dengan lampiran email, dan edukasi pengguna. selengkapnya...","breadcrumb":{"@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#primaryimage","url":"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png","contentUrl":"https:\/\/insideofcode.com\/wp-content\/uploads\/2023\/05\/ransomware-attact.png","width":710,"height":400,"caption":"Cara menghindari Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/insideofcode.com\/blog\/8-cara-menghindari-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insideofcode.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 Cara Menghindari Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/insideofcode.com\/blog\/#website","url":"https:\/\/insideofcode.com\/blog\/","name":"Inside of Code","description":"A software engineer who wants to share what he has learned, and document his journey.","publisher":{"@id":"https:\/\/insideofcode.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insideofcode.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/insideofcode.com\/blog\/#organization","name":"Inside of Code","url":"https:\/\/insideofcode.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insideofcode.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/insideofcode.com\/wp-content\/uploads\/2022\/10\/logo-ioc.png","contentUrl":"https:\/\/insideofcode.com\/wp-content\/uploads\/2022\/10\/logo-ioc.png","width":324,"height":324,"caption":"Inside of Code"},"image":{"@id":"https:\/\/insideofcode.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/1c6cafc6659067aa7ac1fd1a5ced218d","name":"Dani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insideofcode.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a4b1e4251720747aef0418e09fe0f6e7786ff89358b57f76822f1c52c286552b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a4b1e4251720747aef0418e09fe0f6e7786ff89358b57f76822f1c52c286552b?s=96&d=mm&r=g","caption":"Dani"},"sameAs":["https:\/\/insideofcode.com\/blog"],"url":"https:\/\/insideofcode.com\/blog\/author\/daniwork\/"}]}},"_links":{"self":[{"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/posts\/1043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1043"}],"version-history":[{"count":0,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/posts\/1043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/media\/1046"}],"wp:attachment":[{"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insideofcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}