{"id":2159,"date":"2023-10-16T09:04:34","date_gmt":"2023-10-16T08:04:34","guid":{"rendered":"https:\/\/ie.amtivo.com\/resources\/%resource%\/https-ceurope-submerge-digital-insights-what-is-ransomware\/"},"modified":"2025-04-24T11:25:24","modified_gmt":"2025-04-24T10:25:24","slug":"what-is-ransomware","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/","title":{"rendered":"What Is Ransomware?"},"content":{"rendered":"<p><em>The threat of ransomware is among the biggest challenges that Irish organisations currently face. <\/em><a title=\"title\" href=\"https:\/\/www.iodireland.ie\/resources-media\/media-hub\/news\/iod-research-cybersecurity\" target=\"_blank\" rel=\"noopener\"><em>According to the Institute of Directors in Ireland<\/em><\/a><em>, 41% of businesses across Ireland have suffered a cyber attack, and ransomware accounts for a large proportion of that total.<\/em><\/p>\r\n<p>Ransomware was used in one of the most infamous cyber attacks in the past few years \u2013 the 2021 <a title=\"title\" href=\"https:\/\/www.irishtimes.com\/news\/health\/hse-forced-to-shut-down-it-systems-after-fairly-sophisticated-cyber-attack-1.4564957\" target=\"_blank\" rel=\"noopener\">intrusion into Ireland\u2019s healthcare system<\/a>, which crippled essential services and left patients without access to facilities for days \u2013 but attacks like that happen every day. In fact, <a title=\"title\" href=\"https:\/\/www.statista.com\/statistics\/494947\/ransomware-attacks-per-year-worldwide\/\" target=\"\" rel=\"noopener\">research by Statista<\/a> found that there were more than 493,300,000 ransomware attacks globally in 2022 alone.<\/p>\r\n<p>But what exactly is it about ransomware that makes it so dangerous? In this guide, we explain everything you need to know, plus our essential tips on how to protect your organisation from ransomware.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8934\" src=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware.jpg\" alt=\"what is ransomware - person with encrypted laptop and data\" width=\"1280\" height=\"854\" srcset=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware.jpg 1280w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware-300x200.jpg 300w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware-1024x683.jpg 1024w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware-768x512.jpg 768w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware-120x80.jpg 120w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/Cyber-crime-strategy-ransomware-and-malware-600x400.jpg 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\r\n<h2>What is ransomware?<\/h2>\r\n<p>Ransomware is a type of malicious program that encrypts a victim\u2019s data or locks them out of their device. The attackers then demand a payment in order to regain access to their systems. The sums can vary greatly, but <a title=\"title\" href=\"https:\/\/info.zscaler.com\/resources-industry-reports-2023-threatlabz-ransomware-report\" target=\"_blank\" rel=\"noopener\">Zscaler research <\/a>indicates that victims often pay more than $100,000 (about \u20ac92,000).<\/p>\r\n<p>But that\u2019s just the start of the damage. The trademark of a ransomware attack is that the criminals threaten to publish or sell the compromised data if they aren\u2019t paid, which can result in devastating data breaches. According to <a title=\"title\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">an IBM study<\/a>, the cost of a security breach far exceeds the initial ransom demand, with organisations often spending more than $5 million (\u20ac4.6 million) on remediation costs and regulatory penalties.<\/p>\r\n<h2>Types of ransomware<\/h2>\r\n<p>There are countless types \u2013 or \u2018strains\u2019 \u2013 of ransomware, and although they are all designed to cripple the target\u2019s systems and force a ransom payment, there are many ways they can do this. For instance, one of the most common ransomware strains, LockBit, is usually hidden within the attachments of phishing emails, whereas the Ryuk and REvil strains are more likely to exploit RDP (remote desktop protocols).<\/p>\r\n<p>Likewise, the mechanics of a ransomware attack can fall into two distinct categories:<\/p>\r\n<ul>\r\n\t<li><strong>Crypto ransomware<\/strong>, which encrypts files on the victim\u2019s computer. The encrypted documents remain on the victim\u2019s device, and the user can see their location, but they can\u2019t be opened without the decryption key.<\/li>\r\n\t<li><strong>Locker<\/strong>, or <strong>screen-locking<\/strong>,<strong> ransomware<\/strong>, which prevents the user from using the device altogether. The screen displays a ransom message, which renders the device unusable without the decryption key.<\/li>\r\n<\/ul>\r\n<h3>Who is at risk of ransomware \u2013 and what is its impact?<\/h3>\r\n<p>As with most cyber security threats, ransomware can affect anyone who uses a computer. However, hackers generally favour organisations that they believe are willing to make a sizeable ransom payment. That doesn\u2019t necessarily mean big businesses have to worry the most, though. Large-scale enterprises account for just 12% of ransomware attacks, according to a <a title=\"title\" href=\"https:\/\/www.akamai.com\/lp\/soti\/ransomware-on-the-move\" target=\"_blank\" rel=\"noopener\">report by the Cloud security vendor Akamai<\/a>, whereas organisations with an annual turnover of less than $50 million (\u20ac46 million) represent 67% of the total.<\/p>\r\n<p>This is because small organisations typically have fewer resources to deal with disruptive incidents, so they\u2019ll have few options but to negotiate with the attackers. According to <a title=\"title\" href=\"https:\/\/www.sophos.com\/en-us\/content\/state-of-ransomware\" target=\"_blank\" rel=\"noopener\">a study from the IT security firm Sophos<\/a>, the following sectors are most likely to be targeted:<\/p>\r\n<ul>\r\n\t<li>Education;<\/li>\r\n\t<li>Construction and property;<\/li>\r\n\t<li>Local and national government;<\/li>\r\n\t<li>Retail;<\/li>\r\n\t<li>Media, leisure and entertainment;<\/li>\r\n\t<li>Energy suppliers; and<\/li>\r\n\t<li>Healthcare.<\/li>\r\n<\/ul>\r\n<p>The threat is especially pronounced for organisations that work in critical services or that otherwise cannot afford delays. The <a title=\"title\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/hse-cyber-attack-ireland-dollar83m\/\" target=\"_blank\" rel=\"noopener\">2021 ransomware attack on Ireland\u2019s healthcare system<\/a> is a prime example. Healthcare facilities across the countries were forced to cancel appointments, while several hospitals were locked out of their electronic systems.<\/p>\r\n<p>This sort of disruption would be bad enough for a standard enterprise, with significant delays damaging the organisation\u2019s reputation and potentially leading to lost revenue. But for the healthcare sector, disturbances might be a matter of life and death, and senior decision-makers might feel as though they have no other choice but to pay up.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8850\" src=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image.jpg\" alt=\"what is ransomware - how to protect from ransomware attacks\" width=\"1280\" height=\"853\" srcset=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image.jpg 1280w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image-300x200.jpg 300w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image-1024x682.jpg 1024w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image-768x512.jpg 768w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image-120x80.jpg 120w, https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/07\/online-security-tips-body-image-600x400.jpg 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\r\n<h2>How to prevent ransomware attacks<\/h2>\r\n<p>As widespread as ransomware is, there are a few simple ways that organisations can protect themselves. Here are a few tips to help you get started:<\/p>\r\n<h3>Keep your software updated<\/h3>\r\n<p>There are few easier ways to plant ransomware on an organisation\u2019s systems than exploiting known software vulnerabilities. These weaknesses are usually made public when the publisher patches them in an update. Organisations are then expected to apply the patches in order to remove the weakness from their systems. It\u2019s essential that you do this as soon as possible, otherwise, you leave a huge hole in your defences that cyber criminals will be on the lookout for.<\/p>\r\n<h3>Run staff awareness training exercises<\/h3>\r\n<p>Another common way that ransomware is planted is to hide it in a phishing email. Posing as a legitimate sender \u2013 such as a contractor sending an invoice or an HR provider sending a payroll notification \u2013 the hacker will ask the recipient to open the file, unleashing the ransomware on their systems.<\/p>\r\n<p>You can combat this threat by teaching your employees what ransomware is, and how it\u2019s used in phishing attacks. Fortunately, most <a title=\"title\" href=\"https:\/\/cofense.com\/knowledge-center\/how-to-spot-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing emails contain the same tell-tale clues<\/a>, so it can be a case of embedding these lessons in regular staff awareness training exercises.<\/p>\r\n<h3>Install antivirus software<\/h3>\r\n<p>Antivirus software is a fundamental part of information security. Tools such as the built-in <a title=\"title\" href=\"https:\/\/www.microsoft.com\/en-gb\/windows\/comprehensive-security?r=1\" target=\"_blank\" rel=\"noopener\">Windows Defender <\/a>automatically scan files sent over the Internet for known security threats and ransomware signatures. They will search for viruses on your systems and, depending on your settings, display warnings whenever users attempt to visit unsafe websites or download untrusted files.<\/p>\r\n<h3>Back up your data<\/h3>\r\n<p>You can dramatically reduce your risk of exposure to ransomware by backing up your data. Although this won\u2019t prevent an attack, it will help in the event of a crypto-locking intrusion. This is the dominant form of ransomware, and it encrypts the files on your computer but otherwise leaves the devices undamaged.<\/p>\r\n<p>If you keep backups in a separate, secure location, you can simply wipe the infected devices and rebuild your systems in a safe environment without having to negotiate with the attackers.<\/p>\r\n<h3>Create business continuity and disaster recovery plans<\/h3>\r\n<p>Data backups go hand in hand with business continuity and disaster recovery plans. These documents explain how your organisation will deal with disruptive incidents and get back to business as usual. Business continuity plans address technical concerns, such as network connections, online systems, phone lines, network drives, servers and business applications.<\/p>\r\n<p>Meanwhile, disaster recovery plans focus on resolving the disruption. They help organisations identify the source of the disruption and find a way to fix it. These plans are highly technical and address specific deadlines that must be met to prevent a delay from spilling over into a catastrophe.<\/p>\r\n<h3>Certify to Cyber Essentials<\/h3>\r\n<p>Cyber Essentials is a security framework that sets out five basic controls that can protect organisations against 80% of common cyber attacks.<\/p>\r\n<p>The scheme can help reduce the threat of ransomware, as well as other common security risks, such as phishing, brute-force password breaches and network intrusion. It guidance covers:<\/p>\r\n<ul>\r\n\t<li>Firewalls and router protection<\/li>\r\n\t<li>Software updates<\/li>\r\n\t<li>Malware protection<\/li>\r\n\t<li>Access controls<\/li>\r\n\t<li>Secure configuration<\/li>\r\n<\/ul>\r\n<p>Organisations can also certify to Cyber Essentials Plus to gain an extra level of security. This advanced scheme includes a technical audit, an external vulnerability assessment and additional tests to ensure that the organisation&#8217;s systems are fully secure.<\/p>\r\n<p><em>Learn more about <\/em><a href=\"\/ie\/security-certification\/cyber-essentials\/\"><em>Cyber Essentials certification<\/em><\/a><em>.<\/em><\/p>\r\n<h2>Getting started with ISO 27001<\/h2>\r\n<p>If you\u2019re looking for more information about these tips, you should look at <a title=\"title\" href=\"\/ie\/iso-certification\/iso-27001\/\" rel=\"noopener\">ISO 27001<\/a>. It\u2019s the international standard for information security management, and it helps organisations integrate the core components of data protection \u2013 people, processes and technology \u2013 within a single strategy.<\/p>\r\n<p>You can use ISO 27001\u2019s guidance to address an array of information security threats, including ransomware. Its framework covers everything from technical vulnerability management to staff awareness training, giving you the blueprint to secure your systems.<\/p>\r\n<p><a title=\"title\" href=\"\/ie\/iso-certification\/iso-27001\/\" rel=\"noopener\">Discover how we can help you achieve ISO 27001 certification<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"Guard your organisation against ransomware attacks. Learn about the threat, its impact and how Cyber Essentials and ISO 27001 can help.","protected":false},"author":24,"featured_media":2160,"template":"","resource":[35],"resource-tag":[149,142],"class_list":["post-2159","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-insights","resource-tag-cyber-essentials","resource-tag-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is Ransomware? - Amtivo<\/title>\n<meta name=\"description\" content=\"Guard against ransomware attacks. Learn about the threat, its impact and how certifications like ISO 27001 and Cyber Essentials can help you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Ransomware?\" \/>\n<meta property=\"og:description\" content=\"Guard against ransomware attacks. Learn about the threat, its impact and how certifications like ISO 27001 and Cyber Essentials can help you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo Ireland\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T10:25:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1081\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Ransomware? - Amtivo","description":"Guard against ransomware attacks. Learn about the threat, its impact and how certifications like ISO 27001 and Cyber Essentials can help you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/","og_locale":"en_GB","og_type":"article","og_title":"What Is Ransomware?","og_description":"Guard against ransomware attacks. Learn about the threat, its impact and how certifications like ISO 27001 and Cyber Essentials can help you.","og_url":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/","og_site_name":"Amtivo Ireland","article_modified_time":"2025-04-24T10:25:24+00:00","og_image":[{"width":1920,"height":1081,"url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#article","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/"},"author":{"name":"Julian Russell","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937"},"headline":"What Is Ransomware?","datePublished":"2023-10-16T08:04:34+00:00","dateModified":"2025-04-24T10:25:24+00:00","mainEntityOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/"},"wordCount":1331,"publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/","url":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/","name":"What Is Ransomware? - Amtivo","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg","datePublished":"2023-10-16T08:04:34+00:00","dateModified":"2025-04-24T10:25:24+00:00","description":"Guard against ransomware attacks. Learn about the threat, its impact and how certifications like ISO 27001 and Cyber Essentials can help you.","breadcrumb":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#primaryimage","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2024\/05\/what-is-ransomware-guide-featured-image-e1696933467897.jpg","width":1920,"height":1081,"caption":"what is ransomware - how to protect from ransomware attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/ie\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Insights","item":"https:\/\/amtivo.com\/ie\/resources\/insights\/"},{"@type":"ListItem","position":4,"name":"What Is Ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/ie\/#website","url":"https:\/\/amtivo.com\/ie\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/ie\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","width":400,"height":331,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937","name":"Julian Russell","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","caption":"Julian Russell"},"sameAs":["https:\/\/www.linkedin.com\/in\/juliandrussell\/?miniProfileUrn=urn3Ali3Afs_miniProfile3AACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0&skipRedirect=true&miniProfileUrn=urnlifs_miniProfileACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0"],"url":"https:\/\/amtivo.com\/ie\/technical-expert\/julian\/"}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/2159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":0,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/2159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media\/2160"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media?parent=2159"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource?post=2159"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource-tag?post=2159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}