{"id":43956,"date":"2021-08-31T14:15:26","date_gmt":"2021-08-31T08:45:26","guid":{"rendered":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/"},"modified":"2022-08-23T08:46:52","modified_gmt":"2022-08-23T03:16:52","slug":"how-to-survive-a-cyberattack-a-cyberattack-survival-guide","status":"publish","type":"post","link":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/","title":{"rendered":"How to survive a cyberattack: A cyberattack survival guide"},"content":{"rendered":"\n<ol class=\"wp-block-list\"><li><a href=\"#Introduction\">Introduction<\/a><\/li><li><a href=\"#cyber attack\">What is a cyber attack?&nbsp;<\/a><\/li><li><a href=\"#How to survive a cyber attack?\">How to survive a cyber attack?<\/a><\/li><li><a href=\"#Post-attack remedial mechanisms\">Post-attack remedial mechanisms<\/a><\/li><li><a href=\"#software service provider\">How Kaseya, a software service provider, survive a cyber attack?<\/a><ul><li><a href=\"#Mitigation\">Step 1: Mitigation<\/a><\/li><li><a href=\"#Remediation\">Step 2: Remediation<\/a><\/li><\/ul><\/li><li><a href=\"#What to do after a cyber attack?\">What to do after a cyber attack?<\/a> <ul><li><a href=\"#Step 1\">Step 1: Identify what caused the attack and where the attack came from!<\/a><\/li><li><a href=\"#Step 2\">Step 2: Set into damage control mode<\/a><\/li><li><a href=\"#Step 3\">Step 3: Adopt the best Cyber Security practices<\/a><\/li><li><a href=\"#Step 4\">Step 4: Establish partnerships with firms providing IT security services<\/a><\/li><\/ul><\/li><li><a href=\"#Concluding thoughts\">Concluding thoughts<\/a><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>Just imagine, it\u2019s a usual workday. You get ready for work and open your laptop. Suddenly, you see a bizarre activity on your system. The passwords have changed, files deleted, etc., and a message flashes across your screen, \u201cYou\u2019ve been hacked!\u201d.&nbsp;<\/p>\n\n\n\n<p>Welcome to the world of cyberattacks, and you\u2019re a victim now.&nbsp;For sure, even the thought of it can bring chills down your spine.<\/p>\n\n\n<figure class=\"wp-block-image size-large td-caption-align-https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1.jpg zoomable\" data-full=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-1024x683.jpg\" alt=\"cyberattack\" class=\"wp-image-43958\" srcset=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-1024x683.jpg 1024w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-300x200.jpg 300w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-768x512.jpg 768w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-696x464.jpg 696w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-1068x712.jpg 1068w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-630x420.jpg 630w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1-150x100.jpg 150w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1217463785-1.jpg 1254w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Expression of a person after a cyber attack<br><\/figcaption><\/figure>\n\n\n\n<p><em>A study conducted by the University of Maryland found out that a cyberattack is carried out every 39 seconds.&nbsp;<\/em><\/p>\n\n\n\n<p>Cyberattacks have become pretty common these days due to the rise in technology and its related services. Also, do not even console yourself by thinking that only the Fortune 100 or 500 are bound to face an attack. If a $45 billion IT giant like Accenture is vulnerable to cyber attacks, then so is everyone. Even small and mid-sized businesses are prone to cyberattacks more often than large organizations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-cyber-attack\"><strong>What is a cyber attack?&nbsp;<\/strong><\/h2>\n\n\n\n<p>If an unknown entity or organization attempts to disable your electronic device or steal your data stored in the device by unethical means not authorized by you, then it is called a cyber attack. The person responsible for carrying out this unethical process is called a hacker.<\/p>\n\n\n<figure class=\"wp-block-image size-large td-caption-align-https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg zoomable\" data-full=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-1024x683.jpg\" alt=\"cyberattack\" class=\"wp-image-43959\" srcset=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-1024x683.jpg 1024w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-300x200.jpg 300w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-768x513.jpg 768w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-696x465.jpg 696w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-1068x713.jpg 1068w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-629x420.jpg 629w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-150x100.jpg 150w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg 1254w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-survive-a-cyber-attack\"><strong>How to survive a cyber attack?<\/strong><\/h2>\n\n\n\n<p>Despite various defense mechanisms in place, the frequency of cyberattacks hasn\u2019t reduced, forcing individuals and organizations to set up remedial measures. In this article, we will be discussing the various survival mechanisms that an organization or an individual can adhere to post a cyberattack, ensuring no further damage is caused.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"post-attack-remedial-mechanisms\"><strong>Post-attack remedial mechanisms<\/strong><\/h2>\n\n\n\n<p>Every second, post the attack, is critical. There are two mechanisms that organizations follow post the attack- one is remediation, and the other is mitigation. If the attack is detected initially, the damages can be reduced by using mitigation techniques, and the threat can be eradicated.<\/p>\n\n\n\n<p>Unfortunately, if the threat has not been detected during the early stages of the attack, it penetrates deep into the system and cannot be eradicated. That\u2019s when remediation comes into the picture, where different strategies and techniques are used to minimize the overall damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-kaseya-a-software-service-provider-survive-a-cyber-attack\"><strong>How Kaseya, a software service provider, survive a cyber attack?<\/strong><\/h2>\n\n\n\n<p>Let\u2019s look at how the US software giant Kaseya handled one of the biggest cyberattacks with its defense mechanism and presence of mind. The cyberattack was carried out by Russia-linked ransomware group REvil in July 2021 and is estimated to have affected up to 2,000 global organizations.<\/p>\n\n\n\n<p>Here is what they did right!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-1-mitigation\"><strong>Step 1: Mitigation<\/strong><\/h3>\n\n\n\n<p>One hour after the attack: Kaseya immediately shut down all the access to the affected sources. The mitigation protocol helped the company to minimize the impact of the attack and save thousands of small and medium-sized businesses from devastating consequences.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-2-remediation\"><strong>Step 2: Remediation<\/strong><\/h3>\n\n\n\n<p>Post mitigation, Kaseya activated its internal incident response team, which had partnerships with industry-leading cybercrime experts. As soon as the company confirmed the attack was threatening, the government cybersecurity and law enforcement agencies, including the FBI, CISA, and the White House, were immediately notified within an hour.<\/p>\n\n\n\n<p>Within a day, a security patch was created to counteract the attack. But, Kaseya\u2019s CEO made a wise and tough call to keep the affected system down for a few more days to ensure that the threat is eradicated.<\/p>\n\n\n\n<p>The timely reaction and wise decisions post the attack helped Kaseya protect data of 36,950\/ 37,000 of its core customer base from being breached and affected. It means that 99% of Kaseya\u2019s clients were saved, and only less than 1,500 of the 9,00,000+ local and small businesses handled by Kaseya\u2019s customers were affected.&nbsp;<\/p>\n\n\n\n<p>Now that you\u2019ve seen how a company survived a cyberattack and maintained its business continuity, it\u2019s your turn to safeguard your organization\u2019s and your digital assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-to-do-after-a-cyber-attack-how-to-survive-the-attack\"><strong>What to do after a cyber attack? How to survive the attack?<\/strong><\/h2>\n\n\n\n<p>With a cyberattack more imminent, it\u2019s better to have remedial measures at hand rather than being unprepared for such an incident. Moreover, implementing measures as soon as possible reduces the downtime the business has to go through and saves you from dire losses financially and customer-wise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-1-identity-what-caused-the-attack-and-where-the-attack-came-from\"><strong>Step 1: Identity what caused the attack and where the attack came from!<\/strong><\/h3>\n\n\n\n<p>It is of prime importance to have an incident response team in place that can swiftly spring into action once the attack is detected. Swift action and timely response are essential for limiting damages. Also, an incident response team can save up to $400,000 for affected companies on average. Below are some crucial initial steps you can take:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Identify and isolate the affected systems<\/li><li>Investigate the source of the attacks like the IP address, source, etc.<\/li><li>Determine the nature of the attack. Understand if it is a virus, malware, ransomware, etc.<\/li><\/ol>\n\n\n\n<p>Once you identify these details, you can set in process the remedial measures to contain the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-2-set-into-damage-control-mode\"><strong>Step 2: Set into damage control mode<\/strong><\/h3>\n\n\n\n<p>No matter how serious the attack is, you should never panic. You might think shutting down the entire system will control the cyberattack, but no. Doing so will affect the entire business process, and could cost you your clients.&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large td-caption-align-https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840.jpg zoomable\" data-full=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840.jpg\"><img decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-1024x678.jpg\" alt=\"Data security post a cyber attack\" class=\"wp-image-43960\" srcset=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-1024x678.jpg 1024w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-300x199.jpg 300w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-768x509.jpg 768w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-696x461.jpg 696w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-1068x707.jpg 1068w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-634x420.jpg 634w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840-150x99.jpg 150w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-1126482840.jpg 1258w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Data security post a cyber attack<br><\/figcaption><\/figure>\n\n\n\n<p>The best you can do is:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bring in the incident response team to detect the reason for the breach and rectify it<\/li><li>Identify the affected system and use the mitigation techniques by isolating them, to keep the virus from spreading further and attacking the other systems.&nbsp;<\/li><li>Keep the non-affected systems running, ensuring that business continuity is maintained in non-affected servers.<\/li><li>Quarantine all the systems that have been affected, and release the security patch.<\/li><li>Never resume the activities in the affected systems until and unless you are completely sure that the threat has been eliminated.<\/li><li>Immediately notify the management and your customers about this breach. Keeping this news away from them can cost the company its integrity and values.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-3-adopt-the-best-cyber-security-practices\"><strong>Step 3: Adopt the best Cyber Security practices<\/strong><\/h3>\n\n\n\n<p>Now it\u2019s time to take some proactive measures. Change the passwords of all the systems and networks across the organization. Being in the world of cloud computing, you are bound to have a data backup. If not, try getting a cloud data backup storage for yourself or your organization to not lose critical data. Restore the backup data, and ensure that there is no way that the hackers can gain access to them a second time.<\/p>\n\n\n\n<p>Next, train all your employees occasionally to let them know about the recent cyber security threats and best practices to avoid these threats. Also, educate them about keeping their passwords secure and avoiding third-party links received via emails, messages, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"step-4-establish-partnerships-with-firms-providing-it-security-services\"><strong>Step 4: Establish partnerships with firms providing IT security services<\/strong><\/h3>\n\n\n<figure class=\"wp-block-image size-large td-caption-align-https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288.jpg zoomable\" data-full=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288.jpg\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-1024x576.jpg\" alt=\"cyberattack\" class=\"wp-image-43961\" srcset=\"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-1024x576.jpg 1024w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-300x169.jpg 300w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-768x432.jpg 768w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-696x392.jpg 696w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-1068x601.jpg 1068w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-746x420.jpg 746w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288-150x84.jpg 150w, https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-808157288.jpg 1365w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>A cybersecurity professional can guard you against cyber threats<br><\/figcaption><\/figure>\n\n\n\n<p>The recent trends have witnessed a growing number of startups and small businesses forging partnerships with cybersecurity service providers. If you\u2019re running a company with a large customer base, you must consider this option. This step can save money as partnering with a firm specializing in cybersecurity can be less expensive than hiring full-time employees, and you can get access to end-to-end security solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"concluding-thoughts\"><strong>Concluding thoughts<\/strong><\/h2>\n\n\n\n<p>No matter how robust your defenses are, hackers somehow find a way to penetrate your systems. Hence it is advisable to have remedial measures beforehand, and I hope these points find good use to you.&nbsp;<\/p>\n\n\n\n<p>There are around 3.5 million cyber security job vacancies yet to be filled. And the demand keeps increasing every day. So, if you\u2019re interested in leading a career in the cybersecurity domain, there is an option waiting for you right here. <a href=\"https:\/\/www.mygreatlearning.com\/online-cyber-security-course\">Advanced Cyber Security Program<\/a> admissions are open right now. The program imparts all the required skills and knowledge a cyber security professional must possess in this data-driven world. Upskill and secure your dream job in the cyber security domain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction What is a cyber attack?&nbsp; How to survive a cyber attack? Post-attack remedial mechanisms How Kaseya, a software service provider, survive a cyber attack? Step 1: Mitigation Step 2: Remediation What to do after a cyber attack? Step 1: Identify what caused the attack and where the attack came from! Step 2: Set into [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":43959,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[],"content_type":[],"class_list":["post-43956","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to survive a cyberattack: A cyberattack survival guide<\/title>\n<meta name=\"description\" content=\"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to survive a cyberattack: A cyberattack survival guide\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Great Learning Blog: Free Resources what Matters to shape your Career!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreatLearningOfficial\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-31T08:45:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-23T03:16:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d1m75rqqgidzqn.cloudfront.net\/wp-data\/2021\/08\/31140404\/iStock-962366210.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1254\" \/>\n\t<meta property=\"og:image:height\" content=\"837\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Great Learning Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/Great_Learning\" \/>\n<meta name=\"twitter:site\" content=\"@Great_Learning\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Great Learning Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/\"},\"author\":{\"name\":\"Great Learning Editorial Team\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\"},\"headline\":\"How to survive a cyberattack: A cyberattack survival guide\",\"datePublished\":\"2021-08-31T08:45:26+00:00\",\"dateModified\":\"2022-08-23T03:16:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/\"},\"wordCount\":1400,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/iStock-962366210.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/\",\"name\":\"How to survive a cyberattack: A cyberattack survival guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/iStock-962366210.jpg\",\"datePublished\":\"2021-08-31T08:45:26+00:00\",\"dateModified\":\"2022-08-23T03:16:52+00:00\",\"description\":\"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/iStock-962366210.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/iStock-962366210.jpg\",\"width\":1254,\"height\":837,\"caption\":\"cyberattack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to survive a cyberattack: A cyberattack survival guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"name\":\"Great Learning Blog\",\"description\":\"Learn, Upskill &amp; Career Development Guide and Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"alternateName\":\"Great Learning\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\",\"name\":\"Great Learning\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"width\":900,\"height\":900,\"caption\":\"Great Learning\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreatLearningOfficial\\\/\",\"https:\\\/\\\/x.com\\\/Great_Learning\",\"https:\\\/\\\/www.instagram.com\\\/greatlearningofficial\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/in.pinterest.com\\\/greatlearning12\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/beaconelearning\\\/\"],\"description\":\"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.\",\"email\":\"info@mygreatlearning.com\",\"legalName\":\"Great Learning Education Services Pvt. Ltd\",\"foundingDate\":\"2013-11-29\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\",\"name\":\"Great Learning Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"caption\":\"Great Learning Editorial Team\"},\"description\":\"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.\",\"sameAs\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/Great_Learning\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCObs0kLIrDjX2LLSybqNaEA\"],\"award\":[\"Best EdTech Company of the Year 2024\",\"Education Economictimes Outstanding Education\\\/Edtech Solution Provider of the Year 2024\",\"Leading E-learning Platform 2024\"],\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/author\\\/greatlearning\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to survive a cyberattack: A cyberattack survival guide","description":"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"How to survive a cyberattack: A cyberattack survival guide","og_description":"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.","og_url":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/","og_site_name":"Great Learning Blog: Free Resources what Matters to shape your Career!","article_publisher":"https:\/\/www.facebook.com\/GreatLearningOfficial\/","article_published_time":"2021-08-31T08:45:26+00:00","article_modified_time":"2022-08-23T03:16:52+00:00","og_image":[{"width":1254,"height":837,"url":"https:\/\/d1m75rqqgidzqn.cloudfront.net\/wp-data\/2021\/08\/31140404\/iStock-962366210.jpg","type":"image\/jpeg"}],"author":"Great Learning Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/Great_Learning","twitter_site":"@Great_Learning","twitter_misc":{"Written by":"Great Learning Editorial Team","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#article","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/"},"author":{"name":"Great Learning Editorial Team","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad"},"headline":"How to survive a cyberattack: A cyberattack survival guide","datePublished":"2021-08-31T08:45:26+00:00","dateModified":"2022-08-23T03:16:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/"},"wordCount":1400,"commentCount":0,"publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/","url":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/","name":"How to survive a cyberattack: A cyberattack survival guide","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg","datePublished":"2021-08-31T08:45:26+00:00","dateModified":"2022-08-23T03:16:52+00:00","description":"Cyberattacks can cost you data and peace. As hackers find ways to launch their cyberattack, it has become significant to keep remedial measures in hand.","breadcrumb":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#primaryimage","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg","width":1254,"height":837,"caption":"cyberattack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-to-survive-a-cyberattack-a-cyberattack-survival-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mygreatlearning.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.mygreatlearning.com\/blog\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"How to survive a cyberattack: A cyberattack survival guide"}]},{"@type":"WebSite","@id":"https:\/\/www.mygreatlearning.com\/blog\/#website","url":"https:\/\/www.mygreatlearning.com\/blog\/","name":"Great Learning Blog","description":"Learn, Upskill &amp; Career Development Guide and Resources","publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"alternateName":"Great Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mygreatlearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization","name":"Great Learning","url":"https:\/\/www.mygreatlearning.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","width":900,"height":900,"caption":"Great Learning"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreatLearningOfficial\/","https:\/\/x.com\/Great_Learning","https:\/\/www.instagram.com\/greatlearningofficial\/","https:\/\/www.linkedin.com\/school\/great-learning\/","https:\/\/in.pinterest.com\/greatlearning12\/","https:\/\/www.youtube.com\/user\/beaconelearning\/"],"description":"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.","email":"info@mygreatlearning.com","legalName":"Great Learning Education Services Pvt. Ltd","foundingDate":"2013-11-29","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad","name":"Great Learning Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","caption":"Great Learning Editorial Team"},"description":"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.","sameAs":["https:\/\/www.mygreatlearning.com\/","https:\/\/in.linkedin.com\/school\/great-learning\/","https:\/\/x.com\/https:\/\/twitter.com\/Great_Learning","https:\/\/www.youtube.com\/channel\/UCObs0kLIrDjX2LLSybqNaEA"],"award":["Best EdTech Company of the Year 2024","Education Economictimes Outstanding Education\/Edtech Solution Provider of the Year 2024","Leading E-learning Platform 2024"],"url":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg",1254,837,false],"thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-150x150.jpg",150,150,true],"medium":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-768x513.jpg",768,513,true],"large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg",1254,837,false],"2048x2048":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210.jpg",1254,837,false],"web-stories-poster-portrait":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-640x837.jpg",640,837,true],"web-stories-publisher-logo":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-96x96.jpg",96,96,true],"web-stories-thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2021\/08\/iStock-962366210-150x100.jpg",150,100,true]},"uagb_author_info":{"display_name":"Great Learning Editorial Team","author_link":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"},"uagb_comment_info":0,"uagb_excerpt":"Introduction What is a cyber attack?&nbsp; How to survive a cyber attack? Post-attack remedial mechanisms How Kaseya, a software service provider, survive a cyber attack? Step 1: Mitigation Step 2: Remediation What to do after a cyber attack? Step 1: Identify what caused the attack and where the attack came from! Step 2: Set into&hellip;","_links":{"self":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/43956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/comments?post=43956"}],"version-history":[{"count":12,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/43956\/revisions"}],"predecessor-version":[{"id":72716,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/43956\/revisions\/72716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media\/43959"}],"wp:attachment":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media?parent=43956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/categories?post=43956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/tags?post=43956"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/content_type?post=43956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}