{"id":10904,"date":"2017-05-15T08:32:50","date_gmt":"2017-05-15T12:32:50","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=10904"},"modified":"2017-05-23T15:31:01","modified_gmt":"2017-05-23T19:31:01","slug":"wannacry-ransomware","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/","title":{"rendered":"What you need to know about the WannaCry Ransomware"},"content":{"rendered":"<h2>What has happened?<\/h2>\n<p>On May 12, 2017 a new variant of the <a href=\"https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2016-041912-5637-99\" target=\"_blank\" rel=\"noopener noreferrer\">Ransom.CryptXXX<\/a> ransomware family (detected as <a href=\"https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2017-051310-3522-99\" target=\"_blank\" rel=\"noopener noreferrer\">Ransom.Wannacry<\/a>) began spreading widely, impacting a large number of organizations, particularly in Europe.<\/p>\n<h2>What is the WannaCry ransomware?<\/h2>\n<p>WannaCry encrypts data files and asks users to pay a US$300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days, the encrypted files will be deleted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10905\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\" alt=\"\" width=\"550\" height=\"411\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry-300x224.jpg 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p class=\"ng-scope\" style=\"text-align: center;\"><em>Figure 1. Ransom demand screen displayed by the WannaCry Trojan<\/em><\/p>\n<p class=\"ng-scope\">It also drops a file named !Please Read Me!.txt which contains the\u00a0ransom note.<\/p>\n<p class=\"ng-scope\"><a href=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/2cry.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10906\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/2cry.png\" alt=\"\" width=\"615\" height=\"363\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/2cry.png 615w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/2cry-300x177.png 300w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. Ransom demand note from WannaCry Trojan<\/em><\/p>\n<p style=\"text-align: left;\">It propagates to other computers by exploiting a known SMB\u00a0remote code execution\u00a0vulnerability (<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MS17-010<\/a>) in Microsoft Windows computers.<\/p>\n<h2>Are you\u00a0protected against this threat?<\/h2>\n<p>South Jersey Techies, LLC recommends and offers Symantec Endpoint Protection to its clients.\u00a0Symantec Endpoint Protection customers are protected against WannaCry using a combination of technologies:\u00a0Antivirus,\u00a0SONAR protection,\u00a0Network-based protection.<\/p>\n<p>All <a href=\"https:\/\/southjerseytechies.net\/managed-it-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">South Jersey Techies Managed IT Services<\/a>\u00a0client computers have the latest Windows security updates installed, in particular MS17-010, to prevent spreading. If your business \/ organization is not on our <a href=\"https:\/\/southjerseytechies.net\/managed-it-services\/\">Managed IT Services<\/a> plan please\u00a0check or <a href=\"https:\/\/southjerseytechies.net\/about\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a> to ensure that you have the latest updates installed.<\/p>\n<h2 class=\"ng-scope\">Who is impacted?<\/h2>\n<p class=\"ng-scope\">A number of organizations globally have been affected, the majority of which are in Europe.<\/p>\n<h2 class=\"ng-scope\">Is this a targeted attack?<\/h2>\n<p class=\"ng-scope\">No, this is not believed to be a targeted attack at this time. Ransomware campaigns are typically indiscriminate.<\/p>\n<h2 class=\"ng-scope\">Can I recover the encrypted files?<\/h2>\n<p class=\"ng-scope\">Decryption is not available at this time but companies are investigating. South Jersey Techies, LLC does not recommend paying the ransom. Encrypted files should be restored from back-ups where possible.\u00a0South Jersey Techies offers a number of backup solutions including <a href=\"https:\/\/southjerseytechies.net\/online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">Carbonite Online Backup<\/a>\u00a0and <a href=\"https:\/\/southjerseytechies.net\/cloud.php\">cloud storage solutions<\/a>. If you are unsure about your computer \/ server backups, please check or <a href=\"https:\/\/southjerseytechies.net\/about\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a> to discuss the best solution for your business.<\/p>\n<h2 class=\"ng-scope\">What are best practices for protecting against ransomware?<\/h2>\n<ul class=\"ng-scope\">\n<li>New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them.<\/li>\n<li>Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.<\/li>\n<li>Email is one of the main infection methods. Be wary of unexpected emails\u00a0especially if they contain links and\/or attachments.<\/li>\n<li>Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.<\/li>\n<li>Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However organizations should ensure that back-ups are appropriately protected or stored off-line so that attackers can\u2019t delete them.<\/li>\n<li>Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to \u201croll back\u201d to the unencrypted form.<\/li>\n<\/ul>\n<h2 class=\"ng-scope\">Have additional questions?<\/h2>\n<p>Feel free to call us at <a href=\"https:\/\/southjerseytechies.net\/about\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a>\u00a0or (856) 745-9990 with any questions you may have.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What has happened? On May 12, 2017 a new variant of the Ransom.CryptXXX ransomware family (detected as Ransom.Wannacry) began spreading widely, impacting a large number of organizations, particularly in Europe. What is the WannaCry ransomware? WannaCry encrypts data files and &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":10905,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[211,1664,352,142,16,580,1986,674],"tags":[2086,2087,2085,2084],"class_list":["post-10904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-laptops","category-microsoft","category-pcs","category-security","category-windows","category-windows-2012-server","category-windows-7","category-windows-8-1","tag-ransom-cryptxxx","tag-ransom-wannacry","tag-ransomware","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - What you need to know about the WannaCry Ransomware<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"South Jersey Techies - What you need to know about the WannaCry Ransomware\" \/>\n<meta property=\"og:description\" content=\"What has happened? On May 12, 2017 a new variant of the Ransom.CryptXXX ransomware family (detected as Ransom.Wannacry) began spreading widely, impacting a large number of organizations, particularly in Europe. What is the WannaCry ransomware? WannaCry encrypts data files and &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T12:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-23T19:31:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/a1375c4442c14bec9ac2daa6426e2cec\"},\"headline\":\"What you need to know about the WannaCry Ransomware\",\"datePublished\":\"2017-05-15T12:32:50+00:00\",\"dateModified\":\"2017-05-23T19:31:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\"},\"wordCount\":567,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\",\"keywords\":[\"Ransom.CryptXXX\",\"Ransom.Wannacry\",\"ransomware\",\"WannaCry\"],\"articleSection\":[\"Laptops\",\"Microsoft\",\"PCs\",\"Security\",\"Windows\",\"Windows 2012 Server\",\"Windows 7\",\"Windows 8.1\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\",\"name\":\"South Jersey Techies - What you need to know about the WannaCry Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\",\"datePublished\":\"2017-05-15T12:32:50+00:00\",\"dateModified\":\"2017-05-23T19:31:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg\",\"width\":400,\"height\":299},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you need to know about the WannaCry Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/a1375c4442c14bec9ac2daa6426e2cec\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/sj-techies\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - What you need to know about the WannaCry Ransomware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"South Jersey Techies - What you need to know about the WannaCry Ransomware","og_description":"What has happened? On May 12, 2017 a new variant of the Ransom.CryptXXX ransomware family (detected as Ransom.Wannacry) began spreading widely, impacting a large number of organizations, particularly in Europe. What is the WannaCry ransomware? WannaCry encrypts data files and &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2017-05-15T12:32:50+00:00","article_modified_time":"2017-05-23T19:31:01+00:00","og_image":[{"width":400,"height":299,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","type":"image\/jpeg"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/a1375c4442c14bec9ac2daa6426e2cec"},"headline":"What you need to know about the WannaCry Ransomware","datePublished":"2017-05-15T12:32:50+00:00","dateModified":"2017-05-23T19:31:01+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/"},"wordCount":567,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","keywords":["Ransom.CryptXXX","Ransom.Wannacry","ransomware","WannaCry"],"articleSection":["Laptops","Microsoft","PCs","Security","Windows","Windows 2012 Server","Windows 7","Windows 8.1"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/","url":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/","name":"South Jersey Techies - What you need to know about the WannaCry Ransomware","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","datePublished":"2017-05-15T12:32:50+00:00","dateModified":"2017-05-23T19:31:01+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","width":400,"height":299},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/wannacry-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"What you need to know about the WannaCry Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/a1375c4442c14bec9ac2daa6426e2cec","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4ad6c975b960e6de6d438b15df7d322b34ea121a183b748a4fbbc893dfc6316?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/sj-techies\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/wcry.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-2PS","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/10904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=10904"}],"version-history":[{"count":5,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/10904\/revisions"}],"predecessor-version":[{"id":10914,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/10904\/revisions\/10914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/10905"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=10904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=10904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=10904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}