{"id":1876,"date":"2025-11-21T01:18:22","date_gmt":"2025-11-21T07:18:22","guid":{"rendered":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/?p=1876"},"modified":"2025-11-21T01:18:23","modified_gmt":"2025-11-21T07:18:23","slug":"how-to-build-a-ransomware-response-playbook-before-you-need-one","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/how-to-build-a-ransomware-response-playbook-before-you-need-one\/","title":{"rendered":"How to Build a Ransomware Response Playbook Before You Need One"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Ransomware attacks are escalating in both sophistication and frequency. For small and medium-sized businesses, one successful attack can disrupt operations, destroy trust, and cost millions. The key to resilience isn\u2019t just prevention, it&#8217;s preparation.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A ransomware response playbook equips your team with a clear roadmap to detect, contain, and recover quickly. This guide shows how to build one <\/span><i><span style=\"font-weight: 400\">before<\/span><\/i><span style=\"font-weight: 400\"> you need it, integrating best practices, team structure, and lessons from real-world recovery efforts.<\/span><\/p>\n<h2><b>Defining the Purpose of Your Playbook<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A ransomware playbook is your company\u2019s incident manual, a defined procedure that ensures fast, coordinated action during a breach. Its goals include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimizing downtime and financial loss.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Preserving evidence for investigation.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Communicating transparently with stakeholders.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Meeting legal and<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/compliance-isnt-optional-why-bothell-small-businesses-need-a-proactive-it-partner-to-stay-audit-ready\/\"> <span style=\"font-weight: 400\">compliance standards<\/span><\/a><span style=\"font-weight: 400\">.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Restoring operations from clean backups.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">By having a well-documented process in place, your team can focus on execution rather than panic.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1878\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014223.640-1024x535.png\" alt=\"\" width=\"727\" height=\"380\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014223.640-1024x535.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014223.640-300x157.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014223.640-768x401.png 768w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014223.640.png 1200w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><\/p>\n<h2><b>Assembling the Right Response Team<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The first step in your playbook is identifying who does what. During a crisis, clarity of roles saves precious time.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Your Incident Response Team (IRT) should include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Incident Commander:<\/b><span style=\"font-weight: 400\"> Oversees the entire response and makes key decisions.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Technical Lead:<\/b><span style=\"font-weight: 400\"> Manages containment, eradication, and<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/protecting-your-endpoints-why-advanced-edr-matters-for-businesses-in-bothell-and-renton\/\"> <span style=\"font-weight: 400\">endpoint protection<\/span><\/a><span style=\"font-weight: 400\">.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Communications Lead:<\/b><span style=\"font-weight: 400\"> Handles internal and external messaging.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Legal Advisor:<\/b><span style=\"font-weight: 400\"> Ensures compliance with breach notification laws.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Vendor Liaison:<\/b><span style=\"font-weight: 400\"> Coordinates external experts and IT partners.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Document contact details and escalation paths. Store copies offline to ensure accessibility during system lockouts.<\/span><\/p>\n<h2><b>Detection: Identifying the Attack Early<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Speed is your best defense. The earlier you detect ransomware, the easier it is to limit damage.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Build a detection protocol that defines:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">What constitutes suspicious behavior (e.g., sudden file encryption, failed backups).<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to escalate alerts from your<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/why-modern-businesses-in-bothell-and-renton-need-siem-tools-like-microsoft-sentinel\/\"> <span style=\"font-weight: 400\">security management<\/span><\/a><span style=\"font-weight: 400\"> systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to preserve affected systems and evidence.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Integrate AI-based detection tools that continuously monitor for anomalies, flagging potential ransomware activity before it spreads.<\/span><\/p>\n<h2><b>Containment: Isolating the Threat<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Once ransomware is detected, the next move is swift containment. The goal is to prevent further infection without destroying valuable forensic data.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Your containment strategy should include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Disconnecting infected systems from all networks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Blocking unauthorized access through firewalls and VPNs.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Disabling compromised user credentials.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Coordinating containment through<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/the-strategic-value-of-managed-services-how-cmit-solutions-of-bothell-and-renton-fuels-business-growth\/\"> <span style=\"font-weight: 400\">managed IT<\/span><\/a><span style=\"font-weight: 400\"> support to ensure every layer endpoint, network, and cloud is covered.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Every minute counts. A clear containment checklist allows teams to act instantly and decisively.<\/span><\/p>\n<h2><b>Eradication: Removing the Infection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Eradication is about completely removing the ransomware payload, backdoors, and any secondary infections.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Effective steps include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cleaning affected machines using verified recovery tools.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Restoring systems from trusted images.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Patching exploited vulnerabilities.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resetting credentials and keys organization-wide.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Having a proactive<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/multi-layered-security-that-works-strengthening-cyber-defense-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">cyber defense<\/span><\/a><span style=\"font-weight: 400\"> plan in place ensures these eradication measures can begin immediately without confusion.<\/span><\/p>\n<h2><b>Recovery: Getting Back to Business<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Recovery focuses on restoring data and system functionality without reintroducing the threat.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Your recovery phase should define:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Verified<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/data-backup-and-disaster-recovery-safeguarding-business-continuity-for-small-teams-and-startups-in-washington\/\"> <span style=\"font-weight: 400\">data backups<\/span><\/a><span style=\"font-weight: 400\"> to restore from clean sources.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Testing backup integrity before reconnecting to production.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Prioritizing mission-critical systems and applications.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Using layered<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/building-a-reliable-disaster-recovery-plan-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">disaster recovery<\/span><\/a><span style=\"font-weight: 400\"> strategies to minimize downtime.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Automated backup verification and offline copies are essential. Relying solely on cloud-syncing tools can risk restoring encrypted files.<\/span><\/p>\n<h2><b>Communication: Managing Internal and External Messaging<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In a crisis, communication can either calm or confuse. Your playbook should include clear guidelines for both internal and public communication.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Pre-approved templates for staff, partners, and customers.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Coordination with your<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/hipaa-pci-and-beyond-navigating-it-compliance-with-confidence-for-washington-healthcare-providers\/\"> <span style=\"font-weight: 400\">IT compliance<\/span><\/a><span style=\"font-weight: 400\"> advisor before releasing statements.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Instructions for communicating with law enforcement or regulators.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Transparent but careful messaging builds trust while preserving your legal position.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1877\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014328.566-1024x535.png\" alt=\"\" width=\"741\" height=\"387\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014328.566-1024x535.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014328.566-300x157.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014328.566-768x401.png 768w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T014328.566.png 1200w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/p>\n<h2><b>Training and Tabletop Exercises<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A playbook only works if your team knows how to use it. Conduct regular tabletop exercises to rehearse each phase detection, containment, eradication, and recovery.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Effective drills:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Simulate a full-scale ransomware event annually.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Include executives and non-technical leaders.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Review timing, decision-making, and escalation accuracy.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Periodic testing helps uncover gaps and improves coordination with your<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/beyond-break-fix-why-proactive-it-support-is-the-future-for-bothell-and-renton-businesses\/\"> <span style=\"font-weight: 400\">proactive IT<\/span><\/a><span style=\"font-weight: 400\"> partners who will play a central role during real incidents.<\/span><\/p>\n<h2><b>Post-Incident Review and Continuous Improvement<\/b><\/h2>\n<p><span style=\"font-weight: 400\">After an incident or simulation, conduct a formal review. Identify what worked, what didn\u2019t, and what must change.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Technical analysis of the ransomware strain and entry point.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cost and downtime assessment.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Updates to your<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/cybersecurity-in-the-cloud-era-how-cmit-solutions-of-bothell-and-renton-protects-your-business-from-evolving-threats\/\"> <span style=\"font-weight: 400\">cloud security<\/span><\/a><span style=\"font-weight: 400\"> posture.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">New patching or access control measures.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Document these findings and integrate lessons learned into your next playbook revision.<\/span><\/p>\n<h2><b>Partnering for Preparedness<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Building and maintaining an effective ransomware response playbook is a major responsibility but it doesn\u2019t have to be done alone.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Partnering with an experienced provider like <\/span><b>CMIT Solutions of Bothell and Renton<\/b><span style=\"font-weight: 400\"> ensures:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">24\/7 monitoring and threat detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Expert-led remediation and recovery.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous updates to align with new ransomware variants.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integrated<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/multi-layered-security-that-works-strengthening-cyber-defense-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">multi-layered security<\/span><\/a><span style=\"font-weight: 400\"> across cloud, endpoint, and network systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">With proactive support, your business can stay resilient, compliant, and ready for whatever comes next.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The best time to build your ransomware response playbook is <\/span><i><span style=\"font-weight: 400\">before<\/span><\/i><span style=\"font-weight: 400\"> an attack happens. A tested, structured, and well-communicated plan transforms panic into precision\u2014protecting your systems, your reputation, and your bottom line.<\/span><\/p>\n<p><span style=\"font-weight: 400\">CMIT Solutions of Bothell and Renton delivers the expertise and tools your business needs to stay one step ahead, combining advanced<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/the-strategic-value-of-managed-services-how-cmit-solutions-of-bothell-and-renton-fuels-business-growth\/\"> <span style=\"font-weight: 400\">managed IT<\/span><\/a><span style=\"font-weight: 400\"> operations with proven ransomware resilience strategies.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-978\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1-300x75.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are escalating in both sophistication and frequency. For small and&#8230;<\/p>\n","protected":false},"author":1041,"featured_media":1879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[24,22,16,20,28,17,27,35,40,23,36,25],"class_list":["post-1876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-backup-and-recovery-strategy","tag-backup-plan-for-ransomware","tag-cmit-bothell","tag-cmit-bothell-cybersecurity","tag-cmit-bothell-it-communication","tag-cmit-renton","tag-cmit-renton-communication-tech","tag-digital-employee-experience","tag-hybrid-cloud","tag-it-support-renton-bothell","tag-it-suuport","tag-ransomware-protection-bothell"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts\/1876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/users\/1041"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/comments?post=1876"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts\/1876\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/media\/1879"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/media?parent=1876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/categories?post=1876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/tags?post=1876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}