{"id":33237,"date":"2021-01-27T21:48:25","date_gmt":"2021-01-27T21:48:25","guid":{"rendered":"https:\/\/www.cleverfiles.com\/howto\/?p=33237"},"modified":"2021-01-27T21:48:25","modified_gmt":"2021-01-27T21:48:25","slug":"10-cybersecurity-tips-to-protect-your-data-from-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html","title":{"rendered":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks"},"content":{"rendered":"<p>Ransomware is a malicious trend where encryption is used to hold people&#8217;s data for ransom. Unfortunately, it has become a popular way to extort money from unsuspecting businesses. This is done through promises of restoring the encrypted data.<\/p>\r\n<p>Of course, there is no guarantee that this promise will ever be delivered on. Typically, file servers, database services, virtual machines, and cloud environments are hit.<\/p>\r\n<p><img class=\"aligncenter wp-image-33239 size-full\" src=\"\/howto\/wp-content\/uploads\/2021\/01\/data-protection.jpg\" alt=\"Tips to Protect Your Data from Ransomware Attacks\" width=\"1100\" height=\"557\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/data-protection.jpg 1100w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/data-protection-300x152.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/data-protection-500x253.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/data-protection-768x389.jpg 768w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><\/p>\r\n<p>There are a few different ways that ransomware can gain access to a computer. Generally, it exploits a security hole or tricks someone into installing it. One of the most common ways is via phishing spam &#8211; using emails with attachments that look like they can be trusted.<\/p>\r\n<p>Once they&#8217;re downloaded and opened, they can take over the computer. Attacks that exploit security holes don&#8217;t even require a user to accidentally let them in.<\/p>\r\n<div class=\"alert alert-info\" role=\"alert\">&#x1f4a1; Ransomware usually targets corporate, enterprise, and government entities. It&#8217;s estimated that <a href=\"https:\/\/www.beazley.com\/documents\/Whitepapers\/201802-beazley-breach-briefing.pdf\">45% of ransomware attacks<\/a> target healthcare organizations. <a href=\"https:\/\/betanews.com\/2018\/05\/22\/financial-institutions-ransomware\/\">90% of financial institutions<\/a> were apparently targeted by a ransomware attack in 2017. But no one is immune &#8211; it also targets individuals and businesses of any size. Ransomware attacks are estimated to target businesses <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\">every 11 seconds by 2021<\/a>. This number doesn&#8217;t include individuals, who are attacked even more frequently. Damage costs are set to reach $20 billion USD by next year.<\/div>\r\n<p>Businesses need to adapt as digital trends and threats change. There are constantly new things to respond to in the digital world. They can lead to new avenues for growth, but also the potential for issues. Malicious software such as ransomware can be a scary prospect for anyone. A digital transformation might be needed to ensure you&#8217;re as protected as possible.<\/p>\r\n<p>Thankfully, there are ways to improve practices and software to fight against ransomware. Here are some steps you can take to ensure your data is as protected as possible.<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"tips_to_protect_your_data_from_ransomware_attacks\"><\/span>Tips to Protect Your Data from Ransomware Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<h3><span class=\"ez-toc-section\" id=\"1_use_a_trusted_firewall_and_antivirus\"><\/span>#1 Use a trusted firewall and antivirus.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>No antivirus is perfect, but it can go a long way to preventing attacks. Some antivirus software even has added ransomware protection. You&#8217;ll want to use one that comes with email filters that can block known phishing emails. They can also have a malicious network filter that can help to keep you safer online. Make sure your system is protected and your software is up to date, and that scans are run regularly. There is lots of <a href=\"https:\/\/www.cleverfiles.com\/howto\/activation-code-keygen.html\">fake software around<\/a>, so it&#8217;s important to use an antivirus from a reputable company.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"2_keep_all_operating_systems_up_to_date\"><\/span>#2 Keep all operating systems up to date.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Many past attacks were so serious because people were <a href=\"https:\/\/theconversation.com\/the-petya-ransomware-attack-shows-how-many-people-still-dont-install-software-updates-77667\">not updating their systems<\/a>. One case showed <a href=\"https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2017\/05\/15\/the-era-of-cyber-disaster-may-finally-be-here\/\">hundreds of thousands of computers<\/a> in 150+ countries to be outdated.<\/p>\r\n<p>Updates ensure that you benefit from the latest security patches. Attackers are always looking to exploit vulnerabilities in unpatched applications and operating systems. Therefore, keeping your operating system patched and up-to-date is essential. You will have fewer vulnerabilities to exploit, lowering your chances of being targeted.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"3_make_sure_staff_always_think_before_clicking_on_anything\"><\/span>#3 Make sure staff always think before clicking on anything.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>No matter how good your software, you need to have switched-on employees to protect your business. Social engineering is currently the main vector for ransomware. This refers to manipulating or deceiving someone to gain control over computer systems.<\/p>\r\n<p>The hacker might use the phone, email, or direct contact to gain illegal access. Training employees on how to recognize and defend against cyberattacks, though, is often overlooked. Yet it could possibly be the most important key in combating ransomware attacks.<\/p>\r\n<p><img class=\"aligncenter size-full wp-image-33248\" src=\"\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg\" alt=\"ransomware\" width=\"1000\" height=\"389\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg 1000w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1-300x117.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1-500x195.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1-768x299.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\r\n<p>Ensure you have appropriately trained your staff in identifying suspicious calls and emails. Keep their training up to date so they know what to look out for. Phishing simulation programs can be used to maximize the effectiveness of training.<\/p>\r\n<p>There are also some easy and effective tricks that can help. For example, get staff to hover first over any links in an email, not click on them immediately. They can then check that the destination URL matches the destination site expected. Attackers will often claim they&#8217;re from the IT department. They then trick staff into downloading malware or exposing data. Make sure staff know to contact their IT department if they receive suspicious calls or emails.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"4_encourage_employees_to_discuss_cybersecurity_openly\"><\/span>#4 Encourage employees to discuss cybersecurity openly.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Collaboration is the best way to get most things done. When your employees are working together, everything runs more smoothly. This can also help with warding off these sorts of attacks. Sharing information and discussing suspicious emails or calls will ensure everyone is prepared. It helps employees to understand risks and be comfortable getting a second opinion. Fostering collaboration could make staff less likely to install suspicious files without checking.<\/p>\r\n<blockquote>\r\n<p>The personal details of 9 million customers were accessed after <a href=\"https:\/\/www.nytimes.com\/2020\/05\/19\/business\/easyjet-hacked.html\">EasyJet faced a cyber attack<\/a> in May 2020, with 2,200 customer credit card details stolen by the hackers.<\/p>\r\n<\/blockquote>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"5_encrypt_everything_you_can\"><\/span>#5 Encrypt everything you can.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Encrypting as many things as possible will help to add another layer of protection. This will make you far less vulnerable to opportunistic attacks.<\/p>\r\n<p>Using a VPN can help hide your real IP and location from hackers by encrypting your traffic. You will especially want to use a VPN if your employees are accessing public Wi-Fi. It would be worth implementing a VPN for any mobile or remote employees.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"6_scan_all_incoming_mail\"><\/span>#6 Scan all incoming mail.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Use content scanning and filtering on your mail servers. Google reports blocking more than <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond\">100 million phishing emails<\/a> on their servers daily. In fact, <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\">91% of cyberattacks<\/a> begin with a spear-phishing email. Inbound emails should be scanned by software for known threats.<\/p>\r\n<p>Any attachment types that could pose a threat should be blocked immediately. There are also browser plug-ins that inhibit the automatic download of malicious content. As already mentioned, employees should receive training in identifying anything that looks dodgy. There are some specific tips that they can use to manually scan emails themselves.<\/p>\r\n<p><img class=\"img-rounded border-gray aligncenter wp-image-33250 size-full\" src=\"\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail.png\" alt=\"protect from phishing mails\" width=\"2608\" height=\"712\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail.png 2608w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail-300x82.png 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail-500x137.png 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail-768x210.png 768w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail-1536x419.png 1536w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/phishing-mail-2048x559.png 2048w\" sizes=\"(max-width: 2608px) 100vw, 2608px\" \/><\/p>\r\n<p>Train staff to check if incoming addresses match the name of the sender. Then, to see whether the domain of the company is correct. Make sure your email client displays the sender&#8217;s email address and not just their display name.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"7_protect_your_phone_lines\"><\/span>#7 Protect your phone lines.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Previous attacks have shown that they can also be initiated over the phone, not just via email. Ensure you have a reliable <a href=\"https:\/\/www.ringcentral.com\/virtual-phone-service.html\">virtual office phone service<\/a>. Unfortunately, VoIP attacks are on the rise, leaving phone systems vulnerable. You will want to ensure you have <a href=\"https:\/\/www.ringcentral.com\/office\/features\/call-recording\/overview.html\">VoIP call recording<\/a>.<\/p>\r\n<p>This will help to identify problems and support your employees. Use an <a href=\"https:\/\/www.ringcentral.com\/office\/features\/auto-attendant\/overview.html\">automated phone system<\/a> to manage call volume, including potentially dangerous calls. Caller identification systems can authenticate calling numbers via certificates. Malicious sources of calls can also be tagged and blocked. Be sure to research the best call center software to ensure your contact center is supported.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"8_protect_files_when_sharing_them\"><\/span>#8 Protect files when sharing them.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Protect your information and privacy when sharing documents with people outside your organization. Password protect your documents so only select viewers will have access to them. Ensuring you have secure content will close up one potential hole for an attack.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"9_regularly_check_the_health_of_your_websites\"><\/span>#9 Regularly check the health of your websites.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Malware can impact website loading time, slowing it down as it mines for data. Hackers don\u2019t always announce their intrusion immediately, while they gather information. Hackers may have directed files from another server to load along with your page. It is possible for undercover malicious activity to use your own server resources.\u00a0<\/p>\r\n<p>If your website is loading slowly, this could be the reason for it. You will need to intervene, protecting your files before the attackers hit.<\/p>\r\n<hr \/>\r\n<h3><span class=\"ez-toc-section\" id=\"10_regularly_backup_your_data\"><\/span>#10 Regularly backup your data.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Even the best digital transformation and most secure systems can&#8217;t guarantee total protection. It&#8217;s unfortunate but true. You can lower your risks significantly, but there is always a chance that you could still be targeted. In most cases, once the ransomware has been released into your device there is little you can do. That is unless you have a backup or security software in place. With the right backup strategy, your files can survive an infection. In the unfortunate case that you do fall prey to an attack, you will need to make sure you&#8217;re in control of the situation. Perform backups of your data regularly and often. Ensure you have a good, trusted backup of all your information that you can restore any impacted files from.\u00a0<\/p>\r\n<p>It\u2019s not recommended to give in to the demands of ransomware. Restoration of your files from a backup is the best way to regain access to your data. There are also options to <a href=\"\/recover-deleted-files.html\">recover lost data and files<\/a> without giving in to the ransom demands. There are some initiatives that can help in a ransomware situation. But don&#8217;t rely only on their efficacy, make sure you and your business are prepared and protected.<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p>Protecting your data will help safeguard your employees and information against an attack. However, it&#8217;s also important to do so for your customer service experience. Customers want to feel safe with the companies they engage with.\u00a0<\/p>\r\n<p>They want to be confident that their information is safe, too. So make sure you follow these steps to ensure safety for your business. But also to protect your customers and your overall reputation within your industry.<\/p>","protected":false},"excerpt":{"rendered":"Ransomware is a malicious trend where encryption is used to hold people&#8217;s data for ransom. Unfortunately, it has become a popular way to extort money from unsuspecting businesses. This is done through promises of restoring the encrypted data. Of course,&#8230;","protected":false},"author":7881,"featured_media":33248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2648],"tags":[],"class_list":{"0":"post-33237","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech-related-articles"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a malicious trend where encryption is used to hold people&#8217;s data for ransom. Unfortunately, it has become a popular way to extort money from unsuspecting businesses. This is done through promises of restoring the encrypted data. Of course,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html\" \/>\n<meta property=\"og:site_name\" content=\"Data recovery tips. Recover deleted files on Mac, Windows.\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Allen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Data recovery tips. Recover deleted files on Mac, Windows.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Cleverfiles\" \/>\n<meta name=\"twitter:site\" content=\"@Cleverfiles\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Allen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html","og_locale":"en_US","og_type":"article","og_title":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks","og_description":"Ransomware is a malicious trend where encryption is used to hold people&#8217;s data for ransom. Unfortunately, it has become a popular way to extort money from unsuspecting businesses. This is done through promises of restoring the encrypted data. Of course,...","og_url":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html","og_site_name":"Data recovery tips. Recover deleted files on Mac, Windows.","og_image":[{"width":1000,"height":389,"url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","type":"image\/jpeg"}],"author":"John Allen","twitter_card":"summary_large_image","twitter_title":"Data recovery tips. Recover deleted files on Mac, Windows.","twitter_image":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","twitter_creator":"@Cleverfiles","twitter_site":"@Cleverfiles","twitter_misc":{"Written by":"John Allen","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#article","isPartOf":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html"},"author":{"name":"John Allen","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/7489b70de8a4245ed0e1438fc9f9e7eb"},"headline":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks","datePublished":"2021-01-27T21:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html"},"wordCount":1546,"publisher":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#organization"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#primaryimage"},"thumbnailUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","articleSection":["Tech Related Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html","url":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html","name":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks","isPartOf":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#primaryimage"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#primaryimage"},"thumbnailUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","datePublished":"2021-01-27T21:48:25+00:00","breadcrumb":{"@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#primaryimage","url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","contentUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/01\/laptop-computer-with-system-being-locked-by-ransomware-1.jpg","width":1000,"height":389,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cleverfiles.com\/howto\/cybersecurity-tips-to-protect-data.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/www.cleverfiles.com\/howto\/fr\/"},{"@type":"ListItem","position":2,"name":"10 Cybersecurity Tips to Protect Your Data from Ransomware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.cleverfiles.com\/howto\/#website","url":"https:\/\/www.cleverfiles.com\/howto\/","name":"Data recovery tips. Recover deleted files on Mac, Windows.","description":"","publisher":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cleverfiles.com\/howto\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cleverfiles.com\/howto\/#organization","name":"CleverFiles","url":"https:\/\/www.cleverfiles.com\/howto\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/logo\/image\/","url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/07\/dd-mac-1024-flat.png","contentUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/07\/dd-mac-1024-flat.png","width":512,"height":512,"caption":"CleverFiles"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Cleverfiles"]},{"@type":"Person","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/7489b70de8a4245ed0e1438fc9f9e7eb","name":"John Allen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/210165c55d00a6ecd57450b19b48e4d9685db42115ed2cf2a9889b26dc64100c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/210165c55d00a6ecd57450b19b48e4d9685db42115ed2cf2a9889b26dc64100c?s=96&d=mm&r=g","caption":"John Allen"},"description":"John Allen is Director, Global SEO at RingCentral, a global UCaaS and internet phone service provider. He has over 14 years of experience and an extensive background in building and optimizing digital marketing programs. His work spans SEM, paid media, mobile, social, and email marketing with a particular focus on new customer acquisition and revenue boost. John has been brought on as an SEO expert for marketing and California-based digital creatives agencies and organizations such as Splunk and Fourandhalf. There, he integrated best-in-class SEO website integration and frequently collaborated with development teams to define code-based improvements. He has also spearheaded training for account managers and sales teams in understanding prospect dialogue and feedback to develop approaches to selling SEO as a service. John's approaches range from pre-sales situations to actual sales practice. John's previous efforts to remedy Splunk's troubled webpage rankings, quality of traffic and customer acquisition pipeline due to HTML\/CSS and content issues have resulted in over 3,126 first page ranking, increased pipeline quality from organic search traffic, and overall improved ROI. Through collaboration with web development, publishing, and content teams, he was able to help Splunk acquire nearly 2,200 new customers with a 42% increase in revenue. Currently, John is part of RingCentral where he handles forecasting, developing, and regularly evaluating KPIs and key metrics such as website traffic, lead generation, pipeline, and revenue. He also cultivates external relationships with agencies and contact lawyers while enforcing SEO guidelines to keep partners aligned to high standards and SEO initiatives. John also plans, executes, budgets, and adapts global SEO strategies based on proven methodologies and extensive data analysis. Also well-versed in content creation himself, John spends much of his time developing articles for thought leadership on topics such as business technology and management, digital marketing, customer service, and remote team productivity and management. He has written for websites such as MarketScale and RTinsights.","sameAs":["johnlallen"],"url":"https:\/\/www.cleverfiles.com\/howto\/author\/johnallen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/33237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/users\/7881"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/comments?post=33237"}],"version-history":[{"count":11,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/33237\/revisions"}],"predecessor-version":[{"id":33252,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/33237\/revisions\/33252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/media\/33248"}],"wp:attachment":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/media?parent=33237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/categories?post=33237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/tags?post=33237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}