{"id":5510,"date":"2026-02-16T15:47:28","date_gmt":"2026-02-16T20:47:28","guid":{"rendered":"https:\/\/rhesus.net\/ransomware-in-the-workplace-what-the-choc-fm-attack-teaches-us\/"},"modified":"2026-02-23T17:27:37","modified_gmt":"2026-02-23T22:27:37","slug":"ransomware-business-choc-fm","status":"publish","type":"post","link":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/","title":{"rendered":"Ransomware in the workplace: what the CHOC FM attack teaches us"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5510\" class=\"elementor elementor-5510 elementor-5283\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-334471c9 e-flex e-con-boxed e-con e-parent\" data-id=\"334471c9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b6d225 e-con-full e-flex e-con e-child\" data-id=\"5b6d225\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59137d7 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"59137d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;Aucun titre n\\u2019a \\u00e9t\\u00e9 trouv\\u00e9 sur cette page.&quot;,&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;,&quot;h6&quot;],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__59137d7\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__59137d7\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__59137d7\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53cddca e-con-full link-effect e-flex e-con e-child\" data-id=\"53cddca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd5d87a elementor-widget elementor-widget-text-editor\" data-id=\"1cd5d87a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On Saturday, February 14, 2026, around 8 PM, the team at CHOC FM in Portneuf turned on their computers to find a red screen. Every system encrypted. A message with an email address and a demand: $100,000 to get their data back.<\/p>\n<p>Audio files, archives, advertiser spots, years of recordings. All gone.<\/p>\n<h2>What happened<\/h2>\n<p>The concept is straightforward: malicious software gets into your systems, encrypts everything, then demands payment to unlock it. That&#8217;s ransomware. According to the <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">2025 Verizon Data Breach Investigations Report<\/a>, 88% of security breaches in SMBs involve this type of attack. CHOC FM is a real-world example.<\/p>\n<p>Michel Cloutier, the station&#8217;s director, put it simply: &#8220;We&#8217;re a regional station. We don&#8217;t have the budgets of large media groups like Bell Media or Cogeco.&#8221;<\/p>\n<p>Vicky Beaudoin, Vice-President of Rhesus: &#8220;We&#8217;re still in the assessment phase, but it&#8217;s highly likely that the attackers had silently planted the attack weeks, possibly even months ago.&#8221;<\/p>\n<p>That&#8217;s exactly what makes SMBs vulnerable. Cybercriminals don&#8217;t necessarily go after the biggest companies. They go after the least prepared ones.<\/p>\n<h2>What the CHOC FM case reveals<\/h2>\n<p>Michel Cloutier was transparent with the media about what happened, and his account illustrates a reality that many SMBs share without knowing it.<\/p>\n<p><b>The last complete backup was from 2022.<\/b> Four years without a usable backup. The administrative data survived because it was managed by an external company, but everything else &#8211; the music, the ads, the archives &#8211; didn&#8217;t have that protection. As Mr. Cloutier told <a href=\"https:\/\/www.lavoixdelest.ca\/actualites\/justice-et-faits-divers\/2026\/02\/15\/une-station-de-radio-victime-dune-cyberattaque-TNAWPHI6TRHWBOT65DY7ZLATYU\/\">Le Soleil<\/a>: &#8220;It&#8217;s like we have to start the station from scratch, like in 2020.&#8221;<\/p>\n<p>Mr. Cloutier acknowledged it himself: he didn&#8217;t think his station could be a target. It&#8217;s a reaction we hear often. &#8220;We&#8217;re too small to attract hackers.&#8221; But cybercriminals don&#8217;t choose their targets based on size. They look for doors that aren&#8217;t locked.<\/p>\n<p><b>Finances were already tight.<\/b> The station, which opened in 2020, survived the pandemic but the initial loan still hasn&#8217;t been paid off. When a cyberattack hits under those conditions, the $50,000-plus recovery cost becomes a very real blow. Mr. Cloutier&#8217;s message was clear: &#8220;I urge all businesses to protect themselves and always have a second backup copy.&#8221;<\/p>\n<h2>What SMBs can do right now<\/h2>\n<p>We&#8217;re not talking about spending hundreds of thousands of dollars. We&#8217;re talking about practical steps that would have changed the outcome for many of the organizations we&#8217;ve helped.<\/p>\n<ul>\n<li><b>Eliminate outdated operating systems.<\/b> Legacy systems lack security updates. They&#8217;re extremely easy vulnerabilities for hackers to exploit.<\/li>\n<li><b>Regular and rigorous maintenance.<\/b> Eliminate the gaps in your network infrastructure before someone else finds them.<\/li>\n<li><b>Back up your data externally with ransomware detection.<\/b> Today&#8217;s solutions offer automatic ransomware detection powered by artificial intelligence. Test your backups regularly and verify data integrity. Internal backups alone are no longer recommended. It&#8217;s doable, but you need a plan B.<\/li>\n<li><b>Complex passwords.<\/b> A complex and unique password for every application. Never reuse the same password in two places.<\/li>\n<li><b>Multi-factor authentication.<\/b> Download an authentication app to verify it&#8217;s actually you logging in. If your password is compromised, hackers will still need to obtain your 6-digit code. Quick tip: that code should never be shared with anyone claiming to be from a third-party company.<\/li>\n<li><b>Train and educate your teams.<\/b> Build organizational reflexes by training your teams on cybersecurity, running workshops and simulations, and offering personalized phishing campaigns. It&#8217;s a way to strengthen cybersecurity through the people themselves.<\/li>\n<li><b>When it happens, it&#8217;s too late to improvise.<\/b> A simple, accessible document that clearly says: here&#8217;s what we do if we get attacked. The numbers to call, the steps to follow in the first 30 minutes, who communicates what to whom. We&#8217;ve seen companies significantly limit the damage simply because they had a plan and everyone knew where to find it.<\/li>\n<li><b>Segment your network.<\/b> If one workstation gets compromised, does the attacker have access to everything? In many SMBs, the answer is yes. Separating environments (admin, production, backups) limits how far an attack can spread.<\/li>\n<li><b>Set up anti-spam protection.<\/b> Email is the number one vector for cyberattacks.<\/li>\n<li><b>Replace your router with a security appliance.<\/b> The gateway between your infrastructure and the internet is your router. Residential-grade routers have no place in a business. SMBs need a proper solution to secure their systems.<\/li>\n<\/ul>\n<p><\/p>\n<h2>The question everyone asks: should we pay?<\/h2>\n<p>It&#8217;s the first thing people want to know. The short answer: no.<\/p>\n<p>Paying guarantees nothing. As Sami Khoury, Canada&#8217;s senior cybersecurity official, stated in <a href=\"https:\/\/www.lapresse.ca\/actualites\/justice-et-faits-divers\/2026-01-28\/paiement-d-une-rancon-apres-une-cyberattaque\/il-n-y-a-aucune-garantie-que-les-criminels-vont-tenir-parole.php\">La Presse<\/a>: &#8220;There is no guarantee that criminals will keep their word when you pay the ransom.&#8221; Some groups take the money without providing the decryption key. Others come back with a second, even a third ransom demand.<\/p>\n<p>The <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/ransomware-how-to-prevent-and-recover-itsap00099\">Canadian Centre for Cyber Security<\/a> recommends not paying and reporting the incident to law enforcement.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d16c58c e-con-full e-flex e-con e-child\" data-id=\"d16c58c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a3a088 wide square bg-title elementor-widget elementor-widget-heading\" data-id=\"1a3a088\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa133d2 elementor-widget elementor-widget-n-accordion\" data-id=\"aa133d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;default_state&quot;:&quot;expanded&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1780\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1780\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What should you do in the first minutes of a cyberattack? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1780\" class=\"elementor-element elementor-element-d23a79e e-con-full e-flex e-con e-child\" data-id=\"d23a79e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b634e53 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"b634e53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Disconnect infected machines from the network immediately, Wi-Fi and cable. Don&#8217;t shut them down: they contain traces that are useful for the investigation. Alert your IT provider and call the S\u00fbret\u00e9 du Qu\u00e9bec or your local police. Our emergency line at 1 844 758 2220 is available around the clock for exactly this kind of situation. The first 30 minutes are critical: the faster you act, the more you limit the spread.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1781\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1781\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How much does a ransomware attack cost? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1781\" class=\"elementor-element elementor-element-ced9d59 e-con-full e-flex e-con e-child\" data-id=\"ced9d59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9a77c7 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"b9a77c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to Statistics Canada, ransomware-related costs for Canadian victims reached $1.2 billion in 2023. For an SMB like CHOC FM, the recovery bill is expected to exceed $50,000, not counting lost revenue during the downtime. We see it regularly: businesses without a recovery plan end up with a bill far higher than what prevention would have cost.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1782\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1782\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Are SMBs really targeted by ransomware? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1782\" class=\"elementor-element elementor-element-a079b63 e-con-full e-flex e-con e-child\" data-id=\"a079b63\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac64289 link-effect elementor-widget elementor-widget-text-editor\" data-id=\"ac64289\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes. Cybercriminals don&#8217;t go after the biggest companies. They go after the most vulnerable ones. The 2025 Verizon report shows that 88% of security breaches in SMBs involve ransomware. We see it with every incident we respond to: businesses with 10 to 200 employees are the most frequent targets, precisely because they assume they&#8217;re too small to attract hackers.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What should you do in the first minutes of a cyberattack?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Disconnect infected machines from the network immediately, Wi-Fi and cable. Don&#8217;t shut them down: they contain traces that are useful for the investigation. Alert your IT provider and call the S\\u00fbret\\u00e9 du Qu\\u00e9bec or your local police. Our emergency line at 1 844 758 2220 is available around the clock for exactly this kind of situation. The first 30 minutes are critical: the faster you act, the more you limit the spread.\"}},{\"@type\":\"Question\",\"name\":\"How much does a ransomware attack cost?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"According to Statistics Canada, ransomware-related costs for Canadian victims reached $1.2 billion in 2023. For an SMB like CHOC FM, the recovery bill is expected to exceed $50,000, not counting lost revenue during the downtime. We see it regularly: businesses without a recovery plan end up with a bill far higher than what prevention would have cost.\"}},{\"@type\":\"Question\",\"name\":\"Are SMBs really targeted by ransomware?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes. Cybercriminals don&#8217;t go after the biggest companies. They go after the most vulnerable ones. The 2025 Verizon report shows that 88% of security breaches in SMBs involve ransomware. We see it with every incident we respond to: businesses with 10 to 200 employees are the most frequent targets, precisely because they assume they&#8217;re too small to attract hackers.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-074d827 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet elementor-widget elementor-widget-spacer\" data-id=\"074d827\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc796cb elementor-widget elementor-widget-text-editor\" data-id=\"bc796cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>CHOC FM will recover<\/h2><br>The Portneuf community rallied quickly. A crowdfunding campaign was launched and donations are coming in. The team is working to get the station back on its feet, and broadcasting will resume.<br><br>What happened to CHOC FM can happen to any organization. A clinic, an accounting firm, a retail store, a municipality. The size of the business has nothing to do with the level of risk.<br><br>Rhesus is a managed IT services and cybersecurity firm based in Victoriaville, with offices in Sherbrooke and Mirabel. Our team of over 80 IT professionals has been supporting SMBs and organizations across Centre-du-Qu\u00e9bec, the Capitale-Nationale region, the Eastern Townships and the Laurentians for over 25 years. When CHOC FM needed help on a Saturday night, we were the ones they called. That&#8217;s what we do: prevention, support, and response when it matters most. And the lesson we take away from every incident remains the same: the difference between a crisis that drags on for weeks and one that gets resolved in days almost always comes down to three things. Do your backups actually work. Does your team know what to do. And does your IT partner pick up the phone on a Saturday night.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ec4571 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"4ec4571\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be1a883 e-flex e-con-boxed e-con e-child\" data-id=\"be1a883\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-52cbaec e-con-full e-flex e-con e-child\" data-id=\"52cbaec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afebd99 wide square-white bg-title elementor-widget elementor-widget-heading\" data-id=\"afebd99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">If you're wondering whether your organization is ready, reach out to our team.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa76981 elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"fa76981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/rhesus.net\/urgence-cyberattaque\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"66\" height=\"66\" viewBox=\"0 0 66 66\" fill=\"none\"><path d=\"M33 0C51.2254 0 66 14.7746 66 33C66 51.2254 51.2254 66 33 66C14.7746 66 0 51.2254 0 33C0 14.7746 14.7746 0 33 0ZM22.4707 21.2441C22.1446 20.9185 21.615 20.9182 21.2891 21.2441C20.9631 21.5701 20.9634 22.0997 21.2891 22.4258L41.7422 42.8779L25.916 42.5547C25.4553 42.5455 25.0731 42.9123 25.0635 43.373C25.0542 43.8339 25.421 44.215 25.8818 44.2246L43.7832 44.5898C44.0105 44.5945 44.2299 44.5065 44.3906 44.3457C44.5514 44.1849 44.6394 43.9656 44.6348 43.7383L44.2695 25.8369C44.2599 25.3761 43.8788 25.0092 43.418 25.0186C42.9572 25.0282 42.5904 25.4104 42.5996 25.8711L42.9229 41.6973L22.4707 21.2441Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Emergency line: 1 844 758 2220 | service@rhesus.net <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75714d2 wide elementor-mobile-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"75714d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"39\" height=\"39\" viewBox=\"0 0 39 39\" fill=\"none\"><path d=\"M19.5 0C30.2696 0 39 8.73045 39 19.5C39 30.2696 30.2696 39 19.5 39C8.73045 39 0 30.2696 0 19.5C0 8.73045 8.73045 0 19.5 0ZM12.9375 12C12.4197 12 12 12.4197 12 12.9375V14.8125C12 21.5435 17.4565 27 24.1875 27H26.0625C26.5803 27 27 26.5803 27 26.0625V24.0439C26.9999 23.5858 26.6687 23.1945 26.2168 23.1191L22.0576 22.4268C21.6518 22.3593 21.2495 22.5637 21.0654 22.9316L20.3398 24.3828C17.7393 23.3363 15.6637 21.2607 14.6172 18.6602L16.0684 17.9346C16.4363 17.7505 16.6407 17.3482 16.5732 16.9424L15.8809 12.7832C15.8055 12.3313 15.4142 12.0001 14.9561 12H12.9375Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">1 844 758 2220<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d2798b btn-aware elementor-widget elementor-widget-button\" data-id=\"6d2798b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/rhesus.net\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84302ae link-effect elementor-widget elementor-widget-text-editor\" data-id=\"84302ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>(no cost and no obligation)<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Table of contents On Saturday, February 14, 2026, around 8 PM, the team at CHOC FM in Portneuf turned on their computers to find a red screen. Every system encrypted. A message with an email address and a demand: $100,000 to get their data back. Audio files, archives, advertiser spots, years of recordings. All gone. [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware in the workplace: what the CHOC FM attack teaches us<\/title>\n<meta name=\"description\" content=\"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware in the workplace: what the CHOC FM attack teaches us\" \/>\n<meta property=\"og:description\" content=\"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/\" \/>\n<meta property=\"og:site_name\" content=\"RHESUS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RhesusInc\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T20:47:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T22:27:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1490\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vicky Beaudoin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vicky Beaudoin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/\"},\"author\":{\"name\":\"Vicky Beaudoin\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/#person-vicky-beaudoin\"},\"headline\":\"Ransomware in the workplace: what the CHOC FM attack teaches us\",\"datePublished\":\"2026-02-16T20:47:28+00:00\",\"dateModified\":\"2026-02-23T22:27:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/\"},\"wordCount\":1447,\"publisher\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Image-grid-4.jpg\",\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/\",\"url\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/\",\"name\":\"Ransomware in the workplace: what the CHOC FM attack teaches us\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Image-grid-4.jpg\",\"datePublished\":\"2026-02-16T20:47:28+00:00\",\"dateModified\":\"2026-02-23T22:27:37+00:00\",\"description\":\"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/ransomware-business-choc-fm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Image-grid-4.jpg\",\"contentUrl\":\"https:\\\/\\\/rhesus.net\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Image-grid-4.jpg\",\"width\":1490,\"height\":1080},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/rhesus.net\\\/en\\\/\",\"name\":\"Rhesus \u2013 Votre partenaire en technologies de l'information\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rhesus.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/rhesus.net\\\/en\\\/#\\\/schema\\\/person\\\/c247c80bf4d26692483e6f24010cab91\",\"name\":\"Vicky Beaudoin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g\",\"caption\":\"Vicky Beaudoin\"},\"sameAs\":[\"https:\\\/\\\/rhesus.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware in the workplace: what the CHOC FM attack teaches us","description":"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware in the workplace: what the CHOC FM attack teaches us","og_description":"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.","og_url":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/","og_site_name":"RHESUS","article_publisher":"https:\/\/www.facebook.com\/RhesusInc\/?fref=ts","article_published_time":"2026-02-16T20:47:28+00:00","article_modified_time":"2026-02-23T22:27:37+00:00","og_image":[{"width":1490,"height":1080,"url":"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg","type":"image\/jpeg"}],"author":"Vicky Beaudoin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vicky Beaudoin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/#article","isPartOf":{"@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/"},"author":{"name":"Vicky Beaudoin","@id":"https:\/\/rhesus.net\/#person-vicky-beaudoin"},"headline":"Ransomware in the workplace: what the CHOC FM attack teaches us","datePublished":"2026-02-16T20:47:28+00:00","dateModified":"2026-02-23T22:27:37+00:00","mainEntityOfPage":{"@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/"},"wordCount":1447,"publisher":{"@id":"https:\/\/rhesus.net\/en\/#organization"},"image":{"@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/#primaryimage"},"thumbnailUrl":"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg","articleSection":["Non classifi\u00e9(e)"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/","url":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/","name":"Ransomware in the workplace: what the CHOC FM attack teaches us","isPartOf":{"@id":"https:\/\/rhesus.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/#primaryimage"},"image":{"@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/#primaryimage"},"thumbnailUrl":"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg","datePublished":"2026-02-16T20:47:28+00:00","dateModified":"2026-02-23T22:27:37+00:00","description":"adio station CHOC FM in Portneuf lost all its data to a ransomware attack. The Rhesus cybersecurity team, called in to respond, shares the lessons Quebec SMBs need to hear.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rhesus.net\/en\/ransomware-business-choc-fm\/#primaryimage","url":"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg","contentUrl":"https:\/\/rhesus.net\/wp-content\/uploads\/2025\/12\/Image-grid-4.jpg","width":1490,"height":1080},{"@type":"WebSite","@id":"https:\/\/rhesus.net\/en\/#website","url":"https:\/\/rhesus.net\/en\/","name":"Rhesus \u2013 Votre partenaire en technologies de l'information","description":"","publisher":{"@id":"https:\/\/rhesus.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rhesus.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/rhesus.net\/en\/#\/schema\/person\/c247c80bf4d26692483e6f24010cab91","name":"Vicky Beaudoin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f56f25662c53099ad45b0d7f0754bca7cdc345469855ea00157ca1a8afd9cc2?s=96&d=mm&r=g","caption":"Vicky Beaudoin"},"sameAs":["https:\/\/rhesus.net"]}]}},"_links":{"self":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/posts\/5510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/comments?post=5510"}],"version-history":[{"count":1,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/posts\/5510\/revisions"}],"predecessor-version":[{"id":5512,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/posts\/5510\/revisions\/5512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/media\/5511"}],"wp:attachment":[{"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/media?parent=5510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/categories?post=5510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rhesus.net\/en\/wp-json\/wp\/v2\/tags?post=5510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}