{"id":5076,"date":"2019-10-17T23:02:14","date_gmt":"2019-10-17T22:02:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5076"},"modified":"2025-05-23T13:53:29","modified_gmt":"2025-05-23T12:53:29","slug":"cyber-security-issues","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues","title":{"rendered":"Common Cybersecurity Issues and Challenges"},"content":{"rendered":"<p>The rise of new technologies\u2014ranging from the internet of things (IoT) and Big Data to artificial intelligence (AI) and machine learning (ML)\u2014has changed the way organizations operate, compete, and evolve. When deployed strategically, each of these emerging technologies can offer organizations a leg up in a fast-paced marketplace, greater insight into their operations, and more control over their business.<\/p>\n<p>However, the changing nature of our digital environment is also providing cybercriminals and bad actors with a larger attack surface\u2014and more dangerous tools\u2014than ever. From IoT networks with thousands of vulnerable endpoints to AI\/ML platforms capable of cracking employee credentials, the evolution of workplace technology has also increased the sophistication of cyberattacks.<\/p>\n<p>Given this reality, it\u2019s critical that managed services providers (MSPs) and their customers understand what <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-cybersecurity\"  data-wpil-monitor-id=\"21\">cybersecurity<\/a> issues and challenges they\u2019re up against. As companies increasingly rely on connected technology, the stakes of data breaches are clearly growing. By better understanding the full range of threats you face and the regulatory obligations you need to meet, you\u2019ll be better positioned to invest in the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/msp-security-software\" target=\"_blank\" rel=\"noopener\">right tools to secure your customers\u2019 IT infrastructure<\/a>.<\/p>\n<h3><b>What are the most important security issues facing companies today?<\/b><\/h3>\n<p>As companies become more reliant on their digital environment, their vulnerabilities to cyberthreats increase in turn. While this certainly doesn\u2019t mean that organizations should forego critical IT investments to reduce their potential attack surface, it does mean that stakeholders need to stay aware of the specific cybersecurity issues that are most pressing to their companies. From the unique nature of IoT networks to increased reliance on the cloud, these issues are intrinsically linked to the way companies do business today.<\/p>\n<p>For example, IoT networks function by way of hundreds or even thousands of network-connected devices distributed across a workspace, office building, or entire supply chain. Each of these devices is connected to the wider network, meaning that cybercriminals who manage to compromise one of these assets have an easy way to breach the rest of an organization\u2019s network.<\/p>\n<p>Similarly, greater investment in the cloud means that an increasing number of companies are storing and processing proprietary data offsite. The expansion of cloud computing has enabled numerous benefits, including greater organizational flexibility and cost savings. However, relying on the cloud\u2014whether public, private, or hybrid\u2014requires careful cybersecurity protocol. While third-party providers may be responsible for the security of the cloud itself, customers are generally responsible for the security of the information they store and use in it.<\/p>\n<p>IoT networks and cloud computing aren\u2019t alone in presenting companies with a new range of cybersecurity issues. AI, ML, blockchain, DevOps, and other emerging organizational technologies are requiring companies to take a greater interest in the security of their digital environment than ever before. Accordingly, companies need to consider what investments they must make in order to reap the greatest possible benefits of new workplace technology while mitigating the associated cybersecurity issues.<\/p>\n<h3><b>What are the threats in cybersecurity?<\/b><\/h3>\n<p>With new platforms and capabilities opening companies up to new vulnerabilities, it\u2019s critical MSPs understand what tactics cybercriminals might use to take advantage of unprepared and unprotected organizations. Botnets,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/brief-history-ddos-defend-customers\" target=\"_blank\" rel=\"noopener\">DDoS attacks<\/a>, and ransomware are just a few examples of the kind of digital weapons that bad actors will use to breach networks and compromise sensitive information. While these strategies existed before the latest wave of workplace innovation, the unique nature of IoT networks, cloud computing, and more makes these attacks easier to carry out and potentially more devastating.<\/p>\n<p>For example, cybercriminals can use botnets to hack into and then compromise almost any network-connected assets. With the\u00a0<a class=\"ext\" href=\"https:\/\/www.ericsson.com\/en\/mobility-report\/internet-of-things-forecast\" target=\"_blank\" rel=\"noopener noreferrer\">rise of the IoT<\/a>, bad actors literally have billions of potential targets\u00a0to leverage. Because botnets involve groups of hacked devices that are then used for nefarious activity\u2014such as carrying out DDoS attacks or deploying ransomware\u2014organizations that have invested in IoT technology without simultaneously updating their cybersecurity strategy are at risk for serious breaches.<\/p>\n<p>The widespread adoption of cloud computing has also brought its own set of risks and potential threats. For instance, improperly secured application programming interfaces (APIs) can expose critical cloud infrastructure to bad actors. APIs are the primary means by which organizations interface with cloud computing assets and connect with critical information stored offsite. However, APIs are uniquely vulnerable within the cloud environment and require their own cybersecurity strategy. Companies that fail to account for potential API vulnerabilities might be leaving the door to their cloud computing infrastructure wide open for hackers.<\/p>\n<p>Across the board, cybersecurity threats that organizations have been familiar with in the past have become even more dangerous.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-protect-your-company-from-spear-phishing-in-2020\" target=\"_blank\" rel=\"noopener\">Phishing<\/a>\u2014the process through which cybercriminals attempt to lure employees to click on links or download files to extract sensitive information\u2014has evolved and matured. And while new technology like blockchain is specifically designed to be secure, users still have private keys that they use to conduct transactions at their specific blockchain node. Successful phishing operations could put these keys in the hands of bad actors and jeopardize the reliability of the network and the applications that rely on it.<\/p>\n<p>Once cybercriminals have access to an organization\u2019s network, the threats they pose are immeasurable. Bad actors may set up a cryptojacking operation in which they harness the resources of computers across a company to mine cryptocurrency, leading to significantly decreased performance. They may steal proprietary information\u2014trade secrets that have the potential to jeopardize a company\u2019s performance\u2014and extort executives for ransom in return for not releasing it. They may even launch integrity attacks, effectively overwriting information in critical databases and allowing cybercriminals to commit fraudulent acts.<\/p>\n<p>The full range of cybersecurity threats that companies face goes on, but the common link among them is that greater network connectivity across companies heightens the potential damage of cyberthreats. This means attacks that may have crippled one area of an organization in the past now have the potential to devastate the whole organization.<\/p>\n<h3><b>What are the challenges of cybersecurity?<\/b><\/h3>\n<p>The cybersecurity challenges that organizations face range from the internal to the external. On the one hand, companies need to safeguard proprietary information, protect employees, and earn the trust of those they do business with. This requires a shift in organizational culture that puts cybersecurity front and center and educates employees. On the other hand, organizations increasingly need to comply with government regulations as consumers become more concerned about their personal information. This poses new cybersecurity challenges for companies who will have to go to greater lengths to stay compliant with new regulations.<\/p>\n<p>Internally, organizations need to recognize the importance of cybersecurity. Stakeholders need to be prepared to invest in the type of technology and expertise needed to secure their IT infrastructure and maintain that security around the clock. While cybersecurity may have previously taken a back seat to other business areas, companies now need to take a proactive role in monitoring their network and considering potential attack vectors.<\/p>\n<p>Additionally, organizations need to confront the challenge of educating their employees in the reality of cybersecurity.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/cybersecurity-best-practices-MSP-guide\">From phishing attacks to ransomware<\/a>, today\u2019s workers need to be trained to spot nefarious activity, avoid engaging with it, and alert appropriate stakeholders as soon as possible. By educating employees on what threats the organization faces and what form they may come in, it\u2019s more likely that massive breaches can be avoided and damage can be minimized.<\/p>\n<p>Externally, companies face a challenging new regulatory environment. For example, GDPR amounts to a significant update to the European Union\u2019s data privacy laws. The law puts strict requirements in place related to personal data, how companies can collect it, what they can do with it, and how they protect it. GDPR also requires that companies be transparent with national governing bodies in the event of a data breach, allowing citizens to take the appropriate steps to protect their personal information. While this specific example regards the EU, it will still affect any company around the world that processes the data of EU citizens.<\/p>\n<h3><b>How can MSPs support organizational cybersecurity?<\/b><\/h3>\n<p>Given the full range of threats your customers face today, it\u2019s up to you as an\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/top-tips-for-improving-your-enterprise-cybersecurity-in-2020\" target=\"_blank\" rel=\"noopener noreferrer\">MSP to secure their IT infrastructure<\/a>\u00a0and help protect their business. MSPs should consider how they can best deter cybercriminals, detect illicit activity, and defend customers\u2019 networks.<\/p>\n<p>The key here is having multiple layers of defense. Start by deploying a good Remote Monitoring and Management (RMM) solution as this will give you the visibility across the networks that you need to be able to monitor for suspicious activity. SolarWinds RMM also integrates a number of other key defences, that will help you defend in other areas:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/patch-management-tool-msp\"><strong>Patch management<\/strong><\/a>\u2014Patching helps you ensure that all operating systems and third-party software is kept up to date with the latest security patches.<\/li>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/edr-solutions\"><strong>Endpoint detection and response (EDR)<\/strong><\/a>\u2014EDR helps you identify potential threats at endpoint level and then respond effectively through automation.<\/li>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security\"><strong>Email protection<\/strong><\/a>\u2014Since email is still the main vector cybercriminals use to get a foothold in an organization through phishing, being able to filter out potentially dangerous messages and attachments, can help reduce your attack surface.<\/li>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/web-protection\"><strong>Web protection<\/strong><\/a>\u2014The use of malicious websites to get people to inadvertently download malware into their network is prevalent. Being able to stop staff from going onto known malicious sites by blocking access to them is and important layer of defense.<\/li>\n<\/ul>\n<p>On top of this, SolarWinds RMM gives you the ability to set up your own checks in the system to look for suspicious behavior. Having clear visibility across your customers\u2019 networks in one spot gives you a better chance of preventing attacks. You can\u2019t over look the fundamentals.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Interested in learning if these cybersecurity issues are impacting your organization? Explore our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\" target=\"_blank\" rel=\"noopener\">product suite<\/a>\u00a0to see how you can monitor and prepare for potential threats.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5076","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Common Cybersecurity Issues and Challenges - N-able<\/title>\n<meta name=\"description\" content=\"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Cybersecurity Issues and Challenges - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-17T22:02:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T12:53:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Common Cybersecurity Issues and Challenges\",\"datePublished\":\"2019-10-17T23:02:14+01:00\",\"dateModified\":\"2025-05-23T12:53:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\"},\"wordCount\":1648,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\",\"name\":\"Common Cybersecurity Issues and Challenges - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-10-17T23:02:14+01:00\",\"dateModified\":\"2025-05-23T12:53:29+00:00\",\"description\":\"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Cybersecurity Issues and Challenges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Common Cybersecurity Issues and Challenges - N-able","description":"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues","og_locale":"de_DE","og_type":"article","og_title":"Common Cybersecurity Issues and Challenges - N-able","og_description":"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.","og_url":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-10-17T22:02:14+00:00","article_modified_time":"2025-05-23T12:53:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Common Cybersecurity Issues and Challenges","datePublished":"2019-10-17T23:02:14+01:00","dateModified":"2025-05-23T12:53:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues"},"wordCount":1648,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues","url":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues","name":"Common Cybersecurity Issues and Challenges - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-10-17T23:02:14+01:00","dateModified":"2025-05-23T12:53:29+00:00","description":"Learn about the most common cybersecurity issues and challenges that companies face today to ensure your IT infrastructure is prepared for when unexpected situations arise.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/cyber-security-issues#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Common Cybersecurity Issues and Challenges"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5076"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5076\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}