{"id":5408,"date":"2017-07-18T14:05:04","date_gmt":"2017-07-18T13:05:04","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5408"},"modified":"2021-07-13T10:39:46","modified_gmt":"2021-07-13T09:39:46","slug":"top-10-cyberattack-vectors-and-mitigation-tips-part-1","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1","title":{"rendered":"Top 10 Cyberattack Vectors and Mitigation Tips: Part 1"},"content":{"rendered":"<p>Recently, I wrote a series of three blogs covering the current state of\u00a0security,\u00a0external attacks, and\u00a0attack behaviors\u00a0all based on the\u00a0<a class=\"ext\" href=\"http:\/\/b2me.cisco.com\/en-us-annual-cybersecurity-report-2017\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<sup>\u00ae<\/sup>\u00a02017 Annual Cybersecurity Report<\/a>. While a very informative report, the definitive standard for information around data breaches is the\u00a0<a class=\"ext\" href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<sup>\u00ae<\/sup>\u00a0Annual Data Breach Investigations Report<\/a>\u00a0(affectionately referred to as the\u00a0<i>DBIR<\/i>\u00a0in the industry). If you haven\u2019t added this report to your annual repertoire of reports to read, the DBIR (now in its 10<sup>th<\/sup>\u00a0year) is the highlight of just about any cybercrime report you\u2019ll get all year.<\/p>\n<h3>What Is Verizon\u2019s DBIR<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\" alt=\"DBIR cover.jpg\" width=\"397\" height=\"212\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>With this year\u2019s reports utilizing data from over 42,000 incidents, nearly 2,000 confirmed breaches, from 65 contributing vendors and companies, the 2017 DBIR represents the most statistically relevant data around data breaches, trends, and cybersecurity. (For you statistics geeks, they cite a 95% confidence level with a margin of error of only 0.4% for incidents, and 1.4% for breaches.)<\/p>\n<p>Now that you know what the DBIR is all about, let\u2019s look at some high-level trends using the top 10 attack classification patterns in descending order of occurrence. (This way, I\u2019m covering them from the standpoint of most to least in frequency of attack methods.) As part of this, I\u2019ll also give a brief overview of what to expect from each attack vector and provide direction on how to help mitigate the threat.<\/p>\n<h3>1. Denial of Service<\/h3>\n<p>Overwhelming an application, system, or network is one of the easiest ways for attackers to shut you down\u2014even if only temporarily. And, while DDoS attacks themselves aren\u2019t the means by which data is breached, a DDoS attack on, say, an email scanning appliance can cause malicious email to be rerouted directly into an organization, giving attackers an entry point. Proper responses include assessing externally facing assets and determining how an outage of those services would impact the company\u2019s productivity, availability, and security.<\/p>\n<h3>2. Insider and Privilege Misuse<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/hacker.jpg\" alt=\"hacker.jpg\" width=\"407\" height=\"201\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>This category includes any kind of unapproved or malicious use of organizational resources. It can be the result of both an actual insider (81% of the time), an external attacker utilizing compromised credentials (7% of the time), or a combination of both (8% of the time). With 82% of these incidents taking months or years to be detected, what\u2019s needed is the detection of misuse. Knowing where sensitive data is, monitoring its access, and using analytics to determine when that access is abnormal all help to lessen the risk of this attack vector.<\/p>\n<h3>3. Crimeware<\/h3>\n<p>Of the 10 types of crimeware cited in the report, the overwhelming attack vector is\u00a0<i>ransomware<\/i>. Representing nearly half the crimeware incidents, this is your biggest malware threat today. Proper responses include a robust malware strategy at the endpoint, at malware gateways,\u00a0<a class=\"ext\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/application-whitelisting\" target=\"_blank\" rel=\"noopener noreferrer\">application whitelisting<\/a>, and attachment\u00a0<a class=\"ext\" href=\"https:\/\/en.wikipedia.org\/wiki\/Sandbox_(computer_security)\" target=\"_blank\" rel=\"noopener noreferrer\">sandboxing<\/a>.<\/p>\n<h3>4. Web Application Attacks<\/h3>\n<p>Most attacks of this type are done using botnets with the intent normally found to be defacing of sites and repurposing of systems (e.g. for malware command and control (C2) activity)\u2014followed by more expected actions, such as stealing credentials, setting up phishing sites, and theft of personal information within application databases. Proper responses include limiting the storage of personal data or credentials on web application servers, as well as considering the use of\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a>\u00a0(2FA) that would require additional attack patterns different from those used to compromise a password.<\/p>\n<h3>5. Physical Theft and Loss<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/theft.jpg\" alt=\"theft.jpg\" width=\"404\" height=\"200\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>This isn\u2019t so much a malicious attack vector (as there are\u00a0<i>some\u00a0<\/i>cases of actual theft represented in the report), but more a careless user issue (as most incidents revolve around property loss). Leave your company laptop in the car only to be stolen or lose a USB drive on your way to work\u2014both with company data on them\u2014and there\u2019s your data breach. Proper responses revolve around encrypting devices and data, strict policies around when, where, and how company data can be taken out of the organization\u2019s network, and monitoring for data being transferred to external devices or via web email.<\/p>\n<p>&nbsp;<\/p>\n<p>In my next blog, we\u2019ll take a closer look at the remaining five attack classifications\u2014<em>Miscellaneous Errors, Everything Else, Cyber-Espionage, Point of Sale Intrusions,\u00a0<\/em>and<em>\u00a0Payment Card Skimmers.<\/em><\/p>\n<p><em>Nick Cavalancia has over 20 years of enterprise IT experience and is an accomplished executive, consultant, trainer, speaker, and columnist. He has authored, co-authored and contributed to over a dozen books on Windows<sup>\u00ae<\/sup>, Active Directory<sup>\u00ae<\/sup>, Exchange<sup>\u2122<\/sup>\u00a0and other Microsoft<sup>\u00ae<\/sup>\u00a0technologies. Nick has also held executive positions at ScriptLogic<sup>\u00ae<\/sup>, SpectorSoft<sup>\u00ae<\/sup>\u00a0and Netwrix<sup>\u00ae<\/sup>\u00a0and now focuses on the evangelism of technology solutions.<\/em><\/p>\n<p><em>Follow Nick on Twitter<sup>\u00ae<\/sup>\u00a0at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/nickcavalancia%22%20%5Ct%20%22_blank\" target=\"_blank\" rel=\"noopener noreferrer\">@nickcavalancia<\/a><\/em><\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/solutions\/layered-security\" target=\"_blank\" rel=\"noopener\"><b>Click here<\/b><\/a><b>\u00a0to find out more about the SolarWinds Layered Security offering and how it can help you secure your clients\u2019 business.<\/b><\/p>\n<p>\u00a9 2017 SolarWinds MSP UK Ltd. All rights reserved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, I wrote a series of three blogs covering the current state of\u00a0security,\u00a0external attacks, and\u00a0attack behaviors\u00a0all based on the\u00a0Cisco\u00ae\u00a02017 Annual Cybersecurity Report. While a very informative report, the definitive standard&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5408","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able<\/title>\n<meta name=\"description\" content=\"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able\" \/>\n<meta property=\"og:description\" content=\"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-18T13:05:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T09:39:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Top 10 Cyberattack Vectors and Mitigation Tips: Part 1\",\"datePublished\":\"2017-07-18T14:05:04+01:00\",\"dateModified\":\"2021-07-13T09:39:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\"},\"wordCount\":791,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\",\"name\":\"10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\",\"datePublished\":\"2017-07-18T14:05:04+01:00\",\"dateModified\":\"2021-07-13T09:39:46+00:00\",\"description\":\"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 Cyberattack Vectors and Mitigation Tips: Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able","description":"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1","og_locale":"de_DE","og_type":"article","og_title":"10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able","og_description":"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.","og_url":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-07-18T13:05:04+00:00","article_modified_time":"2021-07-13T09:39:46+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Top 10 Cyberattack Vectors and Mitigation Tips: Part 1","datePublished":"2017-07-18T14:05:04+01:00","dateModified":"2021-07-13T09:39:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1"},"wordCount":791,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg","articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1","url":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1","name":"10 Cyberattack Vectors and Mitigation Tips: Part 1 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg","datePublished":"2017-07-18T14:05:04+01:00","dateModified":"2021-07-13T09:39:46+00:00","description":"What is an attack vector? Using the Verizon Data Breach Investigations Report, we highlight ten common attack vectors for cybercrime and how to combat them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/07\/DBIR%20cover.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/top-10-cyberattack-vectors-and-mitigation-tips-part-1#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Top 10 Cyberattack Vectors and Mitigation Tips: Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5408"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5408\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}