{"id":5513,"date":"2017-04-25T19:36:58","date_gmt":"2017-04-25T18:36:58","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5513"},"modified":"2021-04-06T19:41:39","modified_gmt":"2021-04-06T18:41:39","slug":"two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","title":{"rendered":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity"},"content":{"rendered":"<h2>Go beyond the basics of authentication<\/h2>\n<p>There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with a finger on some smartphone lock screens; this is also sadly the weakest form of authentication. The knowledge factor relies on something you know, and that&#8217;s at once its biggest positive and negative.<\/p>\n<p>On the plus side, a user can create (if the login process allows, and all enterprise strength ones should) a truly &#8217;strong&#8216; password. I have placed strong within inverted commas for a reason; one person&#8217;s strength is another&#8217;s weakness. So, while the user may well think that transposing an \u201ca\u201d for an \u201c@\u201d, and throwing a couple of exclamation marks at their partner&#8217;s name is strong, a hacker could crack it in less time than it took me to write this sentence.<\/p>\n<h3>Password complexity and randomness<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\" alt=\"complex.jpg\" width=\"417\" height=\"206\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>And here&#8217;s the thing: Not only can dictionary attacks take out any password that&#8217;s easy for the user to remember, but\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/brute-force-attack-mitigation-101\">brute force attacks<\/a>\u00a0can do a pretty good job of those where strength has been confused with complexity and randomness. Not that the attacker need worry about cracking your passwords half the time; they often gain control of your email through a phishing attack, and that makes resetting your passwords simple. And disastrously simple at that if you, like the majority of people, reuse the same piece of knowledge-based authentication to access multiple sites and services. (By the way, there\u2019s an \u201capp for that\u201d to help you manage your passwords. This article \u201c<a class=\"ext\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2407168,00.asp\" target=\"_blank\" rel=\"noopener noreferrer\">The Best Password Managers for 2017<\/a>\u201d in PCMagazine gives you a grid of how to choose one that\u2019s best for your needs.)<\/p>\n<h3>How Two-Factor Authentication (2FA)works<\/h3>\n<p>Earlier I mentioned three methods of authentication of knowledge, possession, and inherence.<\/p>\n<p><b>Knowledge:<\/b>\u00a0It\u2019s not always enough and does not always equate to intelligence. Certainly in the cybersecurity world a little of it can have big consequences. Another layer of protection is needed, and that&#8217;s where\u00a0<a class=\"ext\" href=\"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\" target=\"_blank\" rel=\"noopener noreferrer\">Two-Factor Authentication<\/a>\u00a0(2FA) comes in.<\/p>\n<p>By adding another layer of authentication, which can either be through possession (something you own) or inherence (something you are), accessing your accounts and services suddenly becomes exponentially more difficult for the bad guys. Not impossible, but by applying a secondary authentication factor, the task becomes so much harder that it will protect most accounts from most would-be attackers.<\/p>\n<p><b>Possession:<\/b>\u00a0Think of 2FA in terms of protecting your vehicle if you like. A steering wheel lock deters the casual thief, but can be broken fairly quickly by a seasoned criminal. Yet if the car also has an engine immobiliser the theft will take longer, be much harder, and require different hardware.<\/p>\n<p>Traditionally, the second factor in a 2FA equation has involved possession. The thing that you \u201cown\u201d being a token. This can be in the form of a hardware token or increasingly a one-time authorization code (OTAC), also known as a one-time password (OTP). Whatever you call it, this code can be generated by dedicated hardware (not dissimilar to the hardware token already mentioned) or more likely, the user&#8217;s smartphone. Once the user has passed the username\/password login phase of the authentication process, they are asked to input a code. These &#8217;soft tokens&#8216; are generated either by an authenticator app on the device or sent via a text message on demand.<\/p>\n<p>Whichever method is employed\u2014and text messaging is slightly less secure because of the potential for interception\u2014the output is the same: a cryptographically secure one-time passcode that is time limited to 30 or 60 seconds depending on the settings at the server end. Because most staff not only already have the hardware to generate the codes, but also carry it around with them everywhere, implementation costs and staff training are both kept to a minimum.<\/p>\n<p>So how does this one-time code generation work again? Well, the OTAC itself is a hash-based code that uses a combination of a secret key (the user initially enrolls with the code server) and the current time to generate a code using a cryptographic hash function. The code expires to the pre-determined countdown timer, and if the right code is entered in the right timeframe, then you are authenticated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/biometrics.jpg\" alt=\"biometrics.jpg\" width=\"419\" height=\"207\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><b>Inherence:<\/b>\u00a0But why not use the inherence factor instead? After all, something that you are is far more secure than your smartphone or a bit of plastic hanging from your key fob, right? The truth is that the jury is out on that one. Biometrics\u2014that&#8217;s what we are talking about here\u2014can be a very secure method of authentication in most scenarios. Fingerprint scanners can be fooled, but it involves a lot of determined James Bond-style preparation with things like the target\u2019s prints being lifted and transferred onto latex. Similarly, facial recognition software and even iris scanners have been fooled with photos in the past. However, the real problem with biometrics is cost, both in terms of initial rollout and ongoing support through the enrollment and usage phases.<\/p>\n<h3>Multi-factor authentication is ideal<\/h3>\n<p>This could all change as fingerprint scanners for smartphone access becomes the de-facto specification. I already have my authenticator app locked down with a fingerprint scan required to access it. This means I&#8217;ve kind of hit the multi-factor authentication sweet spot: all three factors in use at once.<\/p>\n<p>By Davey Winder<\/p>\n<h3><em>About Davey Winder<\/em><\/h3>\n<p><em>Davey has been writing about IT security for more than two decades, and is a three times winner of the BT Information Security Journalist of the Year title. An ex-hacker turned security consultant and journalist, Davey was given the prestigious &#8218;Enigma&#8216; award for his &#8218;lifetime contribution&#8216; to information security journalism in 2011.\u00a0<\/em><\/p>\n<p><em>You can follow Davey on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/happygeek?lang=en-gb\" target=\"_blank\" rel=\"noopener noreferrer\">@happygeek<\/a><\/em><\/p>\n<p><strong>Keep your business and your customers protected \u2013 Get the MSP competitive advantage with a best in class Remote Monitoring and Management and Security Platform.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a>\u00a0to find out more.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5513","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able<\/title>\n<meta name=\"description\" content=\"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able\" \/>\n<meta property=\"og:description\" content=\"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-25T18:36:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T18:41:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity\",\"datePublished\":\"2017-04-25T19:36:58+01:00\",\"dateModified\":\"2021-04-06T18:41:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\"},\"wordCount\":1016,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\",\"name\":\"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\",\"datePublished\":\"2017-04-25T19:36:58+01:00\",\"dateModified\":\"2021-04-06T18:41:39+00:00\",\"description\":\"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Best Practices\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/best-practices\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able","description":"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","og_locale":"de_DE","og_type":"article","og_title":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able","og_description":"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.","og_url":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-04-25T18:36:58+00:00","article_modified_time":"2021-04-06T18:41:39+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Guest","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity","datePublished":"2017-04-25T19:36:58+01:00","dateModified":"2021-04-06T18:41:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity"},"wordCount":1016,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg","articleSection":["Best Practices"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","url":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity","name":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg","datePublished":"2017-04-25T19:36:58+01:00","dateModified":"2021-04-06T18:41:39+00:00","description":"In the search for the strongest possible security for company systems, Two Factor Authentication (2FA) may well be our best bet. Davey Winder explains the technology.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/04\/complex.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/two-factor-authentication-2fa-101-what-it-why-it-matters-cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Best Practices","item":"https:\/\/www.n-able.com\/de\/blog\/category\/best-practices"},{"@type":"ListItem","position":2,"name":"Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5513"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5513\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}