{"id":5515,"date":"2019-02-20T19:40:40","date_gmt":"2019-02-20T19:40:40","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5515"},"modified":"2021-07-09T15:53:48","modified_gmt":"2021-07-09T14:53:48","slug":"g-suite-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices","title":{"rendered":"Google Drive Security Best Practices"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>While people tend to compare file storage service Google Drive to its biggest competitor, Dropbox, there\u2019s a good argument to be made that the two platforms serve fundamentally different markets. Google Drive has tons of special appeal to enterprise clients: It\u2019s great for collaboration, offers 15 GB of free storage, and allows access to the entire G Suite ecosystem of apps. But none of Google Drive\u2019s features will do much good if enterprises aren\u2019t able to secure what they store on it.<\/p>\n<p>Businesses are responsible not only for their organization\u2019s data, but for that of their employees and customers. That means that your clients should understand Google Drive security best practices inside and out if they\u2019re going to make use of the platform\u2019s considerable advantages. In this blog post, we\u2019ll go over some common G Suite security concerns and explain what you can do to make your clients\u2019 data less vulnerable.<\/p>\n<h3><b>What are some email security issues?<\/b><\/h3>\n<p>Some of the most widespread and financially damaging forms of cybercrime today\u00a0take place over email, underlining the importance of G Suite email security. Phishing and pharming are two of the more common types of email scams that businesses have to be on the lookout for. While they are fairly similar, it\u2019s helpful to understand the difference so you know what to look for when seeking out potential threats to the security of your Gmail account. Unlike other hacking approaches, phishing and pharming can typically be warded off through reliance on basic security best practices.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignleft\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\" alt=\"\" width=\"439\" height=\"217\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>Phishing is the use of deceptive tactics to get an email recipient to reveal sensitive information to a hacker. An employee might receive an email that appears to come from your HR department. The email provides a link to what it says is your company\u2019s new vacation policy. When the employee clicks on the link, they are asked to enter their G Suite credentials in order to see the document. But once they do, the employee reaches a dead end\u2014the page they signed into was a \u201cspoofed\u201d page designed by a hacker to look just like Google\u2019s sign-in page, allowing the hacker to phish your employee\u2019s credentials and gain access to all the files in your Drive.<\/p>\n<p>Pharming, by contrast, doesn\u2019t depend on someone clicking on a deceptive link that directs to a spoofed page. It involves the hijacking of legitimate domains so that you\u2019re redirected to web pages fabricated by the hacker, even if you typed in the URL to the legitimate domain. These attacks can only be stopped with careful attention to detail\u2014users must always be on the lookout for websites that look suspiciously different than they did during previous visits. In the case of phishing attacks, you can identify potential threats by noting modified URLs or watching for strange language or requests coming from entities you\u2019d otherwise trust.<\/p>\n<h3><b>Is Google Drive data encrypted?<\/b><\/h3>\n<p>In some cases, it\u2019s not enough to simply take special care when entering sensitive information online\u2014and many threats require strong data encryption to ward off these attacks. Luckily, Google Drive does offer 256-bit SSL\/TLS encryption for files in motion and 128-bit AES keys for everything else, as well as two-step verification.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignright\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/Google_Drive_Security-Facebook.png\" alt=\"\" width=\"440\" height=\"230\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>That said, Google Drive has seen its share of security vulnerabilities exploited. Hackers have taken advantage of weak servers that don\u2019t support Google\u2019s version of encryption, and security experts note that a\u00a0<a class=\"ext\" href=\"https:\/\/www.darkreading.com\/cloud\/man-in-the-cloud-owns-your-dropbox-google-drive----sans-malware-\/d\/d-id\/1321501\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-cloud attack<\/a>\u00a0could be used to bypass encryption altogether by stealing a user\u2019s synchronization code.<\/p>\n<p>All this goes to show that while Google\u2019s\u00a0<a href=\"https:\/\/www.n-able.com\/blog\" target=\"_blank\" rel=\"noopener\">encryption is important<\/a>, it\u2019s best to add your own layer of third-party encryption to strengthen your defenses against clever attacks like these.<\/p>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"sidebar-width-33\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-cta paragraph--view-mode--default\">\n<div class=\"explore-box quick-cta\">\n<div id=\"solar-features-trial\"><\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<h3><b>Is my email server secure?<\/b><\/h3>\n<p>As part of G Suite security best practices, Gmail servers are protected by data encryption and by two-factor verification. But that\u2019s not all you can do to make sure an enterprise\u2019s email systems aren\u2019t compromised. If you have Google Drive security concerns, implementing some or all of the following measures can make the difference in safeguarding an organization\u2019s sensitive information:<\/p>\n<ul>\n<li><b>Access control:\u00a0<\/b>You can\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/access-rights-manager\" target=\"_blank\" rel=\"noopener noreferrer\">control user permissions<\/a>\u00a0so that employees only get access to the files they absolutely need in order to do their jobs. The less accessible data is to employees, the less accessible it is to hackers trying to steal it from them.<\/li>\n<li><b>Firewall:<\/b>\u00a0A strong firewall will help ensure that only authorized users gain access to the network and prevent outside parties from gaining access to systems that contain protected data.<\/li>\n<li><b>Intrusion detection:<\/b>\u00a0Enterprises have access to plenty of tools\u2014such as\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor\" target=\"_blank\" rel=\"noopener\">unified threat management\u00a0<\/a>solutions\u2014that can alert them in the event that a system is compromised, making it far more likely that the damage can be contained.<\/li>\n<li><b>Antivirus software<\/b>: Every device on an enterprise network should have some kind of\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/security\" target=\"_blank\" rel=\"noopener\">antivirus<\/a>\u00a0running to detect potentially harmful websites and prevent malware from being downloaded.<\/li>\n<li><b>Limit connections to your server<\/b>: To avoid Distributed Denial of Service (DDoS) attacks, try to keep the number of devices that can connect to your SMTP server to a minimum.<\/li>\n<li><b>Activate Reverse DNS:<\/b>\u00a0Reverse DNS Lookup verifies the IP address of every email\u2019s sender, effectively blocking any emails that come from people looking to hide or spoof their identity.<\/li>\n<\/ul>\n<p>Google Drive and Gmail have clear advantages for enterprise users\u2014now, armed with the right information, you can enjoy these benefits secure in the knowledge that your intellectual property, as well as the personal data of your employees and customers, is safe from outside threats.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5515","post","type-post","status-publish","format-standard","hentry","topic-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Google Drive Security Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Drive Security Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-20T19:40:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T14:53:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Google Drive Security Best Practices\",\"datePublished\":\"2019-02-20T19:40:40+00:00\",\"dateModified\":\"2021-07-09T14:53:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\"},\"wordCount\":947,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\",\"name\":\"Google Drive Security Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\",\"datePublished\":\"2019-02-20T19:40:40+00:00\",\"dateModified\":\"2021-07-09T14:53:48+00:00\",\"description\":\"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cloud Computing\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/cloud-computing\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Drive Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google Drive Security Best Practices - N-able","description":"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices","og_locale":"de_DE","og_type":"article","og_title":"Google Drive Security Best Practices - N-able","og_description":"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss","og_url":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-02-20T19:40:40+00:00","article_modified_time":"2021-07-09T14:53:48+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Google Drive Security Best Practices","datePublished":"2019-02-20T19:40:40+00:00","dateModified":"2021-07-09T14:53:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices"},"wordCount":947,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg","articleSection":["Cloud Computing"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices","url":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices","name":"Google Drive Security Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg","datePublished":"2019-02-20T19:40:40+00:00","dateModified":"2021-07-09T14:53:48+00:00","description":"Interested in learning about Google Drive security? Read through common G Suite security features and best practices to help ensure that your data is safeguarded from potential loss","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/02\/google%20drive%20body.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/g-suite-security-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cloud Computing","item":"https:\/\/www.n-able.com\/de\/blog\/category\/cloud-computing"},{"@type":"ListItem","position":2,"name":"Google Drive Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5515"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}