{"id":5581,"date":"2020-12-23T22:15:43","date_gmt":"2020-12-23T22:15:43","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5581"},"modified":"2021-10-01T09:55:03","modified_gmt":"2021-10-01T08:55:03","slug":"how-to-protect-your-company-from-spear-phishing","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing","title":{"rendered":"How to Protect Your Company from Spear Phishing in 2021"},"content":{"rendered":"<p>Managed services providers (MSPs) are tasked with defending businesses from the many potential cybersecurity attacks that could be leveraged against them, from\u00a0ransomware\u00a0to distributed\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/ddos-what-you-need-know\" target=\"_blank\" rel=\"noopener\">denial of service (DDoS) attacks<\/a>. But of the various types of attacks that bad actors employ today, phishing is arguably the most dangerous. According to\u00a0<a class=\"ext\" href=\"https:\/\/www.vpninsights.com\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent statistics<\/a>\u00a0from VPN Insights, phishing emails open the door for 91% of all cybercrimes. The average user receives 16 phishing emails a month, and 42% of spear phishing targets are successfully tricked into opening malicious email attachments.<\/p>\n<p>So what exactly is spear phishing? How can MSPs recognize spear phishing attacks before it\u2019s too late? With such alarming numbers, it\u2019s clear that security experts have a duty to better educate their customers about spear phishing to protect them from falling victim. Here are some commonly asked questions about spear phishing you can discuss with your customers to raise awareness in 2020.<\/p>\n<h3><b>What is spear phishing?<\/b><\/h3>\n<p>The term \u201c<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spear-phishing-prevention\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a>\u201d refers to any email or electronic communications scam designed to get a particular user, organization, or business to reveal sensitive information. In most cases, the bad actor disguises their attack as a legitimate message from a trusted website or person. Once the spear phishing target clicks on a malicious link or complies with the attacker\u2019s request to send confidential data online, their information can be lifted and used for various purposes.<\/p>\n<p>Sometimes the primary objective of a spear phishing attack is not to steal information, but to create an opportunity for other kinds of cybersecurity attacks to flourish. For instance, the link a target clicks on could install malware on their network or serve as the first phase of a <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-a-ddos-attack\"  data-wpil-monitor-id=\"28\">DDoS attack<\/a>. Either way, spear phishing attacks are becoming increasingly sophisticated and hard to detect, making them more dangerous than ever.<\/p>\n<h3><b>Is spear phishing more widespread than phishing?<\/b><\/h3>\n<p>Relevant research hasn\u2019t shown that spear phishing is any more common than standard phishing, but there are important differences between the two types of attacks. Phishing attacks, much like their namesake, are generalized attacks that cast a wide net and hope someone will bite. Spear-phishing attacks, on the other hand, are personalized attacks that target particular individuals, organizations, or businesses. These attacks are disguised to look like they originate from someone trusted by the target and are becoming more prevalent due to their success in getting the target to lower their guard.<\/p>\n<p>This does not mean, however, that spear phishing attacks are more widespread in the numerical sense. If anything, people simply perceive spear phishing to be more widespread because they are successful a higher percentage of the time.<\/p>\n<h3><b>Is spear phishing a social engineering attack?<\/b><\/h3>\n<p>Yes, spear phishing is a type of social engineering attack.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/top-social-engineering-techniques-trending-email\" target=\"_blank\" rel=\"noopener\">Social engineering attacks<\/a>\u00a0manipulate people into compliance by preying on human nature. Social engineering attacks typically rely on two factors\u2014trust and inattentiveness.<\/p>\n<p>Cybercriminals know people are more likely to respond to messages from people or organizations they know and trust, even if they seem a little off upon further inspection. For example, if you\u2019ve recently ordered a sweater online and you see an email that appears to be from that company, most people are naturally inclined to trust it. What\u2019s more, your average busy employee doesn\u2019t scrutinize their emails for phishing attempts at all times. MSPs and their employees have to constantly be vigilant, but a bad actor only has to get lucky once.<\/p>\n<p>Unfortunately, preying on human nature pays off for a lot of cybercriminals. A\u00a0<a class=\"ext\" href=\"https:\/\/datafloq.com\/read\/social-engineering-attacks-numbers-cost\/6068\" target=\"_blank\" rel=\"noopener noreferrer\">CyberEdge report<\/a>\u00a0found that social engineering attacks were successful 79% of the time.<\/p>\n<h3><b>How can I identify spear phishing?<\/b><\/h3>\n<p>Cyberattackers grow smarter with each coming year, which means MSPs need to be just as smart\u2014if not smarter\u2014in 2020. The best way to identify and stop spear phishing attacks is to go on the offensive. Study up on spear phishing and the possible scenarios you or your customers might encounter. Educate yourself, your employees, and your customers on the types of social engineering techniques that bad actors use. Be sure every end user knows how to differentiate a legitimate email request from a fraudulent one.<\/p>\n<p>If you can memorize the verbal and visual hallmarks of spear phishing communications, you increase your chances of detecting an attack before it affects your company or your customers. Not all phishing emails are the same, but alarm bells should sound if you see an email that:<\/p>\n<ul>\n<li>Features grammatical errors throughout<\/li>\n<li>Demands you act quickly to stop something from happening to your account<\/li>\n<li>Has nonstandard URLs<\/li>\n<li>Has nonstandard company graphics or originates from a non-standard company email address<\/li>\n<\/ul>\n<p>To see if a link is legitimate, hover over it to see if the hover link matches the web address it\u2019s supposed to link to. If not, it\u2019s a scam.<\/p>\n<p>An easy way to keep everyone in your company up-to-date on threats and best practices is to enforce\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/cybersecurity-awareness-month-wrap-up\" target=\"_blank\" rel=\"noopener noreferrer\">routine cybersecurity awareness<\/a>\u00a0\u00a0training sessions.\u00a0<a class=\"ext\" href=\"https:\/\/thedefenceworks.com\/blog\/does-security-awareness-training-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">Studies<\/a>\u00a0have shown that regular security awareness training can reduce the risk of falling victim to socially engineered cyberthreats by 70%. To see results, MSPs should have training sessions at least once a year\u2014but once every quarter is even better.<\/p>\n<p>Beyond that, there are numerous technologies and IT best practices that managed services providers can lean on to help them stand up against spear phishing threats.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/two-factor-authentication\" target=\"_blank\" rel=\"noopener\">Two-factor authentication<\/a>\u00a0(2FA)\u00a0is a great way to keep an eye on who\u2019s logging into confidential accounts. If you get an alert that someone is trying to log in, but the account owner confirms it wasn\u2019t them, you\u2019ll know a spear phisher might be trying to gain access with information they\u2019ve acquired.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-filtering\">Cloud-based email filtering<\/a>\u00a0and inbound email filtering automatically block known malicious domains, so you can stop spear campaigns before they even get to your inbox.<\/p>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure<\/a>\u00a0is an excellent security tool for ramping up your\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-threat-protection\">email threat-prevention<\/a> protocols. Mail Assure leverages high-quality threat intelligence and advanced machine learning to keep your customers safe. The Intelligent Protection &amp; Email Filtering Engine has a near 100% accuracy rate, and cross-references incoming email, leveraging input from over 23 million mailboxes under management. Microsoft Office 365 is susceptible to email threats\u2014but Mail Assure integrates right in, making it easier for MSPs to protect their customers from multiple angles.<\/p>\n<p><b>For more information about spear phishing,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/search?keywords=phishing\" target=\"_blank\" rel=\"noopener\">read through our related articles<\/a>.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managed services providers (MSPs) are tasked with defending businesses from the many potential cybersecurity attacks that could be leveraged against them, from\u00a0ransomware\u00a0to distributed\u00a0denial of service (DDoS) attacks. But of the&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5581","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Protect Your Company from Spear Phishing in 2021 - N-able<\/title>\n<meta name=\"description\" content=\"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Company from Spear Phishing in 2021 - N-able\" \/>\n<meta property=\"og:description\" content=\"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T22:15:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T08:55:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How to Protect Your Company from Spear Phishing in 2021\",\"datePublished\":\"2020-12-23T22:15:43+00:00\",\"dateModified\":\"2021-10-01T08:55:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\"},\"wordCount\":1067,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Mail\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\",\"name\":\"How to Protect Your Company from Spear Phishing in 2021 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-12-23T22:15:43+00:00\",\"dateModified\":\"2021-10-01T08:55:03+00:00\",\"description\":\"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Company from Spear Phishing in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Protect Your Company from Spear Phishing in 2021 - N-able","description":"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing","og_locale":"de_DE","og_type":"article","og_title":"How to Protect Your Company from Spear Phishing in 2021 - N-able","og_description":"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.","og_url":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-12-23T22:15:43+00:00","article_modified_time":"2021-10-01T08:55:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How to Protect Your Company from Spear Phishing in 2021","datePublished":"2020-12-23T22:15:43+00:00","dateModified":"2021-10-01T08:55:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing"},"wordCount":1067,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Mail"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing","url":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing","name":"How to Protect Your Company from Spear Phishing in 2021 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-12-23T22:15:43+00:00","dateModified":"2021-10-01T08:55:03+00:00","description":"MSPs must stay up-to-date on social security threats to protect their clients as effectively as possible. Learn more about identifying phishing scams in 2020.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-protect-your-company-from-spear-phishing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/de\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"How to Protect Your Company from Spear Phishing in 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5581"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5581\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}