{"id":6081,"date":"2020-01-22T23:46:43","date_gmt":"2020-01-22T23:46:43","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6081"},"modified":"2021-04-08T23:49:47","modified_gmt":"2021-04-08T22:49:47","slug":"why-msps-security-keeps-me-night","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night","title":{"rendered":"Why MSPs\u2019 Security Keeps Me Up at Night"},"content":{"rendered":"<p>For at least a few years now, the press has rightly brought attention to the fact that small-to-midsized businesses (SMBs) have increasingly become targets for cybercriminal activity. SMBs often contain valuable data, yet rarely have the security controls available to their enterprise counterparts.<\/p>\n<p>In 2019, we saw cybercriminals point their sights at managed services providers (MSPs) as well. The US Department of Homeland Security (DHS)\u00a0<a class=\"ext\" href=\"https:\/\/www.us-cert.gov\/APTs-Targeting-IT-Service-Provider-Customers\" target=\"_blank\" rel=\"noopener noreferrer\">issued warnings<\/a>\u00a0about attacks against MSPs, and I don\u2019t see any reason for cybercriminals to stop. With recent turmoil between nation states, it\u2019s not unthinkable that MSPs could become targets of nation-state actors or cyberterrorists.<\/p>\n<p>This is why\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/msp-security-software\">MSP security<\/a>\u00a0keeps me up at night. MSPs can still take steps to reduce their exposure to cyberthreats. So, today I want to talk about why MSPs are vulnerable and what steps you can take as an MSP to secure your own environment.<\/p>\n<h3><b>Why MSPs Are So Vulnerable<\/b><\/h3>\n<p>The obvious reason MSPs have become targets is that they\u2019re central hubs for the data and systems of multiple businesses. If an attacker compromises one MSP\u2019s employee\u2019s account, they can get into systems and data for multiple companies. For the effort, that\u2019s a much larger score for a criminal than focusing on one company at a time.<\/p>\n<p>However, there are less obvious reasons that make MSPs vulnerable. The nature of running an MSP adds complications that large enterprises won\u2019t face.<\/p>\n<ul>\n<li><b>Lack of security knowledge:\u00a0<\/b>Although not always,<b>\u00a0<\/b>MSPs traditionally come from the world of systems and network management. Their focus is typically on keeping systems up and running. Protecting environments from cyberattacks hasn\u2019t been their traditional domain. As a result, they may not be as comfortable with more advanced security tools required to fight the worst of modern threats.<\/li>\n<li><b>Time-poor:\u00a0<\/b>Running an MSP business takes a lot of time. MSP owners must market the business, sell services, keep track of employee schedules, make sure service quality is up to snuff, and deal with any \u201cfires\u201d as they arise. Keeping up with the latest tools and threats in the press can be a lot to ask those owners.<\/li>\n<li><b>Lack of fiscal resources:\u00a0<\/b>Unlike larger corporations with deep pockets, MSP businesses often have to watch every penny. It\u2019s tempting to put all their money into growth strategies or bringing in new technicians instead of investing in their own security.<\/li>\n<\/ul>\n<p>So if MSPs are vulnerable, what can they do to fight back?<\/p>\n<h3><b>Secure Your Own House<\/b><\/h3>\n<p>If you own an MSP, you probably offer some security measures to your customers already, but you can\u2019t skimp on your own\u2014your security\u00a0<em>must<\/em>\u00a0be stronger than your customers\u2019. There are several steps you can take to reduce your risk of a breach. While nothing\u2019s bulletproof, these steps can help reduce your overall danger.<\/p>\n<ul>\n<li><b>Keep up with the fundamentals<\/b>: You probably offer some of these services to your customers already, but you can\u2019t neglect them on your end either. Patch regularly on both OS and third-party systems to close software vulnerabilities. Protect and monitor your network by using a next-generation firewall (and make sure it\u2019s configured appropriately). Do everything you can do to protect your endpoints. Perform regular backups and test them for recoverability. Also, add email security to the mix, since many attacks begin at the inbox.<\/li>\n<li><b>Advanced endpoint protection:<\/b>\u00a0Basic endpoint protection solutions are not enough in high-risk environments (and MSPs fall under the \u201chigh-risk\u201d category these days). Your team is most likely mobile, sometimes working from home and other environments. Invest in advanced endpoint protection solutions that look for anomalous behavior on endpoints. For example, one\u00a0<a class=\"ext\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-276B\" target=\"_blank\" rel=\"noopener noreferrer\">alert<\/a>\u00a0mentioned that APT actors used trusted applications and credentials for malicious purposes, an attack often known as living off the land. An endpoint protection solution could use artificial intelligence to detect a legitimate account attempting to perform an unusual action\u2014say deleting data or attempting to reach out to other endpoints on the network\u2014and spring into action.<\/li>\n<li><b>Monitoring:\u00a0<\/b>Some threats can\u2019t be detected or prevented using the aforementioned tools. Many threats require more advanced detection tools such as security information and event management (SIEM) tools for monitoring logs. Odds are your logs already show anomalous behavior. But wrapping your arms around the gigabits of log data each day is tough to do on your own. SIEM tools allow you to be proactive in your monitoring and get alerts when high-value, actionable events occur. Many threats require this level of active monitoring to detect and handle.<\/li>\n<li><b>Security training:<\/b>\u00a0Whether they need reminders on generating strong passwords, recognizing social engineering signs, or avoiding insecure WiFi networks on the road, reinforcing strong policies with regular trainings helps you establish and maintain a culture of security.<\/li>\n<li><b>Reducing the attack aperture:<\/b>\u00a0Don\u2019t give cybercriminals any easy openings. Look at your environment and identify the common areas representing the biggest risks, then look for ways to mitigate that risk. This could be technology, processes or people. If a single tech has full access to all your clients\u2019 systems, what would happen if their machine was compromised? If a device in your environment was infected with ransomware, could it spread to other devices in the environment and reach your clients? Do you have appropriate segmentation in the network? How about segmentation for users? You can\u2019t stop all attacks\u2014but you can contain them with proper segmentation.<\/li>\n<li><b>Password security and identity management:\u00a0<\/b>Managing identities and passwords for your users is critical to the overall protection of your environment. Passwords are often one of the weakest links, but using a password manager can help you keep passwords hard to hack across your organization. With a solution like\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\">SolarWinds<sup>\u00ae<\/sup>\u00a0Passportal<\/a>, you can automatically generate strong, unique passwords and provide technicians with one-click access to important accounts and services for your customers. Password managers prevent users from having to generate and remember passwords (or worse\u2014type them into spreadsheets or write them on sticky notes). Beyond this, Passportal lets you quickly grant or revoke account access so if an account does get compromised, you can quickly shut it down and contain the damage.<\/li>\n<li><b>Prepare for incidents:\u00a0<\/b>Despite your best efforts, security attacks happen. Hopefully, they don\u2019t happen often, but when they do, you should be prepared. Having an incident response process in place is absolutely crucial for limiting the damage. You don\u2019t necessarily have to reinvent the wheel. Build on what you already know. You have a disaster recovery process in place for your customers\u2014treat a security incident in a similar fashion. The key is to have processes set up and understand who to involve, how to communicate, and where to get help. Beyond that, it\u2019s worth drilling the team on the process of dealing with these incidents before they happen. When incidents occur, most people have strong emotional reactions; drilling beforehand can reduce potential panic among the team, allowing everyone to make smarter decisions. Don\u2019t leave it to the last minute\u2014or the actual event\u2014to prepare.<\/li>\n<\/ul>\n<h3><b>Are You Prepared?<\/b><\/h3>\n<p>As an MSP, you\u2019re on the front lines of the fight against cybercriminals. With access to so much data, you have a responsibility to not only help secure your clients\u2019 locations and systems, but also your own. While we can\u2019t completely eliminate the possibility of successful attacks on MSPs, the industry can at least work on reducing its risk.<\/p>\n<p><b>As I mentioned earlier, you should maintain strong password hygiene and access controls to guard against the cybercriminals. SolarWinds Passportal is designed to help you maintain strong password practices within your own MSP. Learn more about<\/b><a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\"><b>\u00a0how it can help today<\/b><\/a><b>.\u00a0<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><em>Tim Brown is VP of Security for SolarWinds MSP. He has over 20 years of experience developing and implementing security technology, including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Tim\u2019s experience has made him an in-demand expert on cybersecurity, and has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. Additionally, Tim has been central in driving advancements in identity frameworks, has worked with the US government on security initiatives, and holds 18 patents on security-related topics.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust&#8230;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6081","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why MSPs\u2019 Security Keeps Me Up at Night - N-able<\/title>\n<meta name=\"description\" content=\"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why MSPs\u2019 Security Keeps Me Up at Night - N-able\" \/>\n<meta property=\"og:description\" content=\"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-22T23:46:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T22:49:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tim Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\"},\"author\":{\"name\":\"Tim Brown\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\"},\"headline\":\"Why MSPs\u2019 Security Keeps Me Up at Night\",\"datePublished\":\"2020-01-22T23:46:43+00:00\",\"dateModified\":\"2021-04-08T22:49:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\"},\"wordCount\":1385,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\",\"name\":\"Why MSPs\u2019 Security Keeps Me Up at Night - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-01-22T23:46:43+00:00\",\"dateModified\":\"2021-04-08T22:49:47+00:00\",\"description\":\"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why MSPs\u2019 Security Keeps Me Up at Night\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\",\"name\":\"Tim Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"caption\":\"Tim Brown\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why MSPs\u2019 Security Keeps Me Up at Night - N-able","description":"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night","og_locale":"de_DE","og_type":"article","og_title":"Why MSPs\u2019 Security Keeps Me Up at Night - N-able","og_description":"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.","og_url":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-01-22T23:46:43+00:00","article_modified_time":"2021-04-08T22:49:47+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Tim Brown","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Tim Brown","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night"},"author":{"name":"Tim Brown","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8"},"headline":"Why MSPs\u2019 Security Keeps Me Up at Night","datePublished":"2020-01-22T23:46:43+00:00","dateModified":"2021-04-08T22:49:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night"},"wordCount":1385,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night","url":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night","name":"Why MSPs\u2019 Security Keeps Me Up at Night - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-01-22T23:46:43+00:00","dateModified":"2021-04-08T22:49:47+00:00","description":"MSPs have become increasingly important targets for cyberattackers. In this blog Tim Brown looks at some of the ways you can make sure your own defenses are even more robust than your clients\u2019.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/why-msps-security-keeps-me-night#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Why MSPs\u2019 Security Keeps Me Up at Night"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8","name":"Tim Brown","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","caption":"Tim Brown"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6081"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6081\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}