{"id":66087,"date":"2025-04-30T12:03:13","date_gmt":"2025-04-30T11:03:13","guid":{"rendered":"https:\/\/www.n-able.com\/?p=66087"},"modified":"2025-04-30T12:03:13","modified_gmt":"2025-04-30T11:03:13","slug":"assessing-it-risk-exposure-a-guide-for-it-leaders","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders","title":{"rendered":"Assessing IT Risk Exposure: A Guide for IT Leaders"},"content":{"rendered":"<p>In IT security, knowledge is power. For internal IT leaders and MSPs, understanding risk exposure is the first step in making strategic, informed decisions about where your company (or in the case of MSPs; your customers) should invest in cybersecurity. Without a clear picture of risks, budgets can be wasted on unnecessary tools while critical vulnerabilities go unaddressed.<\/p>\n<p>A proper risk assessment enables you to prioritize investments, mitigate potential threats, and build a proactive security strategy. This blog will guide you through a structured approach to assessing risk exposure, helping you determine where security budget should be spent.<\/p>\n<h2><strong>Security Should Be About Risk, Not Cost<\/strong><\/h2>\n<p>One of the most common mistakes companies make when discussing security is focusing too much on cost instead of the risk. While budgets are always a factor, making security decisions based solely on cost can lead to underinvestment in critical areas or overspending on unnecessary tools.<\/p>\n<p>Instead, security should be approached from a risk-based perspective:<\/p>\n<ul>\n<li><strong>Not all risks are equal.<\/strong> A minor vulnerability on a non-critical system doesn\u2019t warrant the same investment as a major weakness in a high-value target like a customer database.<\/li>\n<li><strong>Cyber incidents cost more than prevention.<\/strong> The financial and reputational damage from a breach far outweighs the cost of proactive security. Cybercrime is projected to cost the world $10.5 trillion annually by 2025 (<a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a>).<\/li>\n<li><strong>Risk-based security ensures smarter spending.<\/strong> Instead of allocating funds evenly across security initiatives, prioritizing high-impact risks maximizes the value of every pound, dollar, or euro spent.<\/li>\n<\/ul>\n<p>By shifting the conversation from &#8222;How much will this cost?&#8220; to &#8222;What risks does this mitigate?&#8220;, you can build more effective, resilient security strategies.<\/p>\n<h2><strong>Why Risk Assessment Matters in IT Security<\/strong><\/h2>\n<p>Before looking at the different steps you need to take to assess company risk, let&#8217;s explore why risk assessment is so crucial for IT security:<\/p>\n<ul>\n<li><strong>Understanding IT Risk<\/strong><br \/>\nCybersecurity risks come from a combination of threats (attack methods), vulnerabilities (security weaknesses), and impact (potential damage). Without a thorough risk assessment, businesses can remain unaware of critical weaknesses in their defenses.<\/li>\n<li><strong>The Cost of Inaction<\/strong><br \/>\nThe financial, operational, and reputational consequences of ignoring risk assessments can be devastating. High-profile cyberattacks have exposed companies to lawsuits, regulatory fines, and loss of customer trust.<\/li>\n<li><strong>Compliance &amp; Regulatory Pressures<\/strong><br \/>\nWith frameworks like GDPR, HIPAA, NIST, and ISO 27001, organizations must demonstrate that they are proactively managing cybersecurity risks, or risk facing fines and legal action.<\/li>\n<li><strong>MSPs&#8216; Role in Client Security<\/strong><br \/>\nAs an MSP, your clients trust you to identify and mitigate security risks before they lead to breaches. A proper risk assessment ensures that your services are aligned with their true needs.<\/li>\n<\/ul>\n<h2><strong>The Components of IT Risk Exposure<\/strong><\/h2>\n<p>Risk exposure consists of four key elements:<\/p>\n<ol>\n<li><strong>Threats<\/strong> (i.e., ransomware, phishing, insider threats, DDoS attacks, supply chain attacks, etc).<\/li>\n<li><strong>Vulnerabilities<\/strong> (i.e., unpatched systems, weak credentials, misconfigured security settings, etc).<\/li>\n<li><strong>Impact<\/strong> (i.e., financial losses, regulatory penalties, reputational damage, etc).<\/li>\n<li><strong>Likelihood<\/strong> (the probability that a threat will exploit a vulnerability).<\/li>\n<\/ol>\n<p>To manage risk effectively, you must evaluate these elements in a structured way.<\/p>\n<h2><strong>Step-by-Step Guide to Assessing IT Risk Exposure<\/strong><\/h2>\n<h3><strong>Step 1: Identify and Classify Assets<\/strong><\/h3>\n<p><em>Why it matters:<\/em> You can&#8217;t protect what you don&#8217;t know you have. A complete inventory of IT assets helps identify what needs securing.<\/p>\n<p><strong>How to do it correctly:<\/strong><\/p>\n<ul>\n<li><strong>Categorize assets<\/strong>: List all IT assets, including:\n<ul>\n<li><strong>Hardware<\/strong>: Servers, workstations, IoT devices, networking equipment.<\/li>\n<li><strong>Software<\/strong>: Operating systems, applications, cloud platforms.<\/li>\n<li><strong>Data<\/strong>: Customer records, intellectual property, financial data.<\/li>\n<li><strong>Networks<\/strong>: Firewalls, VPNs, wireless networks.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Assess criticality<\/strong>: Rank assets based on:\n<ul>\n<li>Business importance (what happens if this asset is compromised?)<\/li>\n<li>Sensitivity of the data involved.<\/li>\n<li>Compliance requirements.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Automate asset discovery<\/strong>: Use tools that can perform active and passive discovery of network assets like <a href=\"https:\/\/www.n-able.com\/solutions\/remote-monitoring-and-management\">N&#8209;able\u2019s Remote Monitoring and Management (RMM) platform<\/a> to maintain an up-to-date inventory.<\/li>\n<\/ul>\n<h3><strong>Step 2: Identify Threats and Vulnerabilities<\/strong><\/h3>\n<p><em>Why it matters:<\/em> If you don\u2019t know where the weak points are, you can\u2019t defend them.<\/p>\n<p><strong>How to do it correctly:<\/strong><\/p>\n<ul>\n<li><strong>Perform vulnerability scanning<\/strong>: Use tools like the <a href=\"https:\/\/www.n-able.com\/blog\/why-built-in-vulnerability-management-matters-n-able-rmm\">built-in vulnerability management<\/a> within<strong>\u00a0<\/strong>N&#8209;able\u2019s Remote Monitoring and Management (RMM) platform to find and address vulnerable applications.<\/li>\n<li><strong>Assess common attack vectors<\/strong>:\n<ul>\n<li><strong>Phishing &amp; social engineering<\/strong>: Test security awareness among employees.<\/li>\n<li><strong>Unpatched software<\/strong>: Check for outdated applications and OS vulnerabilities.<\/li>\n<li><strong>Weak access controls<\/strong>: Ensure least privilege access and multi-factor authentication (MFA) are enforced.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Conduct penetration testing<\/strong>: Simulate cyberattacks to identify weak points before real attackers do.<\/li>\n<\/ul>\n<h3><strong>Step 3: Assess Impact and Likelihood<\/strong><\/h3>\n<p><em>Why it matters:<\/em> Some risks are catastrophic, while others are minor. Prioritizing security efforts requires understanding both potential impact and probability of occurrence.<\/p>\n<p><strong>How to do it correctly:<\/strong><\/p>\n<ul>\n<li><strong>Use a risk matrix<\/strong>: Assign High\/Medium\/Low ratings to both impact and likelihood for each identified risk.<\/li>\n<li><strong>Perform a Business Impact Analysis (BIA)<\/strong>:\n<ul>\n<li>What happens if a system is compromised?<\/li>\n<li>How long can the business function without it?<\/li>\n<li>What are the financial and reputational costs?<\/li>\n<\/ul>\n<\/li>\n<li><strong>Evaluate compliance requirements<\/strong>: Some vulnerabilities pose legal and regulatory risks beyond operational disruption.<\/li>\n<\/ul>\n<h3><strong>Step 4: Prioritize Risks<\/strong><\/h3>\n<p><em>Why it matters:<\/em> Security budgets are limited. Focusing on the most critical risks ensures maximum protection with available resources.<\/p>\n<p><strong>How to do it correctly:<\/strong><\/p>\n<ul>\n<li><strong>Prioritize &#8222;High-Impact, High-Likelihood&#8220; risks first<\/strong>.<\/li>\n<li><strong>Use a risk appetite framework<\/strong>: Determine which risks are acceptable versus those requiring immediate action.<\/li>\n<li><strong>Collaborate with stakeholders across the business<\/strong>: Include IT, legal, finance, and leadership teams to align risk decisions with business goals.<\/li>\n<\/ul>\n<h2><strong>Key Takeaways &amp; Next Steps<\/strong><\/h2>\n<ul>\n<li><strong>Security is about risk, not just cost<\/strong> \u2013 investing wisely prevents bigger financial losses down the line.<\/li>\n<li><strong>Prioritize based on impact and likelihood<\/strong> \u2013 this helps to maximize security investments.<\/li>\n<li><strong>MSPs and IT leaders must take a proactive role<\/strong> in guiding cybersecurity strategies.<\/li>\n<li><strong>Next step<\/strong>: Conduct a risk assessment now, before attackers find your weak spots.<\/li>\n<\/ul>\n<h2><strong>Final Thoughts<\/strong><\/h2>\n<p>Understanding risk exposure is not just about cybersecurity \u2013 it&#8217;s about business resilience. Whether you&#8217;re an internal IT leader protecting your company or an MSP securing clients, an effective risk assessment ensures that security investments are strategic, impactful, and future-proof.<\/p>\n<p><strong>Discover how N&#8209;able&#8217;s IT Risk Management Software can streamline your security operations and minimize risks. <\/strong><a href=\"https:\/\/www.n-able.com\/features\/it-risk-management-software\" target=\"_blank\" rel=\"noopener\"><strong>Learn more<\/strong><\/a><strong>.<\/strong><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>Jay Pitzer is Senior Product Marketing Manager for N&#8209;able\u2019s Security Portfolio<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.<\/p>\n","protected":false},"author":52,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-66087","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-risk-assessment","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Assessing IT Risk Exposure: A Guide for IT Leaders - N-able<\/title>\n<meta name=\"description\" content=\"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assessing IT Risk Exposure: A Guide for IT Leaders - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T11:03:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/04\/042825_BB_IT-Risk-Exposure_PD_Final_1200x628-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jay Pitzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Pitzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\"},\"author\":{\"name\":\"Jay Pitzer\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b\"},\"headline\":\"Assessing IT Risk Exposure: A Guide for IT Leaders\",\"datePublished\":\"2025-04-30T12:03:13+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\"},\"wordCount\":1034,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\",\"name\":\"Assessing IT Risk Exposure: A Guide for IT Leaders - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2025-04-30T12:03:13+01:00\",\"description\":\"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b\",\"name\":\"Jay Pitzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"caption\":\"Jay Pitzer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Assessing IT Risk Exposure: A Guide for IT Leaders - N-able","description":"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders","og_locale":"de_DE","og_type":"article","og_title":"Assessing IT Risk Exposure: A Guide for IT Leaders - N-able","og_description":"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.","og_url":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-04-30T11:03:13+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/04\/042825_BB_IT-Risk-Exposure_PD_Final_1200x628-scaled.jpg","type":"image\/jpeg"}],"author":"Jay Pitzer","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Jay Pitzer","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders"},"author":{"name":"Jay Pitzer","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b"},"headline":"Assessing IT Risk Exposure: A Guide for IT Leaders","datePublished":"2025-04-30T12:03:13+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders"},"wordCount":1034,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders","url":"https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders","name":"Assessing IT Risk Exposure: A Guide for IT Leaders - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2025-04-30T12:03:13+01:00","description":"Learn how to assess IT risk exposure, prioritize security investments, and build a proactive cybersecurity strategy for your business.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/assessing-it-risk-exposure-a-guide-for-it-leaders"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b","name":"Jay Pitzer","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","caption":"Jay Pitzer"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/66087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=66087"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/66087\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=66087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}