{"id":5033,"date":"2017-11-10T19:28:34","date_gmt":"2017-11-10T19:28:34","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5033"},"modified":"2021-03-31T19:33:48","modified_gmt":"2021-03-31T18:33:48","slug":"what-pii-and-phi-and-how-do-you-secure-them","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them","title":{"rendered":"What Is PII and PHI and How Do You Secure Them?"},"content":{"rendered":"<p>Even with the regular news stories about data breaches, I\u2019m still not sure our society views cybersecurity and cyberspace seriously enough. Many still entertain the notion that cyberspace is somehow removed from the physical world we live in, but there is nothing \u201cvirtual\u201d about this reality or the threats that exist here. Think about how cyberspace impacts our life. Where does the majority of our communication happen? Where is the information concerning our life and possessions stored? The records for our houses, our cars, etc.\u2014all the primary sources for these exist in cyberspace. That includes our money. Check out a bank statement. Do we really think there is physical \u201cmoney\u201d in a vault someplace? No, it\u2019s just binary code on a hard drive somewhere. Let\u2019s face it; if we were erased in cyberspace, our life in physical space would be miserable. We would have a hard time proving we have property, history, wealth, or even citizenship. That is why it is so important to secure the data we depend on. To that end, two acronyms we should know are PII and PHI.<\/p>\n<p><b>What does PII stand for?<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\" alt=\"PII.jpg\" width=\"409\" height=\"202\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>The definition of PII is personally identifiable information. This is information that, on its own or combined, can be used to identify, locate, or contact an individual. Some examples of PII are obviously sensitive: Social Security number, credit card number, driver\u2019s license number, and account numbers. Others are less obvious but just as important: full name, date of birth, home address, phone number, employment history, purchase history, email address, or even a photo of an individual\u2019s face. PII is legally protected by many state laws and good business practices.<\/p>\n<p><b>What does PHI stand for?<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/healthdata.jpg\" alt=\"healthdata.jpg\" width=\"407\" height=\"201\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>The definition of PHI is protected health information. It is a subset of PII that is protected by the\u00a0<a class=\"ext\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA Privacy Act of 1996<\/a>. PHI is information that can be used to identify an individual AND that relates to that individual&#8217;s past, present, or future physical or mental health care or health care payments. Some examples of PHI are: any and all PII gathered in the course of providing health services, medical, dental, or prescription drug records, insurance coverage, health plan number, status in a government health program, and dates of hospitalization.<\/p>\n<p>While healthcare workers in the United States are bound by HIPAA, outside the US, there are similar frameworks for PII and PHI, such as the\u00a0<a class=\"ext\" href=\"https:\/\/www.cyberaware.gov.uk\/cyberessentials\/\" target=\"_blank\" rel=\"noopener noreferrer\">UK Cyber Essentials<\/a>, Canada\u2019s\u00a0<a class=\"ext\" href=\"https:\/\/www.tbs-sct.gc.ca\/pol\/doc-eng.aspx?id=12328\" target=\"_blank\" rel=\"noopener noreferrer\">Management of Information Technology Security (MITS)<\/a>, and the\u00a0<a class=\"ext\" href=\"https:\/\/www.asd.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">Australian Signals Directorate (ASD)<\/a>. Fines can be steep for violations. For HIPAA violations, the civil penalties for the unintentional yet inappropriate release of PHI range from $100 to $50,000 per violation, with up to a maximum of $1.5 million in a year. Individuals who intentionally obtain, disclose, or sell PHI for personal gain or malicious harm may incur criminal penalties including fines AND prison time up to 10 years.<\/p>\n<p>So how do we secure this PII and PHI knowing that a data breach can affect lives and even bring legal repercussions? First, our level of security must match the level of data sensitivity. In the case of PII, it depends on the business contract under which we are handling the PII and any applicable state laws. For any PII you handle, make sure you know your obligations! In the case of PHI, we know it is considered highly sensitive and so we need to use PHI security best practices.<\/p>\n<p><b>Cybersecurity best practices<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/security.jpg\" alt=\"security.jpg\" width=\"407\" height=\"201\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Start out with the fundamentals (this is not an exhaustive list):<\/p>\n<ul>\n<li>Use a firewall.<\/li>\n<li>Use good password policies. According to\u00a0<a class=\"ext\" href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_dbir-2016-executive-summary_xg_en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<\/a><sup>\u00ae<\/sup>, \u201c63% of confirmed data breaches involved leveraging weak, default, or stolen passwords.\u201d<\/li>\n<li>Use antimalware software that is automatically updated.<\/li>\n<li>Have policies addressing allowable software and internet usage.<\/li>\n<li>Have policies addressing the business use of personal devices.<\/li>\n<li>Keep servers and workstations continuously patched.<\/li>\n<li>Perform regular system backups.<\/li>\n<li>Monitor system logs and security alerts.<\/li>\n<\/ul>\n<p>In addition to these, when dealing with PHI, it is especially important to use encryption in all its forms:<\/p>\n<ul>\n<li>A remote-access VPN for mobile users to establish secure connections with your network.<\/li>\n<li>Encrypted email messages to protect content from being read by someone other than the intended recipients.<\/li>\n<li>Encryption at rest to secure data persistently stored on any mobile device including laptops, tablets, and phones.<\/li>\n<li>Endpoint encryption to secure data that is copied to USB flash drives or memory cards.<\/li>\n<\/ul>\n<p>The issues with mobile devices can be handled by\u00a0<a class=\"ext\" href=\"https:\/\/en.wikipedia.org\/wiki\/Mobile_device_management\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Device Management Software (MDM)<\/a>. As the name implies, MDM is for the administration of smart phones, tablets, and laptops. It runs an agent installed on the mobile device that connects to a server. It can be used to enforce connectivity through the company VPN, encrypt the entire hard drive, deliver antivirus updates, and also facilitate a remote wipe of a mobile device that is lost or stolen! On\u00a0<a class=\"ext\" href=\"http:\/\/whatis.techtarget.com\/definition\/BYOD-bring-your-own-device\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD<\/a>\u00a0(bring your own device) smart phones, it can also separate the user\u2019s personal apps from the secure company browser, secure company email, and the associated encrypted business data.<\/p>\n<p><b>Physical security best practices<\/b><\/p>\n<p>Because cybercriminals use eyes, ears, and phones almost as much as they use computers, do the following\u00a0 (this is not an exhaustive list):<\/p>\n<ul>\n<li>Locking screen savers should be activated on computers accessing PHI.<\/li>\n<li>Computer screens should be positioned so that only the user can see the screen (beware of windows behind you).<\/li>\n<li>Minimize paper usage. \u201cInstead of writing on a post it, use a whiteboard and erase it.\u201d<\/li>\n<li>Printers and FAX machines used for PHI must be placed in private areas.<\/li>\n<li>Documents should be picked up immediately and disposed of in shred bins when finished.<\/li>\n<li>Implement a clean desk policy. No PHI should be unlocked when a person is away from their work area.<\/li>\n<li>PHI must never be removed from the office unless there is a clear business need.<\/li>\n<li>Never leave any mobile device containing PHI unattended or out of reach.<\/li>\n<li>Don\u2019t discuss PHI in public areas.<\/li>\n<\/ul>\n<p>Information is one of our most precious resources and is the asset that powers and enables our business. Let\u2019s treat it that way.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Dan Toth is an information systems specialist with a proven background in the development and management of systems, projects, and personnel. Dan\u2019s particular areas of strength include Network Management, Healthcare-Related Computer Systems, Technical Training, and Information and Physical Security.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/www.solarwindsmsp.com\/products\/risk-intelligence\" target=\"_blank\" rel=\"noopener\">Click here<\/a>\u00a0to find out how SolarWinds Risk Intelligence can help you locate and secure personal data on your network.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5033","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PII and PHI Differences: Cybersecurity - N-able<\/title>\n<meta name=\"description\" content=\"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PII and PHI Differences: Cybersecurity - N-able\" \/>\n<meta property=\"og:description\" content=\"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-10T19:28:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-31T18:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"What Is PII and PHI and How Do You Secure Them?\",\"datePublished\":\"2017-11-10T19:28:34+00:00\",\"dateModified\":\"2021-03-31T18:33:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\"},\"wordCount\":1084,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\",\"name\":\"PII and PHI Differences: Cybersecurity - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\",\"datePublished\":\"2017-11-10T19:28:34+00:00\",\"dateModified\":\"2021-03-31T18:33:48+00:00\",\"description\":\"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is PII and PHI and How Do You Secure Them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PII and PHI Differences: Cybersecurity - N-able","description":"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them","og_locale":"es_ES","og_type":"article","og_title":"PII and PHI Differences: Cybersecurity - N-able","og_description":"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.","og_url":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-11-10T19:28:34+00:00","article_modified_time":"2021-03-31T18:33:48+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Guest","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"What Is PII and PHI and How Do You Secure Them?","datePublished":"2017-11-10T19:28:34+00:00","dateModified":"2021-03-31T18:33:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them"},"wordCount":1084,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg","articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them","url":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them","name":"PII and PHI Differences: Cybersecurity - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg","datePublished":"2017-11-10T19:28:34+00:00","dateModified":"2021-03-31T18:33:48+00:00","description":"Are you doing enough to secure PHI and PII? Learn more about PHI and PII, and discover how to help protect personal and private data from external threats.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/11\/PII.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/what-pii-and-phi-and-how-do-you-secure-them#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"What Is PII and PHI and How Do You Secure Them?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5033"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5033\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}