{"id":5324,"date":"2020-03-17T20:26:23","date_gmt":"2020-03-17T20:26:23","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5324"},"modified":"2021-04-05T22:24:00","modified_gmt":"2021-04-05T21:24:00","slug":"6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","title":{"rendered":"6 Most Effective Tactics to Protect Your Business from Malware in 2020"},"content":{"rendered":"<p>For managed services providers (MSPs), malware is an unwelcome predator\u2014one that stands to put both their customers\u2019 reputations and their own on the line. This devastating cyberattack can come in many shapes and sizes, but the end goal is always the same: to compromise workstations, laptops, servers, or computer networks and gain access to or damage business-critical data.<\/p>\n<p>According to a report from\u00a0<a class=\"ext\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/XZGZLRVD\" target=\"_blank\" rel=\"noopener noreferrer\">IBM X-Force Incident Response and Intelligence Services<\/a>\u00a0(IRIS), the first half of 2019 saw a 200% increase\u00a0in malware attacks compared to the last half of 2018. Resolving and recovering from these destructive attacks is not only time-consuming\u2014it\u2019s also expensive. IRIS estimates that victimized organizations spend an average of 512 remediation hours to recover and lose over $200 million in the process.<\/p>\n<p>Fortunately, knowledge is power. MSPs must become intimately familiar with the types of malware in existence, as well as the tactics designed to mitigate against them. With these insights in hand, MSPs will be better equipped to outsmart even the most cunning hackers.<\/p>\n<h2>Getting to know you: the many faces of malware<\/h2>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/malware-analysis-steps\" target=\"_blank\" rel=\"noopener\">Malware<\/a>, short for \u201cmalicious software,\u201d is an umbrella term for dangerous programs that cybercriminals use to target their victims. There are many different varieties of malware, including:<\/p>\n<ul>\n<li><b>Viruses<\/b>\u00a0are a type of malware that infect, delete, and corrupt files<\/li>\n<li><b>Worms<\/b>\u00a0are network malware that infect multiple connected devices<\/li>\n<li><b>Trojan horses\u00a0<\/b>are disguised as legitimate software and open a \u201cbackdoor\u201d into your device for other malware to exploit<\/li>\n<li><b>Adware<\/b>\u00a0displays unwanted advertisements (pop-ups) and can open your network up to additional vulnerabilities, much like Trojan horses<\/li>\n<li><b>Spyware\u00a0<\/b>tracks passwords, credit card numbers, and online behavior<\/li>\n<li><b>Rootkits<\/b>\u00a0allow attackers to maintain privileged access to a computer or certain programs while remaining undetected<\/li>\n<\/ul>\n<h2>Six tactics to keep your customers\u2019 data safe from malware<\/h2>\n<p>Protecting your customers\u2019 networks and computers from attacks requires a multi-pronged approach that stops attackers at every angle. Here are six tactics to consider as you develop your security strategy:<\/p>\n<h3>1. Keep all systems, software, and applications up-to-date at all times<\/h3>\n<p>An out-of-date system means one thing: vulnerabilities. As attackers become more sophisticated and researchers become more diligent, vulnerabilities in popular software, operating systems, end-user applications, and even security software are discovered every day. Attackers wait patiently to exploit these vulnerabilities and gain access to your customers\u2019 IT infrastructure in one fell swoop.<\/p>\n<p>To combat these attackers, vendors push out new updates, also known as\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/patch-art-patch-management\" target=\"_blank\" rel=\"noopener\">patches<\/a>, at a rapid rate. Keeping up with these repairs for numerous customers and devices can be challenging for even the most advanced MSP. While some platforms, including Microsoft, have begun leveraging automated software updates, this isn\u2019t universal. It\u2019s up to MSPs to remain vigilant and leverage a sophisticated patch management system. These tools are designed to monitor for missing patches and notify admins as soon as a missed patch is identified.<\/p>\n<p>With robust patch protection in motion, MSPs can rest assured their customers\u2019 infrastructure is as up-to-date as possible.<\/p>\n<h3>2. Make email monitoring a top priority<\/h3>\n<p>Email is an inevitable part of business culture. It allows employees to communicate quickly and efficiently with their teams, clients, and customers alike\u2014but on the other hand, it\u2019s also favored by cyber attackers. According to\u00a0<a class=\"ext\" href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/DBIR_2018_Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon\u2019s 2018 Data Breach Investigation Report<\/a>, 92.4% of malware is delivered via email.<\/p>\n<p>As an MSP, email security is no joke. Fortunately,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security\" target=\"_blank\" rel=\"noopener\">email security software<\/a>\u00a0has evolved to<\/p>\n<p>serve two purposes\u2014defend against email-based malware attacks, and also ensure\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-continuity\" target=\"_blank\" rel=\"noopener\">email continuity<\/a>\u00a0through a cloud-based email archive. This archive will help ensure employees have access to their email even if the infrastructure fails. From a prevention standpoint, machine learning and threat intelligence are leveraged to help identify and block email-based malware before it enters an employee\u2019s inbox.<\/p>\n<h3>3. Put constructive web or URL filters into play<\/h3>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/web-protection\" target=\"_blank\" rel=\"noopener\">Web protection systems<\/a>\u00a0have earned a negative reputation among some companies. Employees see them as a threat to their independence and a test of their trust. In reality, these filtering systems are designed to protect and empower employees by ensuring they don\u2019t inadvertently put their entire system at risk.<\/p>\n<p>With these platforms in hand, MSPs can control, monitor, and enforce web filtering\u00a0all via a single computer screen. This allows them to block potentially harmful websites that could contain malware, spyware, and other dangerous software. When employees navigate to a site, the web filtering software will identify the site, its content, and its URL all in real-time. Within a matter of milliseconds, the tool will determine whether the site can be viewed or must be blocked to comply with predefined rules and company policies. In addition, MSPs can set up a notification system that alerts administrators as soon as an employee attempts to access a blocked website. Other customizable features include time-based browsing rules, web policies specific to devices or users, and more depending on the software.<\/p>\n<h3>4. Educate customers on the risks and warning signs<\/h3>\n<p>Effective cybersecurity is a community responsibility. But to truly build a culture of security, education is key. In a survey of attendees at the 2017 Black Hat security conference,\u00a0<a class=\"ext\" href=\"https:\/\/www.computerweekly.com\/news\/450425184\/Security-professionals-name-top-causes-of-breaches\" target=\"_blank\" rel=\"noopener noreferrer\">approximately 84% of respondents<\/a>\u00a0whose company had experienced a cyberattack attributed at least part of it to human error.<\/p>\n<p>MSPs must empower their customers with the insights they need to make smart, secure decisions day-in and day-out. This can involve explaining what malware is, how it works, and what red flags customers should keep an eye out for. Malware pop-ups or emails may contain text like, \u201cCONGRATULATIONS! Your banner ID #12345 has won an hourly contest. Click here.\u201d They can also be subtler and more convincing, posing as Windows or another trusted provider seeking your login details for an update. Encourage your customers to proceed with caution and always raise any suspicious content up the flagpole before clicking.<\/p>\n<h3>5. Put firewalls into effect<\/h3>\n<p>In many ways, firewalls are your first line of defense against attackers. Firewalls act as a filtration system, scanning packets for malicious code or threatening attack vectors. Should a data packet be flagged and labeled a security risk, the firewall prevents it from entering the network or reaching your computer.<\/p>\n<p>Firewalls can take the shape of hardware or software. The hardware options are often built into routers to intercept traffic moving between the broadband router and user devices. Software options are programs that monitor the traffic going in and out of your customers\u2019 computers. Due to the extensive array of cyberattacks, it can be difficult for any type of firewall to filter out each and every threat attempting to gain access. Pairing firewalls with other security programs and hardware is a must.<\/p>\n<h3>6. Encrypt critical files and folders<\/h3>\n<p>This final tactic isn\u2019t designed to\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/malware-protection\">prevent malware<\/a>\u00a0from entering your customers\u2019 network\u2014rather,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/aes-256-encryption-algorithm\" target=\"_blank\" rel=\"noopener\">encryption<\/a>\u00a0is a way to protect your customers\u2019 data in the event of an attack. An encryption system scrambles sensitive data using mathematical calculations to turn data into a ciphertext of unreadable characters. The original data can only be revealed with a key generated by the encryption algorithm, allowing it to remain hidden from everyone but the authorized parties. If an attacker manages to enter the network, they\u2019ll find themselves face-to-face with a wall of meaningless jargon.<\/p>\n<p>In a sense, database encryption should be redundant, only becoming necessary if access controls and other security measures fail. However, adhering too closely to this mindset is a clear vulnerability, as these other security measures aren\u2019t failsafe. MSPs can help businesses understand that databases need additional safeguard protections in place.<\/p>\n<h2>Putting enterprise malware protection into play<\/h2>\n<p>As hackers become more creative and innovative in the art of attack, MSPs must step up to the plate with equally creative and innovative protection practices and policies. Patch updates, cloud email security initiatives, URL filtering, education, firewalls, and multi-layer encryption are just a few of the many ways to protect your customers\u2019 data and safeguard your reputation as a security leader.<\/p>\n<p>How you use each of these tactics is up to you as an MSP. The most important thing is to have a plan, put it in place, and get your customers on board. With the right cybersecurity strategy, 2020 has the potential to be your best year yet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5324","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able<\/title>\n<meta name=\"description\" content=\"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-17T20:26:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-05T21:24:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"6 Most Effective Tactics to Protect Your Business from Malware in 2020\",\"datePublished\":\"2020-03-17T20:26:23+00:00\",\"dateModified\":\"2021-04-05T21:24:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\"},\"wordCount\":1368,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\",\"name\":\"6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-03-17T20:26:23+00:00\",\"dateModified\":\"2021-04-05T21:24:00+00:00\",\"description\":\"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Most Effective Tactics to Protect Your Business from Malware in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able","description":"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","og_locale":"es_ES","og_type":"article","og_title":"6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able","og_description":"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.","og_url":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-17T20:26:23+00:00","article_modified_time":"2021-04-05T21:24:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"6 Most Effective Tactics to Protect Your Business from Malware in 2020","datePublished":"2020-03-17T20:26:23+00:00","dateModified":"2021-04-05T21:24:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020"},"wordCount":1368,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","url":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020","name":"6 Most Effective Tactics to Protect Your Business from Malware in 2020 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-03-17T20:26:23+00:00","dateModified":"2021-04-05T21:24:00+00:00","description":"Read about how to leverage six effective enterprise malware protection techniques to keep your MSP customers safe from attack.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"6 Most Effective Tactics to Protect Your Business from Malware in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5324"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}