{"id":5343,"date":"2020-05-06T21:08:47","date_gmt":"2020-05-06T20:08:47","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5343"},"modified":"2021-07-09T15:37:40","modified_gmt":"2021-07-09T14:37:40","slug":"10-tips-to-ensure-remote-access-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security","title":{"rendered":"10 Tips to Help Ensure Remote Access Security at Your Organization"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>Remote access is regularly used by managed services providers (MSPs) to\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/use-cases\/remote-assistance-software\">assist customers experiencing IT issues<\/a>\u00a0without actually having to be present at a specific machine or device. However, it is important to remember that support via remote desktop access isn\u2019t just about rectifying or troubleshooting issues\u2014the experience needs to be quick and simple for the end user while still maintaining a tight focus on security. Without prioritizing security as a component of remote access support, MSPs may be leaving customers vulnerable to data theft and cyberattacks.<\/p>\n<p>Moreover, poor remote access security is likely to damage your wider reputation as an organization. To help maintain high levels of\u00a0customer satisfaction, you must be able to follow consistently secure remote access practices. With cyberattacks becoming increasingly sophisticated, establishing secure remote access is more important than ever. This guide will outline what remote desktop access is, how remote access technology works, and the top tips to help establish more secure remote access.<\/p>\n<h3><b>What is remote access technology?<\/b><\/h3>\n<p>When we discuss remote access technology, there are two different types of remote access we might be talking about. The first type of remote access is used to refer to employees accessing work resources or data from outside of their usual office or work environment. This is the type of technology that is utilized when employees \u201cwork from home.\u201d<\/p>\n<p>In the context of this article, however, we discuss remote access as the technical support provided remotely by third-party organizations such as MSPs. This usually involves remotely connecting to an end user\u2019s device so the technician can resolve any system or software issues. This is also called\u00a0remote support.<\/p>\n<h3><b>How Does Remote Access Work?<\/b><\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-cta paragraph--view-mode--default\">\n<div class=\"explore-box quick-cta\">\n<div id=\"solar-features-trial\"><\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>Remote access allows a \u201chost\u201d computer to view the desktop screen of the \u201ctarget\u201d computer. The host is the local computer belonging to the individual, usually an IT technician, attempting to establish remote access. The target is the remote computer. When remote access is established, the host computer is able to view and control the target computer through the target computer\u2019s interface. This means the technician can see exactly what the end user sees. This precise insight makes providing technical support significantly less time-consuming. For remote access to work, both devices will need to have software installed that facilitates the connection.<\/p>\n<p>A remote support session is often used by MSPs and other service providers to help a customer encountering IT issues and can be established in a number of ways. For example, the customer might provide initial instructions detailing how to set up screen sharing under existing practices. Or, in many cases, the support technician can utilize\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/use-cases\/remote-support-software-msps\">remote support tools<\/a>\u00a0built for this specific purpose.<\/p>\n<h3><b>10 tips to help secure remote access<\/b><\/h3>\n<p>Secure remote access is becoming increasingly important as organizations begin to rely more heavily on remote technical support\u2014and as cybercrime continues to become more advanced. These 10 tips can help you establish robust remote access security practices for your MSP. Many of these tips also apply to mobile device remote access security.<\/p>\n<p><strong>1. Teach risk prevention<\/strong><\/p>\n<p>Teaching both your technicians and your customers about risk prevention is a crucial part of establishing secure remote access practices. If your team or clients are not following the correct procedures, remote access can create unnecessary vulnerabilities. Teaching risk prevention involves making every party aware of the reality of cyberthreats, the likelihood of them occurring, and how their actions can help prevent them.<\/p>\n<p>You can start by informing all involved parties about the potential dangers of remote access to help ensure everyone is taking best practices seriously. Opening a network up to remote users can also open up entry points for external threats and malware, which can eventually cause a major breach. Once the team understands this, they\u2019ll be more likely to understand how critical it is that policies like user authentication are in place to protect the organization.<\/p>\n<p><strong>2. Utilize effective access rights management\u00a0<\/strong><\/p>\n<p>Secure remote access is at its best when combined with effective access rights management. By limiting access to only those who absolutely need it, MSPs can boost their overall security and help prevent loss of sensitive data. Measures should be taken to ensure that only technicians with the appropriate access rights can remotely access customers\u2019 mobile devices, servers, and desktops. There should also be steps taken to authenticate these authorized users, which we\u2019ll discuss further in our fifth tip below.<\/p>\n<p><strong>3. Lock down credentials<\/strong><\/p>\n<p>To achieve maximum remote access security, you should use and encourage your end users to employ a robust password manager. A\u00a0<a class=\"ext\" href=\"\/features\/password-management-software\" target=\"_blank\" rel=\"noopener noreferrer\">password manager<\/a>\u00a0can help you keep track of your passwords, ensure they are strong, and enforce password updates when necessary. This helps prevent your remote access capabilities and other functions from being hacked by cybercriminals.<\/p>\n<p>If you are using a remote access tool that requires a password, then a password manager can generate and store arbitrary passwords that are difficult for cybercriminals to guess. This will help ensure your client credentials are protected and your remote access remains safe.<\/p>\n<p><strong>4. Take advantage of analytics tools<\/strong><\/p>\n<p>Analytics tools can be extremely helpful for remote access operations. They can, for example, assist in meeting high availability requirements by facilitating early detection. They can also give insight into user and application patterns, which may inform privileged user and account profiles or help create a baseline for typical behavior. If abnormal activity is identified by your analytics tool, you should receive an alert. This will allow you to respond rapidly to in-progress attacks for prevention or mitigation purposes.<\/p>\n<p><strong>5. Enable two-factor authentication<\/strong><\/p>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/two-factor-authentication\" target=\"_blank\" rel=\"noopener\">Two-factor authentication (2FA)<\/a>\u00a0involves requiring users to authenticate themselves in at least two ways. For example, this might include inputting a password and then receiving a one-time code via SMS, which confirms they are in possession of the phone and helps verify their identity. This reduces the chances of someone successfully breaking into a system by simply hacking a single password.<\/p>\n<p><strong>6. Practice automatic clipboard deletion\u00a0<\/strong><\/p>\n<p>When you use the copy-and-paste feature on a computer, the information you copy gets stored on a \u201cclipboard,\u201d and then is retrieved when you identify where the information should be pasted. Deleting data stored in clipboards after a remote support session is of crucial importance, because it keeps those sensitive details from being accessed by unauthorized individuals. Some remote access tools feature automatic clipboard deletion, which is a useful feature when copying sensitive information.<\/p>\n<p><strong>7. Ensure information is properly encrypted<\/strong><\/p>\n<p>To safeguard security, all connections and data transmissions should be fully encrypted.\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/aes-256-encryption-algorithm\">Advanced Encryption Standards (AES) 256 data encryption<\/a>\u00a0is preferable, and can help ensure that data is protected both in transit and at rest.<\/p>\n<p><strong>8. Implement idle sessions timeout control<\/strong><\/p>\n<p>If a customer or technician forgets to sign out of a remote support session, this can become a vulnerability and put your customers at risk. Establishing idle sessions timeout controls can mitigate this risk by automatically signing a user out of an account if no activity has been detected for a certain period of time. Certain remote access tools, like\u00a0<a href=\"\/products\/take-control?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u00ae<\/sup>\u00a0Take Control<\/a>, provide this feature for added security.<\/p>\n<p><strong>9. Practice machine locking<\/strong><\/p>\n<p>Locking machines after each session can help both clients and technicians rest assured the device won\u2019t be easily accessible to unauthorized individuals.<\/p>\n<p><strong>10. Deploy an effective\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/use-cases\/remote-desktop-it-support\">remote desktop access tool<\/a><\/strong><\/p>\n<p>One of the most effective ways to boost your remote access security (and automatically practice most, if not all, of the aforementioned security tips in the process) is to employ a trusted remote access product. Many remote access tools will take the appropriate enhanced security measures for you, giving you less to worry about in terms of keeping your data and your clients\u2019 data safe.<\/p>\n<h3><b>Choosing the right remote access security software<\/b><\/h3>\n<p>If you\u2019re looking for remote support software that makes security a priority, look no further than Take Control. This software was designed specifically for MSPs to ensure your technicians can hit the ground running and is highly versatile and customizable to your organization\u2019s needs.<\/p>\n<p>With the\u00a0<a class=\"ext\" href=\"https:\/\/cryptobook.nakov.com\/asymmetric-key-ciphers\/ecdh-key-exchange\" target=\"_blank\" rel=\"noopener noreferrer\">Elliptic-curve Diffie\u2013Hellman key agreement scheme<\/a>, Take Control helps you secure shared secrets between two endpoints. It does this even before a support session has been established, which helps ensure remote sessions are safe. To support a variety of industry-specific compliance requirements, Take Control was developed with a software development life cycle, which includes data privacy by design and default principles.<\/p>\n<p>To let you focus on providing the best service possible to your customers, Take Control comes with security built-in from the ground up. To help secure data transmissions, Take Control uses Advanced Encryption Standards (AES) 256 data encryption, which is designed to secure data while it is at rest and in transit. The tool also uses multilayer authentication to reduce your susceptibility to a cyberattack. This authentication process is established via technician access permission settings and 2FA, which requires a password as well as a tokenized TOTP protocol implementation.<\/p>\n<p>Finally, the software also safeguards individual sessions by ensuring sessions can only be initiated by technicians with the appropriate permissions. A lock-out option can lock the machine as soon as a session is completed, and idle timeout controls can be enabled to prevent hackers from hijacking or stealing a session. Once a session is finished, automatic clipboard deletion allows you to rest assured that all sensitive data\u2014like user credentials\u2014is wiped clean.<\/p>\n<p>Although sophisticated and comprehensive, Take Control is intuitive and easy to use. Its scalability also makes it suitable for small-scale and large-scale organizations alike.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\">To learn more, access a 90-day free trial here<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5343","post","type-post","status-publish","format-standard","hentry","topic-remote-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Tips to Help Ensure Remote Access Security at Your Organization - N-able<\/title>\n<meta name=\"description\" content=\"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Tips to Help Ensure Remote Access Security at Your Organization - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-06T20:08:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T14:37:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"10 Tips to Help Ensure Remote Access Security at Your Organization\",\"datePublished\":\"2020-05-06T21:08:47+01:00\",\"dateModified\":\"2021-07-09T14:37:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\"},\"wordCount\":1594,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Remote Management\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\",\"name\":\"10 Tips to Help Ensure Remote Access Security at Your Organization - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-05-06T21:08:47+01:00\",\"dateModified\":\"2021-07-09T14:37:40+00:00\",\"description\":\"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Remote Management\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/remote-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Tips to Help Ensure Remote Access Security at Your Organization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Tips to Help Ensure Remote Access Security at Your Organization - N-able","description":"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security","og_locale":"es_ES","og_type":"article","og_title":"10 Tips to Help Ensure Remote Access Security at Your Organization - N-able","og_description":"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.","og_url":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-06T20:08:47+00:00","article_modified_time":"2021-07-09T14:37:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"10 Tips to Help Ensure Remote Access Security at Your Organization","datePublished":"2020-05-06T21:08:47+01:00","dateModified":"2021-07-09T14:37:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security"},"wordCount":1594,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Remote Management"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security","url":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security","name":"10 Tips to Help Ensure Remote Access Security at Your Organization - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-05-06T21:08:47+01:00","dateModified":"2021-07-09T14:37:40+00:00","description":"Read about the importance of remote access security and discover tips that can help you support customers remotely without compromising security.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/10-tips-to-ensure-remote-access-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Remote Management","item":"https:\/\/www.n-able.com\/es\/blog\/category\/remote-management"},{"@type":"ListItem","position":2,"name":"10 Tips to Help Ensure Remote Access Security at Your Organization"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5343"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5343\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}