{"id":5642,"date":"2018-04-10T23:49:31","date_gmt":"2018-04-10T22:49:31","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5642"},"modified":"2021-04-06T23:51:31","modified_gmt":"2021-04-06T22:51:31","slug":"10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","title":{"rendered":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are"},"content":{"rendered":"<p>Having established that you need to shift the conversation from security to risk with your customers (<a href=\"https:\/\/www.n-able.com\/blog\/10-steps-security-changing-conversation-security-risk\" target=\"_blank\" rel=\"noopener\">read my previous blog here<\/a>), the emphasis has to now be on measuring and quantifying that risk. The first step here is to understand the company\u2019s line of business and what exactly the \u201cbad guys\u201d might be after.<\/p>\n<p>Doing this across an entire organization or group is a massive undertaking and can be very hard to quantify, so finding a way to break this into digestible chunks is essential. Here, we can learn a lot from a contact of mine who is a CISO for a large multinational financial institution. In order to manage risk across the entire organization, they work with what they define as their \u201ccrown jewels\u201d\u2014their most important assets.<\/p>\n<p>In this particular scenario, one of the criteria for getting on this list is that if compromised, these assets would lose the company $1 billion or more per day. They isolated 20 of these assets across the organization.<\/p>\n<p>At every board meeting, these crown jewels are on the agenda, and the board discusses whether they are sufficiently protected and if the level of risk they face is appropriate to their impact on the business. The board also regularly discusses the organization\u2019s other assets and reviews whether anything else should be included on the list.<\/p>\n<h3><b>Providing concrete security answers<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\" alt=\"mostvaluable.jpg\" width=\"398\" height=\"197\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>By reducing the question to, \u201ccan we protect these 20 things?\u201d rather than, \u201ccan we protect these 1,000 things?\u201d they have made the question far easier to respond to with concrete answers.<\/p>\n<p>This isn\u2019t saying they are not bothered about protecting anything else in the organization; they naturally have to have robust security to protect all their assets. What they are doing is putting in place a weighted scale of protection, and by defining those assets that potentially have the biggest impact on the company, they are able to quantifiably justify the additional spend required to protect them.<\/p>\n<p>While this is a much more extreme example than the average MSP or security professional is likely to be dealing with on a regular basis (or indeed ever), working with the concept of crown jewels is the basis for providing companies with an actionable security plan.<\/p>\n<h3><b>Defining and protecting your crown jewels<\/b><\/h3>\n<p>So how do you define crown jewels within an organization?<\/p>\n<p>This can be as simple as what the mission of the organization is. For example, with a hospital, the number one priority is always patient care, and everything else goes around that. In this case, the patient becomes the crown jewel, and the patient data is a target that must be protected. As we have seen with the latest ransomware attacks targeting hospitals, it is critical to protect access to patient data, as it is hugely valuable to cybercriminals and very saleable on the dark web. You need to protect these \u201ccrown jewels\u201d better than you protect other things.<\/p>\n<p>One of the big mistakes that security professionals often make is they try to put the same level of security across the whole organization, smattering it across like peanut butter. This is not the right approach. You want to be able to give a higher level of security to your crown jewels. By doing this, you are spending appropriately on what is most important to your company and the most attractive targets for any potential intruders.<\/p>\n<h3><b>Expanding your risk assessment to people\u00a0<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/protectingpeople.jpg\" alt=\"protectingpeople.jpg\" width=\"394\" height=\"195\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>It\u2019s not just about data, it\u2019s also about people. You should have a level of security that also includes crown people; these are the people within your organization that could compromise your business or that have the most impact on your environment. The majority of the time, they have access to the highest value IT assets\u2014your super users and root users. Sometimes it\u2019s the CEO. You need to understand how you protect these people at the same time as protecting systems and data.<\/p>\n<p>In a world where we are constantly striving to make it harder for our cyber-adversaries to achieve their goals, insider threats become very real. We need to be constantly evaluating how we protect crown people, crown apps, and crown systems and put appropriate levels of defences around those things that are the most attractive to adversaries\u2014and can do the most harm to our organizations if compromised.<\/p>\n<p>As an MSP, one of your first conversations needs to be around what your customer\u2019s crown jewels are. This is a very practical conversation, and one that MSPs are in a great position to have. The majority of MSPs have an in-depth understanding of their customers\u2019 businesses, so they can come into it with enough background knowledge to guide their customer to an understanding of what their crown jewels are and what they should be protecting and monitoring on a regular basis. They can help customers see what is an appropriate level of risk for these assets. It\u2019s this that forms the basis of a weighted security plan that has real visibility and benefit for the organization.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>In my next blog, I\u2019ll look at implementing and understanding good cyber-hygiene.\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><em>Tim Brown is VP of Security for SolarWinds MSP. He has over 20 years of experience developing and implementing security technology,\u00a0including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Tim\u2019s experience has made him an in-demand expert on cybersecurity, and has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. Additionally, Tim has been central in driving advancements in identity frameworks, has worked with the US government on security initiatives, and holds 18 patents on security-related topics.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5642","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able<\/title>\n<meta name=\"description\" content=\"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able\" \/>\n<meta property=\"og:description\" content=\"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-10T22:49:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T22:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\" \/>\n<meta name=\"author\" content=\"Tim Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\"},\"author\":{\"name\":\"Tim Brown\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\"},\"headline\":\"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are\",\"datePublished\":\"2018-04-10T23:49:31+01:00\",\"dateModified\":\"2021-04-06T22:51:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\"},\"wordCount\":965,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\",\"name\":\"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\",\"datePublished\":\"2018-04-10T23:49:31+01:00\",\"dateModified\":\"2021-04-06T22:51:31+00:00\",\"description\":\"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\",\"name\":\"Tim Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"caption\":\"Tim Brown\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able","description":"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","og_locale":"es_ES","og_type":"article","og_title":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able","og_description":"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.","og_url":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-04-10T22:49:31+00:00","article_modified_time":"2021-04-06T22:51:31+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg","type":"","width":"","height":""}],"author":"Tim Brown","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Tim Brown","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are"},"author":{"name":"Tim Brown","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8"},"headline":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are","datePublished":"2018-04-10T23:49:31+01:00","dateModified":"2021-04-06T22:51:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are"},"wordCount":965,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg","articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","url":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are","name":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg","datePublished":"2018-04-10T23:49:31+01:00","dateModified":"2021-04-06T22:51:31+00:00","description":"Fully understanding a company\u2019s risk means knowing what its most valuable assets are and what intruders would target. Tim Brown looks at what this means for planning a security strategy.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/mostvaluable.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-cybersecurity-understanding-customer-risk-and-where-their-crown-jewels-are#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"10 Steps to Cybersecurity\u2014Understanding Customer Risk and Where Their \u201cCrown Jewels\u201d Are"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8","name":"Tim Brown","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","caption":"Tim Brown"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5642"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5642\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}