{"id":6001,"date":"2019-12-19T20:55:40","date_gmt":"2019-12-19T20:55:40","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6001"},"modified":"2021-07-09T15:40:07","modified_gmt":"2021-07-09T14:40:07","slug":"how-to-prevent-ransomware","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware","title":{"rendered":"How Do You Prevent Ransomware?"},"content":{"rendered":"<p>Ransomware is no joke. This highly invasive cybersecurity threat has grown exponentially and is now considered one of the most dangerous and prevalent internet-based attacks. A recent report from Cybersecurity Ventures predicts that by the end of 2019, there will be a ransomware attack on businesses every 14 seconds, resulting in upwards of\u00a0<a class=\"ext\" href=\"https:\/\/cybersecurityventures.com\/ransomware-damage-report-2017-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">$11.5 billion in losses<\/a>.<\/p>\n<p>This article will help you understand exactly what ransomware is, and how managed services providers (MSPs) help protect their customers\u2014and themselves\u2014against it.<\/p>\n<h3><b>What happens in a ransomware attack?<\/b><\/h3>\n<p>Ransomware can take many forms, but there are two common types\u2014crypto and locker.\u00a0 During a crypto ransomware attack, malicious software known as ransomware infects the computers of large corporations, small businesses, and individuals alike\u2014encrypting files and preventing users from accessing critical data until a ransom is paid.<\/p>\n<p>Ransomware is usually delivered via emails which include links to rogue internet downloads, corrupted websites, or infected attachments (such as PDFs). While these may appear innocent to the untrained eye, one wrong click can lead users to unknowingly download hostile software. Once it enters your systems, ransomware can spread quickly across a network\u2014especially one that isn\u2019t protected properly or has unpatched or outdated software.<\/p>\n<p>Like crypto ransomware, an attacker conducting a locker ransomware attack gains access to the end user\u2019s network through some form of scam. They may pretend to be a trusted security agency ready to conduct a must-have PC repair or an official governing body with an urgent message to share. But once these attackers gain entrance, they immediately seize control and lock the end user out of their device. No encryption takes place, but users are simply unable to continue their daily tasks unless they pay the requested ransom.<\/p>\n<h3><b>Why is ransomware protection so important?<\/b><\/h3>\n<p><a class=\"ext\" href=\"\/features\/ransomware-protection-software\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware protection software\u00a0<\/a>and security best practices that help create roadblocks that can prevent malware from entering your system. Without ransomware protection processes in place, companies run the risk of:<\/p>\n<ul>\n<li><b>Losing critical business data:\u00a0<\/b>Businesses suffering a ransomware attack are in jeopardy of losing personal employee data, highly sensitive client records, detailed financial information, and more. Whatever form of data exists in your system, there\u2019s a good chance a ransomware attack can rob you of it.<\/li>\n<li><b>Compromising their reputation:\u00a0<\/b>MSPs and other customer-facing companies have a lot at stake when it comes to ransomware attacks. News of a major breach spreads like wildfire\u2014putting a company\u2019s reputation on the line. Most people want to work with a business that has lost or exposed highly sensitive data to hackers. For this reason alone, ransomware protection is a must for any organization that deals with customers on a regular basis.<\/li>\n<li><b>Bringing productivity to a standstill:\u00a0<\/b>Ransomware attacks can bring business to a standstill as employees lose access to the systems and applications they need to perform their daily tasks.\u00a0<a class=\"ext\" href=\"https:\/\/www.businesswire.com\/news\/home\/20160803005545\/en\/In-ternational-Study-Finds-40-Percent-Enterprises-Hit\" target=\"_blank\" rel=\"noopener noreferrer\">Approximately 63% of attacks need more than a business day to fix<\/a>, with many requiring much longer. It takes some companies weeks to regain their footing and get employees back online. As productivity stalls, so does business performance, making for unhappy employees, customers, and leaders alike.<\/li>\n<li><b>Suffering financial losses:\u00a0<\/b>The average\u00a0cost per ransomware attack varies\u00a0greatly depending on the size of the organization. While small- to medium-sized businesses typically see ransomware demands in the high hundreds and low thousands of dollars, larger companies can face ransom fees upwards of $30,000 and more. But financial losses tied to ransomware attacks aren\u2019t limited to the ransom demands themselves. Repairing workstations and servers damaged by malware also comes with a hefty price tag. It\u2019s a tough pill to swallow, but companies often don\u2019t have a choice except to pay a high price to get their systems up and running again. The longer the downtime due to ransomware, the more dollars lost. As employees are forced to put work on hold, productivity and profits plummet.<\/li>\n<\/ul>\n<h3><b>How to help prevent ransomware<\/b><\/h3>\n<p>When it comes to how to help protect against ransomware, there are\u00a0several best practices every MSP should encourage their customers and employees to adhere to. Many of these ransomware prevention best practices are simple to implement and have low (if any) costs associated with them. But don\u2019t be fooled by their simplicity\u2014these straightforward steps pack a powerful punch when it comes to keeping ransomware attackers at bay. If you\u2019re ready to learn how to help prevent ransomware from stealing your data, here\u2019s what you need to know:<\/p>\n<ul>\n<li><b>Don\u2019t stay vulnerable:<\/b>\u00a0According to Ponemon\u2019s recent State of Vulnerability Response report,\u00a0<a class=\"ext\" href=\"https:\/\/www.servicenow.com\/content\/dam\/servicenow-assets\/public\/en-us\/doc-type\/resource-center\/analyst-report\/ponemon-state-of-vulnerability-response.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">59% of mid-market and enterprise organizations have vulnerability management programs<\/a>\u00a0that are still in the early or middle stages. These young programs lead to gaps that put companies at risk of experiencing a ransomware attack. MSPs must coach their customers on the importance of putting vulnerability management processes and protocols in place.<\/li>\n<li><b>Put patches in place:<\/b>\u00a0Patches serve as digital band aids, repairing vulnerabilities that expose your system to cyber attackers.\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/patch-manager\" target=\"_blank\" rel=\"noopener noreferrer\">Patch management<\/a>\u00a0is a widely known\u2014yet often overlooked\u2014practice within the IT industry. Make it a priority to remain up-to-date on all relevant patches to help increase your systems\u2019 are safe .<\/li>\n<li><b>Look before you click:\u00a0<\/b>In certain cases, a ransomware attack can be spotted by hovering your mouse over links embedded within the body of the email. If a link address appears strange or questionable, don\u2019t click it\u2014that\u2019s a red flag you have an attacker on your hands. By clicking on questionable links, you\u2019re potentially inviting ransomware to enter your system.<\/li>\n<li><b>Keep an eye out for misspellings:<\/b>\u00a0Companies take a lot of time to craft detail-driven emails that feature their brand in a good light. Luckily for users, that makes spotting a cybercriminal a whole lot easier. A poorly-crafted email riddled with misspellings is often a sign of an attacker trying to enter the system. Encourage your customers and employees to pay close attention to every email they receive and report anything suspicious immediately.<\/li>\n<li><b>Beware of the overly urgent email:\u00a0<\/b>Emails with subject lines that scream \u201cACT NOW!\u201d or \u201cYour Computer Is in Danger!\u201d are, often, a form of ransomware. Attackers use a false sense of urgency to scare users into reacting before they take the time to think. These are ploys created by hackers to trick vulnerable users into downloading malware\u2014the very opposite of what they claim to protect against.<\/li>\n<li><b>Leverage antivirus software:<\/b>\u00a0With a robust antivirus solution in hand, MSPs are equipped to keep known and emerging malware off of workstations and servers. These platforms rely on behavioral scanning and sophisticated heuristic checks to detect and block viruses before they enter a businesses\u2019 core systems.<\/li>\n<li><b>Put protection processes in place:<\/b>\u00a0There are several proactive protection processes you can take to keep your customers safe. For starters, set and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/web-protection\">automatically enforce browsing policies<\/a>\u00a0to keep users off known malicious sites so, even if clicked on, it denies the user access. It\u2019s also important to leverage endpoint protection tools that automatically detect and respond to any\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response\">endpoint threats that arise<\/a>.<\/li>\n<li><b>Keep your details personal:<\/b>\u00a0A legitimate company or financial institution will never ask for your personal credentials via email. If a user receives an email requesting this sensitive information, there\u2019s a very big chance it was sent by an attacker masquerading as a respectable source. Never hand over these details. Instead, inform employees and customers to flag and report these emails upon arrival.<\/li>\n<li><b>Rely on a VPN:\u00a0<\/b>Public Wi-Fi exposes your network and data to hackers waiting to pounce. While ransomware is often invited into a system via a simple click or download, it can also gain access to your network via an unsecure internet connection. It\u2019s important to use a trusted Virtual Private Network (VPN) anytime you\u2019re using public Wi-Fi.<\/li>\n<li><b>Keep a backup:\u00a0<\/b>Backup all critical files early and often\u2014and encourage your customers to do the same. Onsite backups connected to your network are vulnerable, which is why it\u2019s best to use an off-site backup whenever possible. A comprehensive backup solution puts multiple recovery methods at your fingertips, helping to ensure you can restore and access business-critical documents if an attacker strikes.<\/li>\n<li><b>Put a firewall in place:<\/b>\u00a0As an MSP, you know having a\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-do-firewalls-work\">firewall<\/a>\u00a0(or even more than one) plays a major part in network security. While firewalls are designed to inhibit a variety of viruses from entering your network, they are especially useful when it comes to keeping ransomware at bay. This is because they delete known spam files before they even enter the inbox. It\u2019s important to communicate this to your customers to help ensure they put all appropriate firewalls in place.<\/li>\n<\/ul>\n<h3><b>Ransomware protection in a nutshell<\/b><\/h3>\n<p>A ransomware attack is a major blow for any organization, regardless of its size. As an MSP, it\u2019s important to know how to protect against ransomware, for your sake\u2014and the sake of your customers. The list above serves as a simple, go-to guide of some of the best ransomware protection tips in the industry today. The cost of implementing the above tips is next to nothing, especially when compared to the potential damage a business will face if a ransomware attack is successful.<\/p>\n<p>Despite your best efforts, hackers are smart, and mistakes can happen. If a ransomware attack does enter your system, you need to know about it\u2014and fast. That\u2019s why having a trusted ransomware protection software in place is key.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor\">SolarWinds<sup>\u00ae<\/sup>\u00a0Threat Monitor<\/a>\u00a0can help you safeguard your customers\u2019 businesses from security threats through robust threat intelligence, real-time log correlation, and in-depth, real-time alarm systems that notify you of anomalies as soon as they occur. Pairing ransomware protection software with prevention techniques gives you the upper hand when it comes to outsmarting even the most intelligent cybercriminal. So what are you waiting for? Start educating your team and customers today.<\/p>\n<p>&nbsp;<\/p>\n<p><b>For more information on ransomware protection software and ransomware prevention techniques, read through our related blog articles.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is no joke. This highly invasive cybersecurity threat has grown exponentially and is now considered one of the most dangerous and prevalent internet-based attacks. A recent report from Cybersecurity&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6001","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Prevent Ransomware and Limit Exposure - N-able<\/title>\n<meta name=\"description\" content=\"Learn about how to prevent ransomware in your environment and what you can do to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Ransomware and Limit Exposure - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about how to prevent ransomware in your environment and what you can do to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-19T20:55:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T14:40:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How Do You Prevent Ransomware?\",\"datePublished\":\"2019-12-19T20:55:40+00:00\",\"dateModified\":\"2021-07-09T14:40:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\"},\"wordCount\":1669,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\",\"name\":\"How to Prevent Ransomware and Limit Exposure - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-12-19T20:55:40+00:00\",\"dateModified\":\"2021-07-09T14:40:07+00:00\",\"description\":\"Learn about how to prevent ransomware in your environment and what you can do to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do You Prevent Ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Prevent Ransomware and Limit Exposure - N-able","description":"Learn about how to prevent ransomware in your environment and what you can do to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware","og_locale":"es_ES","og_type":"article","og_title":"How to Prevent Ransomware and Limit Exposure - N-able","og_description":"Learn about how to prevent ransomware in your environment and what you can do to avoid it.","og_url":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-12-19T20:55:40+00:00","article_modified_time":"2021-07-09T14:40:07+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How Do You Prevent Ransomware?","datePublished":"2019-12-19T20:55:40+00:00","dateModified":"2021-07-09T14:40:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware"},"wordCount":1669,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware","url":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware","name":"How to Prevent Ransomware and Limit Exposure - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-12-19T20:55:40+00:00","dateModified":"2021-07-09T14:40:07+00:00","description":"Learn about how to prevent ransomware in your environment and what you can do to avoid it.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/how-to-prevent-ransomware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How Do You Prevent Ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=6001"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6001\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=6001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}