{"id":6221,"date":"2020-09-17T18:42:13","date_gmt":"2020-09-17T17:42:13","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6221"},"modified":"2021-07-13T13:21:35","modified_gmt":"2021-07-13T12:21:35","slug":"backup-monitoring-part-6-securing-your-backup-devices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices","title":{"rendered":"Backup Monitoring: Part 6\u2014Securing Your Backup Devices"},"content":{"rendered":"<p>In prior posts, as well as during my monthly office hours and quarterly boot camp sessions, I have touched on a number of security topics as they relate to SolarWinds<sup>\u00ae<\/sup>\u00a0Backup. This always seems to draw a lot of questions, so I felt it appropriate to expand on those topics a bit more in a dedicated blog post, and provide some additional guidance and resources for those who want more information.<\/p>\n<h2 class=\"h3\">Controlling Platform Access<\/h2>\n<p>One method of securing backups is to restrict access to the backup platform. Now depending on the platform used to deploy and monitor SolarWinds Backup, you\u2019ll have different options, but they all share common ground. Your first step is to use the\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/users.htm\" target=\"_blank\" rel=\"noopener noreferrer\">role-based security<\/a>\u00a0features of the platform to give access to only those who need it\u2014this way the number of individuals who can add, remove, modify, or perform recovery from backup becomes a known, manageable quantity.\u00a0 Remember, not everyone needs to be granted administrator- or super user-level access to do their daily job, and nothing is wrong with having a second login to access critical functions.<\/p>\n<p>If you haven\u2019t done so already, fully enable the two-factor authentication (<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/sso_migration.htm?Highlight=2fa\" target=\"_blank\" rel=\"noopener noreferrer\">2FA<\/a>) features of the platform. Please, don\u2019t hold off another day on this as it is one of the biggest obstacles to an individual trying to gain unauthorized access to your platform. Now while you\u2019re at it, let\u2019s address the topic of password reuse. It is a bad idea; you already know this, so please just stop. Your passwords for your accounts should not be intermingled with passwords for your clients. You should not have used or currently be using their passwords to access their network or systems. Demand your own credentials wherever possible so that during a security audit you can distinguish exactly who did what and when.<\/p>\n<p>Finally, invest in a password manager application you can use for your personal life and keep it separate from the application or instance that you use for managing passwords for your clients. Then, get your clients to do the same thing, because it only takes one leaked or compromised password for the bad guys to get access.<\/p>\n<h2 class=\"h3\">Controlling Client Access<\/h2>\n<p>You might think that having direct or remote access to the local server or workstation would allow someone to accidentally or maliciously damage the backup and the backup history, but it doesn\u2019t have to be this way. SolarWinds has taken several steps to control or prevent unauthorized access at the local backup client. One of the first few things a virus or ransomware will try to do is remove or damage your ability to recover from the infection. They do this in numerous ways, either by deleting snapshots, corrupting or encrypting backup files, uninstalling applications, etc. before they go about damaging or encrypting your data and volumes.<\/p>\n<p>Since SolarWinds Backup is a \u201ccloud-first\u201d backup solution, damage to data on the local system has little to no impact on the already completed backups that are stored securely in our regional datacenters. i.e. the \u201cSolarWinds Cloud.\u201d The act of uninstalling the backup software does not result in the removal of any of the historic cloud backups and even a\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-installation\/get-passphrase.htm?Highlight=clean\" target=\"_blank\" rel=\"noopener noreferrer\">force cleaning<\/a>\u00a0of backups under retention cannot be achieved without first supplying the individual device\u2019s private\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-installation\/ui-installer.htm\" target=\"_blank\" rel=\"noopener noreferrer\">encryption key<\/a>\u00a0or\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-installation\/get-passphrase.htm?Highlight=passphrase\" target=\"_blank\" rel=\"noopener noreferrer\">passphrase<\/a>.<\/p>\n<p>Short of uninstalling the backup software, which could easily be reinstalled, the worst that a bad actor might be able to do is adjust your backup selections, modify exclusion filters, remove a backup schedule, adjust a setting, or trigger a restore. All of this can easily be blocked by\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/remote-commands.htm?Highlight=Set%20GUI%20password\" target=\"_blank\" rel=\"noopener noreferrer\">setting a local GUI password<\/a>\u00a0or locked down granularly through the use of\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/profiles.htm?Highlight=backup%20profiles\" target=\"_blank\" rel=\"noopener noreferrer\">backup profiles<\/a>.<\/p>\n<h2 class=\"h3\">Data Security<\/h2>\n<p>Security isn\u2019t just about access, however; it is also about how data is secured and where data is secured. So to expand on that topic let us start with the fact that all backup data, whether in motion or at rest, is first deduped, compressed, and then encrypted on the local client using an AES-256 bit encryption algorithm before being sent to local disk or over SSL port 443 through a TLS version 1.2 tunnel to the SolarWinds Cloud. The process is reversed during restore, with encrypted data being retrieved from the SolarWinds Cloud over an SSL connection and then being decrypted by a local device possessing a valid encryption key or passphrase.<\/p>\n<p>At the time of publication, SolarWinds maintains 30+ data centers across 17 countries and four continents. Our data center facilities maintain numerous certifications, such as ISO 27001, ISO 9001, and other certifications depending on your chosen region. The specific certifications for each data center can be found in our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/solarwinds-backup-understanding-data-center-security\" target=\"_blank\" rel=\"noopener\">Data Center Security document<\/a>, which also includes information on choosing storage locations and physical security measures at the data centers.<\/p>\n<h2 class=\"h3\">Data Retention<\/h2>\n<p>Data retention is a component of security; it ensures that you have multiple restore points in place from which to recover lost or damaged data. All editions of SolarWinds Backup default to a standard, rolling 28-day calendar retention model than can be expanded, using optional archiving rules to retain monthly or quarterly recovery points. In addition, the N&#8209;central integrated version of SolarWinds Backup also supports 60- and 90-day\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/devices.htm?Highlight=edit%20product\" target=\"_blank\" rel=\"noopener noreferrer\">product<\/a>\u00a0retention options, while the standalone version of SolarWinds Backup offers custom, user-defined retention models.<\/p>\n<h2 class=\"h3\">Backup Frequency<\/h2>\n<p>Since you can only recover data that you have protected, another way to secure customer data is by reducing the time between backups. This can be achieved by shrinking the Recovery Point Objective (RPO) and running multiple backups throughout the day using our\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-guide\/backup-accelerator.htm?Highlight=backup%20accelerator\" target=\"_blank\" rel=\"noopener noreferrer\">Backup Accelerator<\/a>\u00a0technology, which tracks file changes between backups. This combined with\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/profiles.htm?Highlight=profile%20schedule\" target=\"_blank\" rel=\"noopener noreferrer\">backup profiles<\/a>\u00a0that allow for high frequency backup scheduling allows multiple daily backups to occur with minimal impact to the production system.<\/p>\n<h2 class=\"h3\">Redundancy<\/h2>\n<p>Backup redundancy can be achieved using an optional\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-guide\/localspeedvault.htm?Highlight=lsv\" target=\"_blank\" rel=\"noopener noreferrer\">LocalSpeedVault<\/a>\u00a0(LSV). The LSV acts as a local backup and restore cache of your protected data and can point to just about any local disk source. The LSV, when direct configured on a direct attached volume, can be at risk of volume-level encryption or deletion, just like any other volume, so we recommend using a central NAS that is not on the domain, that uses workgroup level security, and is not used for any other purpose, with no user shares or mapped drives. The only access to the LSV should be the account the Backup manager uses to access the data.<\/p>\n<p>Special efforts have been taken to help ensure the backup client will not upload corrupted or damaged data from an LSV if the data managed to be corrupted or damaged before it could be synchronized up to the cloud. Additionally, if the LSV remains offline in a failure state for 14 days (default) with unsynchronized data, we will take action to disable the vault and\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/remote-commands.htm?Highlight=LocalSpeedVault%20remote%20commands\" target=\"_blank\" rel=\"noopener noreferrer\">self-heal<\/a>\u00a0the cloud copy from the local device as best as possible.<\/p>\n<h2 class=\"h3\">Unauthorized Access or Accidental Deletion<\/h2>\n<p>Contact support immediately if you suspect unauthorized access or changes have been made to your backup platform. This includes missing or deleted devices, whether accidental or malicious. The team should be able to assist you in reviewing those changes and\/or attempting to undelete devices.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Eric Harless is the Head Backup Nerd at SolarWinds MSP. Eric has worked with SolarWinds Backup since 2013 and has over 25+ years of data protection industry experience in sales, support, marketing, systems engineering, and product management.<\/em><\/p>\n<p><em>You can follow Eric on Twitter\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/backup_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@backup_nerd<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Other blogs in this series<\/b><\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-1-manage-exception\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Backup Monitoring: Part 1\u2014Manage by Exception<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-2-defining-success\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Backup Monitoring: Part 2\u2014Defining Success<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-3-triaging-your-devices\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Backup Monitoring: Part 3\u2014Triaging Your Devices<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Backup Monitoring, Part 4\u2014Tracking and Controlling Usage<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-5-tuning-your-backup-selections\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Backup Monitoring: Part 5\u2014Tuning Your Backup Selections<\/span><\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Learn more about security with SolarWinds Backup and find additional guidance and resources.<\/p>\n","protected":false},"author":45,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6221","post","type-post","status-publish","format-standard","hentry","topic-backup-disaster-recovery","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Backup Monitoring\u2014Secure Your Backup Devices - N-able<\/title>\n<meta name=\"description\" content=\"Learn more about security with SolarWinds Backup and find additional guidance and resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Monitoring\u2014Secure Your Backup Devices - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn more about security with SolarWinds Backup and find additional guidance and resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T17:42:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T12:21:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Harless\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Harless\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\"},\"author\":{\"name\":\"Eric Harless\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/17837915039282731e00c56fd2b18ff2\"},\"headline\":\"Backup Monitoring: Part 6\u2014Securing Your Backup Devices\",\"datePublished\":\"2020-09-17T18:42:13+01:00\",\"dateModified\":\"2021-07-13T12:21:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\"},\"wordCount\":1288,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Backup &amp; Disaster Recovery\",\"Head Nerds\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\",\"name\":\"Backup Monitoring\u2014Secure Your Backup Devices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-09-17T18:42:13+01:00\",\"dateModified\":\"2021-07-13T12:21:35+00:00\",\"description\":\"Learn more about security with SolarWinds Backup and find additional guidance and resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Backup &amp; Disaster Recovery\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/backup-disaster-recovery\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Monitoring: Part 6\u2014Securing Your Backup Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/17837915039282731e00c56fd2b18ff2\",\"name\":\"Eric Harless\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"caption\":\"Eric Harless\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Backup Monitoring\u2014Secure Your Backup Devices - N-able","description":"Learn more about security with SolarWinds Backup and find additional guidance and resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices","og_locale":"es_ES","og_type":"article","og_title":"Backup Monitoring\u2014Secure Your Backup Devices - N-able","og_description":"Learn more about security with SolarWinds Backup and find additional guidance and resources.","og_url":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-09-17T17:42:13+00:00","article_modified_time":"2021-07-13T12:21:35+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Eric Harless","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Eric Harless","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices"},"author":{"name":"Eric Harless","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/17837915039282731e00c56fd2b18ff2"},"headline":"Backup Monitoring: Part 6\u2014Securing Your Backup Devices","datePublished":"2020-09-17T18:42:13+01:00","dateModified":"2021-07-13T12:21:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices"},"wordCount":1288,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Backup &amp; Disaster Recovery","Head Nerds"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices","url":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices","name":"Backup Monitoring\u2014Secure Your Backup Devices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-09-17T18:42:13+01:00","dateModified":"2021-07-13T12:21:35+00:00","description":"Learn more about security with SolarWinds Backup and find additional guidance and resources.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/backup-monitoring-part-6-securing-your-backup-devices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Backup &amp; Disaster Recovery","item":"https:\/\/www.n-able.com\/es\/blog\/category\/backup-disaster-recovery"},{"@type":"ListItem","position":2,"name":"Backup Monitoring: Part 6\u2014Securing Your Backup Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/17837915039282731e00c56fd2b18ff2","name":"Eric Harless","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","caption":"Eric Harless"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=6221"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6221\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=6221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}