{"id":75442,"date":"2025-10-20T11:58:38","date_gmt":"2025-10-20T10:58:38","guid":{"rendered":"https:\/\/www.n-able.com\/?p=75442"},"modified":"2025-10-23T12:03:27","modified_gmt":"2025-10-23T11:03:27","slug":"proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","title":{"rendered":"Proactive vs Reactive Cybersecurity: How MSPs Can Build a Resilience-First Security Offering"},"content":{"rendered":"<p><span>Imagine the scenario. It\u2019s Monday morning. A client\u2019s systems grind to a halt. Phones ring, employees are locked out, and operations freeze. A ransomware attack has slipped through over the weekend.<\/span><\/p>\n<p><span>As the MSP, you\u2019re called in urgently. You restore backups, investigate the breach, and reassure the client. While this is common for MSPs, by this time the damage is done\u2014lost revenue, legal consultations, reputational harm, and shaken trust. This sort of reactive approach to cybersecurity is no longer sufficient and has hidden costs such as: <\/span><\/p>\n<ul>\n<li><strong><span>Extended downtime<\/span><\/strong><span>\u00a0and operational disruption.<\/span><\/li>\n<li><strong><span>Loss of client trust<\/span><\/strong><span>\u00a0due to perceived lack of preparedness.<\/span><\/li>\n<li><strong><span>Higher recovery expenses<\/span><\/strong><span>, including legal and PR costs.<\/span><\/li>\n<li><strong><span>Missed strategic opportunities<\/span><\/strong><span>, as MSPs are viewed as tactical responders rather than strategic partners.<\/span><\/li>\n<\/ul>\n<p><span>With cyber threats becoming more sophisticated, downtime more costly, and clients expecting more than damage control, the future of cybersecurity lies in a\u00a0<strong>resilience-first mindset<\/strong>\u2014one that anticipates threats, minimizes impact, and builds long-term trust.<\/span><\/p>\n<p><span>MSPs who invest in monitoring, testing, and planning can help their clients stay ahead of threats, turning potential disasters into manageable events. In the long run, being reactive isn\u2019t just costly\u2014it\u2019s unsustainable.<\/span><\/p>\n<h2><strong><span>What \u201cResilience-First\u201d Means for SMB Clients<\/span><\/strong><\/h2>\n<p><span>Resilience-first security is a strategic approach that focuses on continuity and recovery\u2014not just prevention. For small and medium-sized businesses (SMBs), which often lack dedicated security teams, this model is essential.<\/span><\/p>\n<p><span>Rather than relying solely on perimeter defenses, resilience-first security emphasizes preparedness, adaptability, and operational continuity. It enables SMBs to manage risk proactively and maintain trust with customers and stakeholders\u2014even during disruptions.<\/span><\/p>\n<p><span>Key benefits for SMBs include:<\/span><\/p>\n<ul>\n<li><strong><span>Business continuity<\/span><\/strong><span>\u00a0during cyber incidents.<\/span><\/li>\n<li><strong><span>Faster recovery times<\/span><\/strong><span>\u00a0and reduced operational impact.<\/span><\/li>\n<li><strong><span>Improved compliance posture<\/span><\/strong><span>\u00a0for audits and regulations.<\/span><\/li>\n<li><strong><span>Greater confidence<\/span><\/strong><span>\u00a0in their MSP\u2019s ability to protect assets.<\/span><\/li>\n<\/ul>\n<p><span>By embedding resilience into their offerings, MSPs help clients shift from reactive, fear-driven decisions to proactive risk management.<\/span><\/p>\n<h2><strong><span>Core Components of a Resilience-Oriented Offering<\/span><\/strong><\/h2>\n<p><span>Building a resilience-first model requires more than deploying tools\u2014it demands a strategic shift in how MSPs deliver and communicate value. Leading MSPs integrate the following components:<\/span><\/p>\n<ol>\n<li><strong><span>24\/7 Monitoring and Alerting<\/span><\/strong><span><br \/>\nReal-time monitoring across endpoints, networks, and cloud environments enables early threat detection and rapid response.<\/span><\/li>\n<li><strong><span>Threat Intelligence Integration<\/span><\/strong><span><br \/>\nLeveraging global and industry-specific feeds helps MSPs anticipate emerging threats and inform response strategies.<\/span><\/li>\n<li><strong><span>Incident Response Planning and Tabletop Exercises<\/span><\/strong><span><br \/>\nDocumented playbooks and regular simulations ensure teams know their roles and can act decisively during incidents.<\/span><\/li>\n<li><strong><span>Regular Backup and Recovery Testing<\/span><\/strong><span><br \/>\nAutomated backups and routine recovery tests ensure data integrity and minimize downtime during restoration.<\/span><\/li>\n<li><strong><span>Communication and Reporting Readiness<\/span><\/strong><span><br \/>\nClear protocols for internal and external communication\u2014including breach notifications and post-incident reports\u2014build trust and accountability.<\/span><\/li>\n<\/ol>\n<p><span>Together, these components create a security posture that is proactive, layered, and resilient.<\/span><\/p>\n<h2><strong><span>Pricing and Positioning: From Overhead to Business Enabler<\/span><\/strong><\/h2>\n<p><span>One of the biggest challenges MSPs face is convincing clients that proactive security is <a href=\"https:\/\/www.n-able.com\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\">\u00a0<\/a>. Many still view cybersecurity as a necessary expense rather than a strategic asset.<\/span><\/p>\n<p><span>To shift this perception, MSPs should:<\/span><\/p>\n<ul>\n<li><strong><span>Bundle resilience features<\/span><\/strong><span>\u00a0into premium service tiers focused on business continuity and risk reduction.<\/span><\/li>\n<li><strong><span>Adopt outcome-based pricing<\/span><\/strong><span>, such as guaranteed recovery times or uptime SLAs, to align with client goals.<\/span><\/li>\n<li><strong><span>Highlight ROI<\/span><\/strong><span>\u00a0by comparing proactive service costs with potential losses from downtime or breaches.<\/span><\/li>\n<li><strong><span>Educate clients<\/span><\/strong><span>\u00a0on the evolving threat landscape and the limitations of reactive models.<\/span><\/li>\n<\/ul>\n<p><span>By framing resilience as a business enabler, MSPs elevate their role from vendor to strategic advisor.<\/span><\/p>\n<h2><strong><span>Demonstrating Value: Metrics and Reporting<\/span><\/strong><\/h2>\n<p><span>Clients may not see the behind-the-scenes work MSPs do\u2014unless it\u2019s clearly communicated. Demonstrating value is essential to maintaining trust and justifying investment.<\/span><\/p>\n<p><span>MSPs can reinforce the benefits of resilience-first services by:<\/span><\/p>\n<ul>\n<li><strong><span>Reporting meaningful metrics<\/span><\/strong><span>: threats detected, response times, and downtime avoided.<\/span><\/li>\n<li><strong><span>Supporting audit readiness<\/span><\/strong><span>: maintaining organized logs, compliance checklists, and incident documentation.<\/span><\/li>\n<li><strong><span>Sharing anonymized case studies<\/span><\/strong><span>: showcasing successful threat mitigation or rapid recovery to illustrate impact.<\/span><\/li>\n<\/ul>\n<p><span>This approach turns technical performance into business outcomes, strengthening client relationships and reinforcing strategic value.<\/span><\/p>\n<h2><strong><span>Becoming a Resilience Architect<\/span><\/strong><\/h2>\n<p><span>Transitioning from reactive to proactive security requires more than new tools\u2014it demands a mindset shift. MSPs must evolve into\u00a0<strong>resilience architects<\/strong>\u00a0who design, implement, and maintain robust security frameworks.<\/span><\/p>\n<p><span>To embrace this role, MSPs should:<\/span><\/p>\n<ul>\n<li><strong><span>Invest in staff training<\/span><\/strong><span>\u00a0for proactive defense and incident response.<\/span><\/li>\n<li><strong><span>Collaborate with clients<\/span><\/strong><span>\u00a0to align security goals with business objectives.<\/span><\/li>\n<li><strong><span>Continuously refine offerings<\/span><\/strong><span>\u00a0based on threat trends and client feedback.<\/span><\/li>\n<\/ul>\n<p><span>By doing so, MSPs can become indispensable partners in their clients\u2019 growth and stability.<\/span><\/p>\n<h2><strong>Resilience Starts with Proactive Security<\/strong><\/h2>\n<p><span>Reactive cybersecurity is no longer sufficient in today\u2019s fast-changing threat landscape. As cyber risks become more sophisticated and the stakes for clients continue to rise, managed service providers (MSPs) must champion a resilience-first approach. By embedding proactive strategies and designing security frameworks that anticipate and mitigate risks before they escalate, MSPs can deliver true business resilience\u2014not just rapid recovery, but ongoing protection and operational continuity. <\/span><\/p>\n<p><span>Positioning security services as strategic assets, and demonstrating measurable business value, transforms the MSP\u2019s role from a mere problem solver to a trusted architect of long-term stability, growth, and confidence. Ultimately, embracing business resilience means helping clients not only recover from disruptions but also avoid them, ensuring their operations remain strong and secure in the face of evolving threats.<\/span><\/p>\n<p><em>Emma Nistor is Senior Product Marketing Manager at N\u2011able<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-75442","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering<\/title>\n<meta name=\"description\" content=\"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering\" \/>\n<meta property=\"og:description\" content=\"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-20T10:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T11:03:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/10\/100925_BB_MSPs-Resilience_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emma Nistor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Nistor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\"},\"author\":{\"name\":\"Emma Nistor\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\"},\"headline\":\"Proactive vs Reactive Cybersecurity: How MSPs Can Build a Resilience-First Security Offering\",\"datePublished\":\"2025-10-20T11:58:38+01:00\",\"dateModified\":\"2025-10-23T11:03:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\"},\"wordCount\":901,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\",\"name\":\"Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2025-10-20T11:58:38+01:00\",\"dateModified\":\"2025-10-23T11:03:27+00:00\",\"description\":\"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\",\"name\":\"Emma Nistor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"caption\":\"Emma Nistor\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering","description":"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","og_locale":"es_ES","og_type":"article","og_title":"Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering","og_description":"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.","og_url":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-10-20T10:58:38+00:00","article_modified_time":"2025-10-23T11:03:27+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/10\/100925_BB_MSPs-Resilience_1200x628.jpg","type":"image\/jpeg"}],"author":"Emma Nistor","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Emma Nistor","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering"},"author":{"name":"Emma Nistor","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58"},"headline":"Proactive vs Reactive Cybersecurity: How MSPs Can Build a Resilience-First Security Offering","datePublished":"2025-10-20T11:58:38+01:00","dateModified":"2025-10-23T11:03:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering"},"wordCount":901,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","url":"https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering","name":"Proactive vs Reactive Cybersecurity: Build a Resilience-First MSP Offering","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2025-10-20T11:58:38+01:00","dateModified":"2025-10-23T11:03:27+00:00","description":"Discover how MSPs can shift from reactive to proactive cybersecurity, building resilience-first strategies to protect SMB clients from modern cyber threats.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/proactive-vs-reactive-cybersecurity-how-msps-can-build-a-resilience-first-security-offering"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58","name":"Emma Nistor","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","caption":"Emma Nistor"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/75442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=75442"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/75442\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=75442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}