{"id":6302,"date":"2020-10-07T20:30:46","date_gmt":"2020-10-07T19:30:46","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6302"},"modified":"2021-07-09T15:28:17","modified_gmt":"2021-07-09T14:28:17","slug":"average-cost-of-data-breach","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach","title":{"rendered":"The Average Cost of a Data Breach in 2020"},"content":{"rendered":"<p>According to the\u00a0<a class=\"ext\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL\" target=\"_blank\" rel=\"noopener noreferrer\">2019 Cost of Data Breach Report<\/a>\u00a0from Ponemon Institute and IBM Security, the latest statistics available on data breaches show the global average cost of a data breach has increased by 12% in the past five years. While the average cost of a data breach will vary across industries and countries, the general global pattern shows an overall increase in cost. This emphasizes the importance of using sophisticated tools such as managed antivirus (AV) software and vulnerability scanning software to proactively identify threats.<\/p>\n<p>This article will consider figures from a range of sources to demonstrate the potential high cost of a breach and the pressing need for businesses to take measures to improve their overall security posture. Especially for managed services providers (MSPs) tasked with helping keep customers out of harm\u2019s way, a strong effort should be made to avoid data breaches\u2014or face potentially devastating costs. Data protection, data security, and data breach prevention should be a key part of every company\u2019s information security policy, because the impact of a data breach can be severe, long-term, and potentially irreparable.<\/p>\n<h2 class=\"h3\">Types of costs associated with data breaches<\/h2>\n<p>In 2019, the\u00a0<a class=\"ext\" href=\"https:\/\/iacis.org\/iis\/2019\/2_iis_2019_162-171.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">International Association of Computer Investigative Specialists (IACIS)<\/a>\u00a0conducted a study called the \u201cEconomic Costs and Impacts of Business Data Breaches.\u201d It\u2019s a common misconception that the main cost of a data breach is caused by the immediate monetary impact on sales revenue. This IACIS study attempted to rectify this misconception by addressing the wider financial burden threatening targeted organizations. To do so, it identified three types of costs associated with a data breach:<\/p>\n<ul>\n<li>Direct costs<\/li>\n<li>Indirect costs<\/li>\n<li>Hidden costs<\/li>\n<\/ul>\n<p>Rather than simply wreaking havoc via direct costs, it\u2019s the total sum of these costs that can lead to such significant financial disaster in the event of a data breach.<\/p>\n<h3 class=\"h4\">DIRECT COSTS<\/h3>\n<p>Direct costs relate to the data breach detection and notification processes. These direct costs are likely to include the immediate impact on sales revenue, typically resulting in a reduction of income. This, in turn, inevitably affects overall business productivity and operational activities. Another direct cost is the probable drop in share prices. If legal services are required to manage the litigation fallout, companies may also have to pay large sums of money for legal services. Costs are also likely to rise if investigative consultancy firms are required to identify the cause of the breach.<\/p>\n<p>The final direct cost relates to the implementation of a post-breach response. This might involve establishing an emergency call center for impacted customers. A company may also need to spend money on public relations activities, which might include settlement costs and financial reimbursements to affected parties.<\/p>\n<h3 class=\"h4\">INDIRECT COSTS<\/h3>\n<p>Indirect costs are generally attributed to a loss of customer trust, missed business opportunities, and damaged reputation. Profits are likely to decline as customers lose faith in a business and turn to competitors. Another indirect cost is the decreased likelihood of investors purchasing company stock, which will lead to restricted growth and a reduced market share. Companies may even find that talented employees choose to leave their organization as their reputation declines.<\/p>\n<p>Third-party costs account for a major indirect loss and are likely to include increases in business insurance after a costly breach. Cloud service providers may also raise their prices to bolster cybersecurity in the event of a breach, which will also contribute to indirect costs.<\/p>\n<h3 class=\"h4\">HIDDEN COSTS<\/h3>\n<p>The hidden costs of a data breach are very difficult to measure, but their impact can be severe. Some businesses may even feel the hidden costs of a data breach years after the event. For example, hidden costs can include lost business hours as employees divert their efforts to respond to the breach, rather than dedicating their time to revenue opportunities.<\/p>\n<p>Moreover,\u00a0future investments in technology\u00a0will likely increase as the breach impacts the targeted company\u2019s technology strategy. Companies that have experienced a breach are likely to\u00a0spend more on security\u00a0technology moving forward, which might be considered a hidden cost.<\/p>\n<h2 class=\"h3\">The average cost of a data breach: key findings<\/h2>\n<p>The\u00a0<a class=\"ext\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL\" target=\"_blank\" rel=\"noopener noreferrer\">2019 Cost of Data Breach Report<\/a>\u00a0from Ponemon Institute and IBM Security is widely regarded as a reliable source of statistics on data breaches, and will serve as a key resource in this article.<\/p>\n<p>A key finding of the report was that lost business, caused primarily by affected customer trust, was the biggest contributor to data breach costs. The average cost of lost business was $1.42 million, causing a 3.9% rate of churn amidst customers. In the best-case scenarios, data breaches caused less than 1% customer churn, with an average cost of $2.8 million. In the worst-case scenarios, customer churn could be more than 4%, with an average cost of $5.7 million. This is 45% higher than the average total data breach cost.<\/p>\n<p>The report also found that one-third of data breach costs occur more than a year after the initial incident, according to 86 organizations surveyed across multiple years\u201467% of breach costs came in the first year, while 22% came in the second year, and 11% came more than two years after the initial breach.<\/p>\n<p>Companies in highly regulated industries like healthcare experienced the worst long-tail costs, with breach costs rising in both the second and third years. In high data protection regulatory environments, 53% of breach costs were accrued in the first year, 32% in the second year, and 16% more than two years after the breach. It\u2019s likely these findings are driven by new regulatory fines and the introduction of breach notification laws (e.g.,\u00a0<a class=\"ext\" href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR<\/a>).<\/p>\n<p>Another of the report\u2019s key findings was that the average breach lifecycle grew between 2018 and 2019. In 2019, the average time to identify a breach was 206 days and the average time to contain a breach was 73 days. This totaled 279 days, which was a 4.9% increase over the 2018 breach lifecycle. In general, a lifecycle lasting fewer than 200 days was an average of $1.22 million less expensive than a breach with a longer lifecycle. The faster a data breach is identified and contained, the lower the costs associated with the breach. As such, the increase in the breach lifecycle correlated to a rise in the average cost of a data breach.<\/p>\n<p>According to the Cost of a Data Breach Report, criminal attacks of a malicious nature were the most common cause of breaches\u2014and the most expensive. Since 2014, the number of breaches caused by\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/threat-monitoring-proactive-security-against-cyberthreats\" target=\"_blank\" rel=\"noopener\">cybercriminals<\/a>\u00a0has increased by 21%. Breaches of this nature take longer to identify and contain, which also contributes to higher costs.<\/p>\n<p>Although malicious breaches were the most common, accidental breaches still accounted for almost half of the total data breaches studied in the report. Instances of human error, including phishing attacks and stolen devices, were responsible for roughly 25% of the studied breaches. The average loss caused by human error in these breaches was $3.5 million. System glitches which could not be tied to human activity also made up approximately 25% of breaches, with an average loss of $3.24 million.<\/p>\n<p>It\u2019s a common misconception that small businesses are less likely to be impacted by data breaches. The report found that proportionately, small businesses suffered higher breach costs. Large companies with more than 25,000 employees had an average cost of $5.11 million in the event of a breach, while smaller companies with between 500 and 1,000 employees had an average cost of $2.65 million. This means that while large companies saw a larger total cost, the approximate cost per employee was only $204\u2014as compared to the small companies\u2019 losses of $3,533 per employee. In other words, small companies are hit more than ten times harder than larger companies, which can have an irreparable impact on their revenue.<\/p>\n<h2 class=\"h3\">Protecting your MSP and your customers<\/h2>\n<p>As this article has demonstrated, the cost of data breaches has been on the rise in recent years, and 2020 is no exception. With direct, indirect, and hidden costs to account for, businesses must take the appropriate steps to safeguard their data. For MSPs, protecting customer data is just as important as protecting your own data. In fact, an MSP\u2019s reputation can suffer significant damage even if a customer experiences a data breach that is in no way the MSP\u2019s fault. Because of this, it is important that MSPs work proactively with customers to make them aware of any potential issues. To achieve this level of insight, you\u2019ll need access to the right tools.<\/p>\n<p><a href=\"\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0RMM<\/a>\u00a0is a user-friendly and sophisticated tool designed to help you efficiently secure, maintain, and improve your customers\u2019 IT systems. This centralized solution delivers a comprehensive suite of utilities, all from within a single dashboard. This dashboard highlights issues, helping your technicians focus their attention where it&rsquo;s most needed.<\/p>\n<p>SolarWinds RMM includes out-of-the-box monitoring templates, fast and safe remote access, patch management, web protection, data-breach risk intelligence, and backup capabilities. This all-in-one solution also serves as managed antivirus software and vulnerability scanning software, making it a versatile option for MSPs who want optimal, layered security against data breaches. For MSPs looking to help their customers avoid potentially debilitating data breaches, a\u00a0<a href=\"\/products\/rmm\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\">30-day free trial<\/a>\u00a0of SolarWinds RMM is available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6302","post","type-post","status-publish","format-standard","hentry","topic-data-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Average Cost of a Data Breach in 2020 - N-able<\/title>\n<meta name=\"description\" content=\"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Average Cost of a Data Breach in 2020 - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-07T19:30:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T14:28:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Average Cost of a Data Breach in 2020\",\"datePublished\":\"2020-10-07T20:30:46+01:00\",\"dateModified\":\"2021-07-09T14:28:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\"},\"wordCount\":1510,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Data\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\",\"name\":\"The Average Cost of a Data Breach in 2020 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-10-07T20:30:46+01:00\",\"dateModified\":\"2021-07-09T14:28:17+00:00\",\"description\":\"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Data\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/data\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Average Cost of a Data Breach in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Average Cost of a Data Breach in 2020 - N-able","description":"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach","og_locale":"fr_FR","og_type":"article","og_title":"The Average Cost of a Data Breach in 2020 - N-able","og_description":"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-10-07T19:30:46+00:00","article_modified_time":"2021-07-09T14:28:17+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Average Cost of a Data Breach in 2020","datePublished":"2020-10-07T20:30:46+01:00","dateModified":"2021-07-09T14:28:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach"},"wordCount":1510,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Data"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach","url":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach","name":"The Average Cost of a Data Breach in 2020 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-10-07T20:30:46+01:00","dateModified":"2021-07-09T14:28:17+00:00","description":"Read about the average cost of a data breach in 2020 and find out how your MSP can protect itself and its clients against cyberattacks and breaches.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/average-cost-of-data-breach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Data","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/data"},{"@type":"ListItem","position":2,"name":"The Average Cost of a Data Breach in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6302"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6302\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}