{"id":6586,"date":"2020-11-19T15:32:50","date_gmt":"2020-11-19T15:32:50","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6586"},"modified":"2021-04-12T15:41:57","modified_gmt":"2021-04-12T14:41:57","slug":"types-of-security-breaches-and-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them","title":{"rendered":"Seven Common Types of Security Breaches and How to Prevent Them"},"content":{"rendered":"<p>A security breach occurs when a network or system is accessed by an unauthorized individual or application. Once your system is infiltrated, the intruders can steal data,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/a-n-msps-guie-to-responding-to-viruses\" target=\"_blank\" rel=\"noopener\">install viruses<\/a>, and compromise software. Needless to say, a security breach can be a complete disaster for a managed services provider (MSP) and their customers.<\/p>\n<p>Cybercrime seems to be growing more sophisticated with each passing day, and hackers are constantly adopting new techniques as they attempt to breach security measures. As an MSP, you are a prime target for cybercrime because you hold the keys to all of your customers\u2019 data. This means that a successful breach on your MSP will likely also impact your customers, compromising their data and systems. Because of the increased risk to MSPs, it\u2019s critical to understand the types of security threats your company may face. This article will outline seven of the most common types of security threats and advise you on how to help prevent them.<\/p>\n<h2 class=\"h3\">The types of security breaches MSPs should be aware of<\/h2>\n<p>Equifax, eBay, Home Depot, Adobe, Yahoo, and Target are just a few of the huge, household names impacted by a <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-a-data-breach\"  data-wpil-monitor-id=\"45\">data breach<\/a>. Despite advanced security measures and systems in place, hackers still managed to infiltrate these companies. Being aware of these attacks and the impact they\u2019ll have on your MSP can help you prevent them from happening in the first place.<\/p>\n<h3 class=\"h4\">1. MAN-IN-THE-MIDDLE ATTACK<\/h3>\n<p>A man-in-the-middle (MitM) attack is a difficult security breach to recognize because it involves a bad actor taking advantage of a trusted \u201cman in the middle\u201d to infiltrate your system. Most often, the hacker will start by compromising a customer\u2019s system to launch an attack on your server. Hackers can achieve this by either:<\/p>\n<ul>\n<li>Sneaking through a connection you\u2019ve already established with your customer<\/li>\n<li>Stealing a customer\u2019s IP address and disguising themselves as the customer to lure you into providing valuable information or funds<\/li>\n<\/ul>\n<h3 class=\"h4\">2. DENIAL-OF-SERVICE AND DISTRIBUTED-DENIAL-OF-SERVICE ATTACKS<\/h3>\n<p>A denial-of-service (DoS) attack attempts to knock a network or service offline by flooding it with traffic to the point the network or service can\u2019t cope. A distributed-denial-of-service (DDoS) attack hijacks devices (often using botnets) to send traffic from multiple sources to take down a network. A DDoS attack by itself doesn\u2019t constitute a data breach, and many are often used simply to create havoc on the victim\u2019s end and disrupt business operations. However, DDoS attacks can act as smokescreens for other attacks occurring behind the scenes.<\/p>\n<h3 class=\"h4\">3. PHISHING AND SPEAR PHISHING<\/h3>\n<p>If you\u2019ve ever received an email claiming to be from a trusted company you have an account with\u2014for example, Paypal\u2014but something about the email seemed unusual, then you have probably encountered a phishing attempt. Phishing involves the hacker sending an email designed to look like it has been sent from a trusted company or website. The email will often sound forceful, odd, or feature spelling and grammatical errors.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spear-phishing-prevention?promo=blog\" target=\"_blank\" rel=\"noopener\">Phishing emails<\/a>\u00a0will attempt to entice the recipient into performing an action, such as clicking a link or downloading an attachment. The link or attachment usually requests sensitive data or contains malware that compromises the system.<\/p>\n<p>A phishing email is typically sent out to a large number of recipients without a specific target, in the hopes that casting a wide net will result in at least one recipient taking the bait. Spear phishing, on the other hand, has a specific target. With spear phishing, the hacker may have conducted research on the recipient. For example, they might look through an individual\u2019s social media profiles to determine key details like what company the victim works for. The hacker could then use this information to pretend to be the recipient\u2019s employer, giving them a better chance of successfully persuading the victim to share valuable information or even transfer funds.<\/p>\n<h3 class=\"h4\">4. PASSWORD ATTACK<\/h3>\n<p>According to\u00a0<a class=\"ext\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Have I Been Pwned<\/a>, a source that allows you to check if your account has been compromised in a data breach, these are the most commonly used passwords:<\/p>\n<ol>\n<li>123456<\/li>\n<li>123456789<\/li>\n<li>qwerty<\/li>\n<li>password<\/li>\n<li>111111<\/li>\n<li>12345678<\/li>\n<li>abc123<\/li>\n<li>password1<\/li>\n<li>1234567<\/li>\n<li>12345<\/li>\n<\/ol>\n<p>On top of being popular, these passwords are also extremely easy for hackers to guess. Sadly, many people and businesses make use of the same passwords for multiple accounts. This means that if the hacker guesses just one of the passwords, they can try that password on other services and get a match. For example, they may get an email and password combination, then try them on bank accounts, looking for a hit. Hackers can use password attacks to compromise accounts, steal your identity, make purchases in your name, and gain access to your bank details.<\/p>\n<p>Hackers can often guess passwords by using social engineering to trick people or by brute force. To reduce the risk of hackers guessing your passwords, make sure you have a unique password for each of your accounts\u2014and that each of these passwords are complex. They should include a combination of digits, symbols, uppercase letters, and lowercase letters. If possible, it\u2019s best to avoid words found in the dictionary.\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/password-management?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\">Password management tools<\/a>\u00a0can generate strong passwords for you and store them in an encrypted vault that can be accessed with a master password and multi-factor authentication so you don\u2019t have to remember them.<\/p>\n<h3 class=\"h4\">5. EAVESDROP ATTACK<\/h3>\n<p>An eavesdrop attack is an attack made by intercepting network traffic. Eavesdropping attacks entail the hacker using your behavior on your network to track things like credit card numbers and other potentially valuable, sensitive information. There are two different types of eavesdrop attacks\u2014active and passive. In an active attack, the hacker will disguise themselves as a trusted server and send queries to the transmitters. A passive attack, on the other hand, listens to information through the transmission network.<\/p>\n<h3 class=\"h4\">6. CROSS-SITE SCRIPTING ATTACK<\/h3>\n<p>A cross-site (XXS) attack attempts to inject malicious scripts into websites or web apps. Launching a successful XXS attack is a reasonably complicated process, which requires the victim to visit a website and have the network translate the website with the attacker\u2019s HTML. This means that when the website reaches the victim\u2019s browser, the website automatically executes the malicious script. The aim of this attack is to capture screenshots, log keystrokes, collect network information, steal cookies, and even remotely access the victim\u2019s device. This can ultimately be one method of launching a larger attack leading to a full-on data breach.<\/p>\n<h3 class=\"h4\">7. MALWARE ATTACK<\/h3>\n<p>A\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-remove-malware\" target=\"_blank\" rel=\"noopener\">malware<\/a>\u00a0attack is an umbrella term that refers to a range of different types of security breaches. This includes the following:<\/p>\n<ul>\n<li>Polymorphic viruses, which change their signatures frequently to evade signature-based antivirus (AV)<\/li>\n<li>Systems or boot-record infectors, which are viruses that attach themselves to your hard disk<\/li>\n<li>Trojan or trojan horses, which are programs that appear as a typical file like an MP3 download but that hide malicious behavior<\/li>\n<li>File infectors, which are viruses that attach themselves to code on files<\/li>\n<li>Macro viruses, which are viruses that target and infect major applications<\/li>\n<li>Stealth viruses, which take control over your system and then use obfuscation methods like changing the filename to avoid detection<\/li>\n<li>Worms, which are viruses that propagate across a network<\/li>\n<li>Logic bombs, which are malicious software programs that are triggered by a specific condition, such as a date and time<\/li>\n<li>Ransomware, which are malware viruses that block access to the victim\u2019s sensitive data until the victim pays a specific amount of money<\/li>\n<\/ul>\n<p>Both individuals and businesses can fall victim to these types of attacks, which can have drastic financial, legal, and operational consequences.<\/p>\n<h2 class=\"h3\">Preventing security breaches<\/h2>\n<p>The most effective way to prevent security breaches is to use a robust and comprehensive IT security management system. To cover all bases and protect from a variety of angles, a system should include things like endpoint security software, firewall management software, managed antivirus, and bring your own device (BYOD)\/mobile device management (MDM) software.<\/p>\n<p>With a reliable and proven security system in place, you can demonstrate added value to customers and potential customers in today\u2019s threat landscape. The assurance of IT security is one of the main reasons that customers choose to enlist the help of an MSP, so being able to prove the integrity of your security measures can give you a huge advantage over competitors.<\/p>\n<p>It\u2019s worth noting you should also prioritize proactive education for your customers on the dangers of these security breaches, because certain tactics (like phishing) help infiltrate a system by taking advantage of those that may not be as cyberaware. Even if a data breach isn\u2019t your fault, your customer may still blame you, and thus educating customers is key to maintaining a strong cybersecurity posture.<\/p>\n<h2 class=\"h3\">Remote monitoring with SolarWinds RMM<\/h2>\n<p><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds RMM<\/a>\u00a0is a suite of remote monitoring and management tools available via a single, user-friendly dashboard. This solution saves your technicians from juggling multiple pieces of software, helping you secure, maintain, and improve your customers\u2019 IT systems.<\/p>\n<p>RMM features endpoint security software and firewall management software, in addition to delivering a range of other sophisticated security features. This includes patch management, web protection, managed antivirus, and even advanced endpoint detection and response. To start preventing data breaches from affecting your customers today, you can access a 30-day free trial of\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/trial?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds RMM<\/a>\u00a0here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about the seven most common types of security breaches and find out how your MSP can prevent them.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6586","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Seven Common Types of Security Breaches and How to Prevent Them - N-able<\/title>\n<meta name=\"description\" content=\"Read about the seven most common types of security breaches and find out how your MSP can prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seven Common Types of Security Breaches and How to Prevent Them - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the seven most common types of security breaches and find out how your MSP can prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T15:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T14:41:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Seven Common Types of Security Breaches and How to Prevent Them\",\"datePublished\":\"2020-11-19T15:32:50+00:00\",\"dateModified\":\"2021-04-12T14:41:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\"},\"wordCount\":1551,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\",\"name\":\"Seven Common Types of Security Breaches and How to Prevent Them - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-11-19T15:32:50+00:00\",\"dateModified\":\"2021-04-12T14:41:57+00:00\",\"description\":\"Read about the seven most common types of security breaches and find out how your MSP can prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seven Common Types of Security Breaches and How to Prevent Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seven Common Types of Security Breaches and How to Prevent Them - N-able","description":"Read about the seven most common types of security breaches and find out how your MSP can prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them","og_locale":"fr_FR","og_type":"article","og_title":"Seven Common Types of Security Breaches and How to Prevent Them - N-able","og_description":"Read about the seven most common types of security breaches and find out how your MSP can prevent them.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-11-19T15:32:50+00:00","article_modified_time":"2021-04-12T14:41:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Seven Common Types of Security Breaches and How to Prevent Them","datePublished":"2020-11-19T15:32:50+00:00","dateModified":"2021-04-12T14:41:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them"},"wordCount":1551,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them","url":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them","name":"Seven Common Types of Security Breaches and How to Prevent Them - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-11-19T15:32:50+00:00","dateModified":"2021-04-12T14:41:57+00:00","description":"Read about the seven most common types of security breaches and find out how your MSP can prevent them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/types-of-security-breaches-and-how-to-prevent-them#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Seven Common Types of Security Breaches and How to Prevent Them"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6586"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6586\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}