{"id":66960,"date":"2025-05-21T11:16:41","date_gmt":"2025-05-21T10:16:41","guid":{"rendered":"https:\/\/www.n-able.com\/?p=66960"},"modified":"2025-05-28T15:45:10","modified_gmt":"2025-05-28T14:45:10","slug":"how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","title":{"rendered":"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base"},"content":{"rendered":"<p><span>This blog provides a practical guide for MSPs looking to standardize security practices across their client base.<\/span><\/p>\n<p><span>In the ever-evolving landscape of cyber threats, ensuring robust cybersecurity hygiene across all clients is paramount for MSPs. A standardized security methodology not only safeguards clients but also enhances the credibility and reliability of MSPs. This article delves into effective strategies for implementing consistent cybersecurity hygiene, ensuring all clients adhere to best practices and thereby reducing overall risk.<\/span><\/p>\n<h2><span>Understanding Cybersecurity Hygiene<\/span><\/h2>\n<p><span>Cybersecurity hygiene refers to the practices and measures that organizations and individuals undertake to protect their systems, networks, and data from cyber threats. Just as personal hygiene involves routine activities to maintain health, cybersecurity hygiene encompasses regular practices that ensure the security and integrity of digital assets.<\/span><\/p>\n<h2><span>The Importance of Standardized Cybersecurity Hygiene<\/span><\/h2>\n<p><span>A standardized approach to cybersecurity hygiene is critical for several reasons:<\/span><\/p>\n<ul>\n<li><span>Consistency: Ensures that all clients adhere to the same security standards, reducing the likelihood of vulnerabilities across the client base.<\/span><\/li>\n<li><span>Efficiency: Streamlined procedures and practices save time and resources, enabling MSPs to manage security more effectively.<\/span><\/li>\n<li><span>Reputation Management: A standardized methodology enhances the MSP&rsquo;s reputation, positioning it as a reliable and trustworthy partner.<\/span><\/li>\n<li><span>Regulatory Compliance: Helps clients meet industry-specific regulatory requirements, reducing the risk of legal repercussions.<\/span><\/li>\n<\/ul>\n<h2><span>MSP vs Client Cyber hygiene <\/span><\/h2>\n<p><span>To fully understand and deploy a scalable and effective cybersecurity program, MSPs must be able to differentiate between their own internal cyber controls and practices compared to those belonging to their clients. At the enterprise level, most customers will have existing resources and knowledge of their cybersecurity controls, policies, and practices, and be capable of outsourcing to MSPs in an effective manner. <\/span><\/p>\n<p><span>At the mid-market and small-medium sized business level (SMB), often, the client will rely (in part or entirely) on their MSP to help them create, maintain, and manage their internal controls, policies, and procedures relating to cybersecurity. <\/span><\/p>\n<p><span>For MSPs servicing mid-market and SMB clients, your first objective will be to understand (and gain mastery of) your internal controls and cybersecurity status, before you turn your attention to your clients. The <a href=\"https:\/\/www.mspalliance.com\/UCS\" target=\"_blank\" rel=\"noopener\">UCS<\/a> (Unified Certification Standard for Cloud &amp; Managed Service Providers) is a great starting point for MSP and SaaS controls. <\/span><\/p>\n<p><span>Once you have your house in order, it&rsquo;s time to turn your attention to your clients. <\/span><\/p>\n<h2><span>Strategies for Implementing Consistent Cybersecurity Hygiene<\/span><\/h2>\n<h3><span>1. Conduct Comprehensive Assessments<\/span><\/h3>\n<p><span>Begin with thorough assessments of each client&rsquo;s current cybersecurity posture. Identify vulnerabilities, evaluate existing security measures, and understand the specific needs and risk profiles of different clients. This foundational step allows MSPs to tailor their approach while maintaining overall consistency.<\/span><\/p>\n<h3><span>2. Develop a Standardized Security Framework<\/span><\/h3>\n<p><span>Now, if you don\u2019t want to go through the hassle of creating a cyber framework from scratch (nobody wants to do that), there are many frameworks available to MSPs for precisely such a use case. <\/span><\/p>\n<p><span>One recommendation would be to start with a framework which does not require an audit or certification. Taking this approach allows you to use the controls of the framework without having any pressure or cost associated with achieving an audit or certification. There are several <a href=\"https:\/\/www.n-able.com\/blog\/a-practical-guide-to-cybersecurity-frameworks-for-msp\" target=\"_blank\" rel=\"noopener\">cybersecurity frameworks<\/a> such as CIS, NIST, and ISO which can be implemented on client organizations without the need to deliver a full certification. <\/span><\/p>\n<p><span>Using an existing framework has several advantages over developing your own model, including speed to deployment, availability of educational resources, and recognition of the framework. Whatever framework you select, make sure it is appropriately tailored to the needs of your client (i.e., make sure it is right sized for your client base) and supports the type of managed services you deliver. <\/span><\/p>\n<h3><span>3. Educate and Train Clients<\/span><\/h3>\n<p><span>Client education is a cornerstone of effective cybersecurity hygiene. Conduct regular training sessions to educate clients about the importance of cybersecurity and best practices. Topics should include recognizing phishing attempts, creating strong passwords, and understanding the risks of unsecured networks.<\/span><\/p>\n<h3><span>4. Utilize Advanced Security Tools<\/span><\/h3>\n<p><span>Leverage advanced security tools and technologies to enhance protection. These may include:<\/span><\/p>\n<ul>\n<li><span>Endpoint Protection: Deploy <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">endpoint detection and response (EDR) solutions<\/a> to monitor and protect client devices.<\/span><\/li>\n<li><span>Firewalls and Intrusion Detection Systems (IDS): Implement robust firewalls and IDS to detect and prevent unauthorized access.<\/span><\/li>\n<li><span><a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">Password management<\/a>\/MFA<\/span><\/li>\n<li><span>Security Information and Event Management (SIEM): Utilize SIEM solutions to collect and analyze security data, providing real-time insights into potential threats.<\/span><\/li>\n<\/ul>\n<h3><span>5. Regular Monitoring and Auditing<\/span><\/h3>\n<p><span>Continuous monitoring and auditing are essential for maintaining cybersecurity hygiene. Regularly review your clients against the framework you chose and drive accountability, identify changes, and prevent bad habits from seeping into organizational culture. Monitoring should involve real-time surveillance of network activities to detect anomalies promptly. This includes scrutinizing access logs, tracking system changes, and employing automated tools that alert to suspicious activities.<\/span><\/p>\n<p><span>Auditing complements monitoring by providing a thorough examination of security protocols, policies, and practices. Conducting periodic audits helps ensure compliance with established standards and regulatory requirements. Audits should assess the effectiveness of security measures, identify vulnerabilities, and propose remedial actions. Comprehensive reports from these audits provide valuable insights into the security posture of an organization, guiding strategic improvements and reinforcing the overall cybersecurity strategy.<\/span><\/p>\n<p><span>In addition, staying updated with the latest cybersecurity trends and threats is crucial. Encourage clients to adapt to evolving threat landscapes by incorporating new defense mechanisms and best practices. This proactive approach helps in building resilient defenses and fostering a robust security environment.<\/span><\/p>\n<h3><span>6. Foster a Culture of Security<\/span><\/h3>\n<p><span>Encourage clients to foster a culture of security within their organizations. This involves integrating security into the overall business strategy, promoting awareness, and encouraging employees to take responsibility for their role in protecting the company&rsquo;s digital assets. Quite frankly, this represents a tremendous opportunity for MSPs to get involved with clients at a level that transcends just IT management. <\/span><\/p>\n<p><span>By recommending and providing the tools and information necessary for clients to develop their own security culture, your MSP practice will go a long way towards becoming a relevant and irreplaceable advisor to your clients. <\/span><\/p>\n<h2><span>Challenges and Solutions<\/span><\/h2>\n<p><span>While standardizing cybersecurity hygiene across a diverse client base can be challenging, there are solutions to common obstacles:<\/span><\/p>\n<h3><span>1. Resistance to Change<\/span><\/h3>\n<p><span>Clients may resist changes to their established practices. Overcome this by clearly communicating the benefits of standardized security and providing evidence of how it can mitigate risks and enhance their protection.<\/span><\/p>\n<h3><span>2. Varied Client Needs<\/span><\/h3>\n<p><span>Different clients have unique needs and risk profiles. Do not be surprised if you have to develop competency in multiple frameworks to meet client demand. Tailor the standardized frameworks to accommodate these differences, ensuring flexibility while maintaining core security principles.<\/span><\/p>\n<h3><span>3. Resource Constraints<\/span><\/h3>\n<p><span>Implementing comprehensive cybersecurity measures can be resource intensive. Utilize scalable solutions and prioritize high-impact areas to manage costs effectively.<\/span><\/p>\n<h2><span>Conclusion: <\/span><em>Protect Clients with Unified Cybersecurity Hygiene<\/em><\/h2>\n<p><span>Standardizing cybersecurity hygiene across your managed services client base is essential for safeguarding against the ever-increasing threat of cyber-attacks. By conducting comprehensive assessments, developing a standardized security framework, educating clients, utilizing <a href=\"https:\/\/www.n-able.com\/platform\" target=\"_blank\" rel=\"noopener\">advanced security tools<\/a>, and fostering a culture of security, MSPs can ensure consistent and robust protection for all clients. Overcoming challenges such as resistance to change and varied client needs requires clear communication, flexibility, and resource management. Ultimately, a standardized approach to cybersecurity hygiene not only protects clients but also enhances the MSP&rsquo;s reputation as a reliable and trustworthy partner.<\/span><\/p>\n<p><span>Incorporating these strategies into your managed services can significantly reduce the overall risk and ensure that your clients are well-protected in the face of evolving cyber threats.<\/span><\/p>\n<p><span>\u00a0<\/span><\/p>\n<p><em>Charles Weaver is CEO and co-founder of the\u00a0<\/em><a href=\"https:\/\/mspalliance.com\/\" target=\"_blank\" rel=\"noopener\"><em>MSPAlliance<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-66960","post","type-post","status-publish","format-standard","hentry","topic-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able<\/title>\n<meta name=\"description\" content=\"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able\" \/>\n<meta property=\"og:description\" content=\"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-21T10:16:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T14:45:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/051625_BB_Cybersecurity-Hygiene_PD_Final_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base\",\"datePublished\":\"2025-05-21T11:16:41+01:00\",\"dateModified\":\"2025-05-28T14:45:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\"},\"wordCount\":1266,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\",\"name\":\"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2025-05-21T11:16:41+01:00\",\"dateModified\":\"2025-05-28T14:45:10+00:00\",\"description\":\"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able","description":"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","og_locale":"fr_FR","og_type":"article","og_title":"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able","og_description":"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-05-21T10:16:41+00:00","article_modified_time":"2025-05-28T14:45:10+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/051625_BB_Cybersecurity-Hygiene_PD_Final_1200x628.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Guest","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base","datePublished":"2025-05-21T11:16:41+01:00","dateModified":"2025-05-28T14:45:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients"},"wordCount":1266,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","url":"https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients","name":"Cybersecurity Hygiene for Your Clients: How to Enforce a Standardized Security Methodology Across Your Managed Services Client Base - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2025-05-21T11:16:41+01:00","dateModified":"2025-05-28T14:45:10+00:00","description":"Standardize cybersecurity hygiene across your MSP client base. Learn strategies, frameworks, and tools to improve client security and compliance.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/how-to-enforce-standardized-cybersecurity-hygiene-for-your-clients"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/66960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=66960"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/66960\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=66960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}