{"id":40146,"date":"2022-11-30T10:53:28","date_gmt":"2022-11-30T10:53:28","guid":{"rendered":"https:\/\/www.n-able.com\/?p=40146"},"modified":"2022-12-01T15:01:45","modified_gmt":"2022-12-01T15:01:45","slug":"why-unmanaged-apple-devices-make-your-customers-vulnerable","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable","title":{"rendered":"Why unmanaged Apple devices make your customers vulnerable"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Let\u2019s start with a simple but harsh fact: If you say you\u2019re protecting your customers\u2019 networks and you\u2019re not <a href=\"https:\/\/www.n-able.com\/blog\/admins-guide-mac-device-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">managing their Apple devices<\/span><\/a>, then you\u2019re lying to them and yourself!<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Over the years hackers have targeted everything from HVAC machines (<a href=\"https:\/\/krebsonsecurity.com\/2014\/02\/target-hackers-broke-in-via-hvac-company\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Target<\/span><\/a>) to fish tank thermometers (<a href=\"https:\/\/www.entrepreneur.com\/business-news\/a-casino-gets-hacked-through-a-fish-tank-thermometer\/368943\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">an unnamed Las Vegas casino<\/span><\/a>) and a whole host of devices in between in order to prise their way into company networks.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Let\u2019s stop for a minute to consider that fact.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">The perils of an unpatched Mac<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">What do you think is easier to break into, a fish tank thermometer or an unpatched Mac you\u2019ve got sitting on your customer\u2019s network?<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Sure hacks through fish tank thermometers make the news because they\u2019re so interesting and rare, but the majority of hacks are coming through cybercriminals scanning networks for known vulnerabilities that are unpatched on networks. If your customer has Macs on their network\u2014even if it\u2019s just a couple in a particular department\u2014and you\u2019re not patching them, then, guess what? You\u2019ve got a potentially serious vulnerability.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">And if you think that just leaving Mac updating to the end user is OK, you\u2019re really leaving a ticking time bomb on the network\u2014especially if they haven\u2019t updated their machine in a while and they\u2019ve still got instances of Flash or Java on there! These things are gifts to hackers looking to get into your customers\u2019 networks.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The real point here is that Macs are still just computers. OK, if you\u2019re used to PCs they may look and behave a little differently, but they still have vulnerabilities that need to be updated. As I mentioned in <a href=\"https:\/\/www.n-able.com\/blog\/apple-device-monitoring-9-things-you-need-to-know\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">my previous blog<\/span><\/a> even Apple admits that its security in <a href=\"https:\/\/www.makeuseof.com\/apple-macos-malware-craig-federighi-comment\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">MacOS is not up to the security in iOS<\/span><\/a>.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Data loss on Macs is a real business threat<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">On top of that they need to be monitored and backed up. A lot of people who don&#8217;t fully understand the Apple ecosystem think everything is fine because Macs have their own built-in backup, Time Machine.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">While that\u2019s true, in my opinion Time Machine over a network can be flaky, and you still have to monitor it to make sure everything backed up correctly. It&#8217;s like any other backup: it\u2019s only a backup if you make sure it actually worked!<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Of course, you could counter that by saying people should be saving on the server. And, to a certain extent you\u2019re right: people should be saving on the server. But are you enforcing that? If a c-level exec comes to you saying that\u2014for whatever reason\u2014they\u2019ve lost a really important file from their desktop, turning round and saying \u201cI\u2019m sorry we don\u2019t have a backup of that because you should have saved it onto the server\u201d, isn\u2019t going to win you any friends.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Also, consider this other scenario. Time Machine typically doesn&#8217;t back up to the cloud, it is a local backup on local disk attached to a machine, or stored somewhere on the LAN. What happens if the building burns down, there\u2019s a flood, or some other form a natural disaster like a hurricane? All the Mac desktops have gone and so have all the Time Machine backups. All your customer\u2019s Mac-based data is gone, and you\u2019re the ones they\u2019re going to be asking \u201chow and why did this happen?\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">If you\u2019re effectively managing Macs none of this should be a problem for you, and your customer is going to be happy. And happy customers are good for MSP business.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">On top of reducing vulnerabilities, there is a compelling <a href=\"https:\/\/www.n-able.com\/blog\/business-case-msps-adding-mac-support\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">business case to add Mac support<\/span><\/a> to your service offering\u2014which is also good for business.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>With Mac management through <\/b><a href=\"https:\/\/www.n-able.com\/products\/n-sight-rmm\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>N&#8209;able N&#8209;sight<\/b><\/span><\/a><b> you can keep ALL your customers\u2019 devices under management and keep your customers happy, using one platform. Find out more <\/b><a href=\"https:\/\/www.n-able.com\/resources\/n-sight-rmm-mac-device-management-for-it-pros\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>here<\/b><\/span><\/a><b>.<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>Looking for more on managing Macs and other Apple devices? Check out the <\/b><a href=\"https:\/\/www.n-able.com\/blog\/mac-support\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Mac Support<\/b><\/span><\/a><b> section of our blog.<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><i>Brian Best is Senior Product Manager at N&#8209;able<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re not managing your customers\u2019 Apple devices you\u2019ve got a ticking time bomb that\u2019s going to explode on you as much as it is them, warns Brian Best.<\/p>\n","protected":false},"author":103,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-40146","post","type-post","status-publish","format-standard","hentry","topic-apple"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why unmanaged Apple devices make your customers vulnerable - N-able<\/title>\n<meta name=\"description\" content=\"If you&#039;re an MSP and you&#039;re not managing the Apple devices on your customers&#039; networks, you&#039;re heading for trouble. Read more to find out why.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why unmanaged Apple devices make your customers vulnerable - N-able\" \/>\n<meta property=\"og:description\" content=\"If you&#039;re an MSP and you&#039;re not managing the Apple devices on your customers&#039; networks, you&#039;re heading for trouble. Read more to find out why.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-30T10:53:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-01T15:01:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/11\/GettyImages-1356364268-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Best\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/11\/GettyImages-1356364268-scaled.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Best\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\"},\"author\":{\"name\":\"Brian Best\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e9a9c515a79d4ebc80d96e571fa0ffe4\"},\"headline\":\"Why unmanaged Apple devices make your customers vulnerable\",\"datePublished\":\"2022-11-30T10:53:28+00:00\",\"dateModified\":\"2022-12-01T15:01:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\"},\"wordCount\":697,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Mac Support\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\",\"name\":\"Why unmanaged Apple devices make your customers vulnerable - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2022-11-30T10:53:28+00:00\",\"dateModified\":\"2022-12-01T15:01:45+00:00\",\"description\":\"If you're an MSP and you're not managing the Apple devices on your customers' networks, you're heading for trouble. Read more to find out why.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mac Support\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/mac-support\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why unmanaged Apple devices make your customers vulnerable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e9a9c515a79d4ebc80d96e571fa0ffe4\",\"name\":\"Brian Best\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g\",\"caption\":\"Brian Best\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why unmanaged Apple devices make your customers vulnerable - N-able","description":"If you're an MSP and you're not managing the Apple devices on your customers' networks, you're heading for trouble. Read more to find out why.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable","og_locale":"it_IT","og_type":"article","og_title":"Why unmanaged Apple devices make your customers vulnerable - N-able","og_description":"If you're an MSP and you're not managing the Apple devices on your customers' networks, you're heading for trouble. Read more to find out why.","og_url":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-11-30T10:53:28+00:00","article_modified_time":"2022-12-01T15:01:45+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/11\/GettyImages-1356364268-scaled.jpg","type":"image\/jpeg"}],"author":"Brian Best","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/11\/GettyImages-1356364268-scaled.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Brian Best","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable"},"author":{"name":"Brian Best","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e9a9c515a79d4ebc80d96e571fa0ffe4"},"headline":"Why unmanaged Apple devices make your customers vulnerable","datePublished":"2022-11-30T10:53:28+00:00","dateModified":"2022-12-01T15:01:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable"},"wordCount":697,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Mac Support"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable","url":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable","name":"Why unmanaged Apple devices make your customers vulnerable - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2022-11-30T10:53:28+00:00","dateModified":"2022-12-01T15:01:45+00:00","description":"If you're an MSP and you're not managing the Apple devices on your customers' networks, you're heading for trouble. Read more to find out why.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/why-unmanaged-apple-devices-make-your-customers-vulnerable#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mac Support","item":"https:\/\/www.n-able.com\/it\/blog\/category\/mac-support"},{"@type":"ListItem","position":2,"name":"Why unmanaged Apple devices make your customers vulnerable"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e9a9c515a79d4ebc80d96e571fa0ffe4","name":"Brian Best","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/67c15ee92c3032b4a6a5553e5fbe7a7f83a5a330f95581a5cd4ccb7379056f1f?s=96&d=mm&r=g","caption":"Brian Best"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/40146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=40146"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/40146\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=40146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}