{"id":43705,"date":"2023-03-14T11:38:32","date_gmt":"2023-03-14T11:38:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=43705"},"modified":"2023-04-13T11:14:44","modified_gmt":"2023-04-13T10:14:44","slug":"how-msps-can-own-risk-management-conversation","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation","title":{"rendered":"How MSPs Can Own the Risk Management Conversation"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">Against a backdrop of constantly <a href=\"https:\/\/www.n-able.com\/blog\/be-proactive-amid-growing-cyber-security-concerns\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">evolving cybersecurity threats<\/span><\/a>, it\u2019s essential that MSPs understand how to own the risk conversation if they are to really help their customers effectively manage their security posture.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In this blog, I want to look at what we mean by \u201cowning the risk conversation\u201d, and how MSPs can achieve this.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">For me, I look at it from the perspective of my own job. When most people think about their security team, they view them as the team that effectively says yes or no to projects or requests. However, in reality, our job is far more complex than simply saying yes or no to something; it starts with assessing and quantifying the risk of that request. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">When faced with a proposed project, we need to look at what the risk is to the business, our partners, and our partners\u2019 customers. Ultimately, any business decisions need to be made based on what our company\u2019s risk tolerance is as it relates to the risk itself.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">I&#8217;m in the fortunate position of working for a mature organization that understands these business risks. We understand what the potential impact a cybersecurity incident could have on our business, and I&#8217;m working across the organization with folks who have insight into how our end-to-end operations work. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">For the majority of MSPs, things are often a little bit different. MSPs are supporting those end-to-end operations for their customers and have a clear and concise understanding of a large number of the technologies and controls that support those businesses. This means they also understand the threat cyber-attacks pose to their effective operation. On the other hand, the business owners themselves often may not actually have that understanding. So, a critical part of the MSP\u2019s role is to not only identify risk for their customers, but also to effectively communicate that risk to them. <\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">Moving the focus from how to why<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Communicating that risk to your MSP customers ultimately helps you shift the conversation away from talking about \u2018how\u2019 a specific technology will protect their business to \u2018why\u2019 they need that specific technology at all. One of the toughest challenges with security evolution is that there is no clear finish line. Companies may feel like they\u2019re able to invest and get to a point where they&#8217;re done, but the reality is that&#8217;s not how security works: the risks are ever evolving, and so their investments into mitigation and protection needs to evolve with it.\u00a0 <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This can make the constant evolution of the security stack an awkward conversation to have if the customer doesn\u2019t understand how their risk has changed. However, when you need to ask for more budget to upgrade hardware, to invest in different software, to add on EDR, or whatever the case may be, if the customer can see that you\u2019re doing this to mitigate a commensurate level of risk for them, then it will make the conversation much easier. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It&#8217;s not just telling them what they need, but explaining why they need it that makes the difference here:<\/span><\/p>\n<ul>\n<li class=\"p2\"><span class=\"s1\">Why are we going down this path? <\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">What are we trying to protect you against? <\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">What risks are we trying to mitigate? <\/span><\/li>\n<li class=\"p2\"><span class=\"s1\">And, how much could those potential risks cost the business both immediately and in the long term?<\/span><\/li>\n<\/ul>\n<h2 class=\"p1\"><span class=\"s1\">Where do you start with shifting to discussing risk as an MSP?<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Performing a <a href=\"https:\/\/www.ready.gov\/business-impact-analysis\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Business Impact Assessment (BIA)<\/span><\/a> should form the foundation for your risk discussion. This will help you establish core security baselines, such as what parts of the business are most integral to its survival and therefore present the most risk and need the most protection; right the way through to how long critical systems and services can afford to be offline in the event of an outage? It\u2019s important to remember that outage could the result of a number of things. It could be a piece of failed hardware, a SaaS service that\u2019s unavailable, or a security event. So, an effective BIA should not only leverage a security lens during the assessment.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">If a small doctor&#8217;s office that does a lot of X-rays; how long can they afford for that X-ray machine to be offline? If they\u2019re a small retailer, how long can they afford for their credit card machine to be offline? If they\u2019re an accountant, how long can they afford for their email to be down and their website offline? Beyond these basic scenarios, each of those systems will have key supporting technologies\u2014what are those and how long can the business afford for those to be offline? <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">From there the risk conversation becomes about what you can put in place to ensure the business can effectively recover in the defined time frame. Also, possibly more importantly, it becomes about what you can put in place to help prevent an event from taking systems down in the first place. This is where being able to explain things from a risk management perspective can really help you frame cybersecurity as a big value proposition for the business owner. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">If you explain the \u2018why\u2019 not just the \u2018what\u2019, and how you\u2019re trying to reduce any risk, it becomes a much more organic conversation. You\u2019re not butting heads over costs now, instead, you&#8217;re working together to keep their business successful and sustainable, and effectively enabling them to continue operating a profitable business.\u00a0 <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">A secondary benefit of performing a BIA is that it can provide you with a cybersecurity playbook in the event of a major security incident. It will help you to assign a real business value to different applications and systems, and determine an acceptable Recovery Time Objective (RTO) for each. From our example above, not all things may be as critical as getting that credit card machine back online. If your printer is offline you may be fine without it for several days; even a week. So not everything needs to be back online immediately when you have a critical issue\u2014the BIA will help you figure out what order you need to bring those things back online to get your customer\u2019s business back to full productivity. <\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">Implementing a Business Impact Assessment<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">If you\u2019re looking to get started with a BIA, there are plenty of templates available online, but my go-to one is the NIST framework, below:<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s6\"><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8286d\/final\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\">NIST: Using Business Impact Analysis to Inform Risk Prioritization and Response<\/span><\/a><\/span><span class=\"s8\"> (a working guide to using the NIST BIA template)<\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjklJmB_4X8AhWnm\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\">NIST BIA Template<\/span><\/a><\/span><span class=\"s1\"> (A simplified and easy to follow template)<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">This gives you everything you need to start to transition to really helping your customer get to grips with their risk profile, and putting yourself in the best position to effectively manage that for them. <\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p4\"><span class=\"s9\"><i>Dave MacKinnon (DMac) is Chief Security Officer at N&#8209;able. <\/i><\/span><\/p>\n<p class=\"p4\"><span class=\"s9\"><i><a href=\"https:\/\/www.linkedin.com\/in\/david-mackinnon\/\" target=\"_blank\" rel=\"noopener\">Follow Dave on LinkedIn<\/a><\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Dave MacKinnon explains.<\/p>\n","protected":false},"author":82,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-43705","post","type-post","status-publish","format-standard","hentry","topic-msp-business","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How MSPs Can Own the Risk Management Conversation - N-able<\/title>\n<meta name=\"description\" content=\"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How MSPs Can Own the Risk Management Conversation - N-able\" \/>\n<meta property=\"og:description\" content=\"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-14T11:38:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-13T10:14:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230303_blogbanner_DMACOwningTheRisk_V1_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dave MacKinnon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230303_blogbanner_DMACOwningTheRisk_V1_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave MacKinnon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\"},\"author\":{\"name\":\"Dave MacKinnon\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e\"},\"headline\":\"How MSPs Can Own the Risk Management Conversation\",\"datePublished\":\"2023-03-14T11:38:32+00:00\",\"dateModified\":\"2023-04-13T10:14:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\"},\"wordCount\":1152,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Business Growth\",\"Managed Services\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\",\"name\":\"How MSPs Can Own the Risk Management Conversation - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2023-03-14T11:38:32+00:00\",\"dateModified\":\"2023-04-13T10:14:44+00:00\",\"description\":\"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Managed Services\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/managed-services-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How MSPs Can Own the Risk Management Conversation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e\",\"name\":\"Dave MacKinnon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"caption\":\"Dave MacKinnon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How MSPs Can Own the Risk Management Conversation - N-able","description":"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation","og_locale":"it_IT","og_type":"article","og_title":"How MSPs Can Own the Risk Management Conversation - N-able","og_description":"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.","og_url":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-03-14T11:38:32+00:00","article_modified_time":"2023-04-13T10:14:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230303_blogbanner_DMACOwningTheRisk_V1_ss.jpg","type":"image\/jpeg"}],"author":"Dave MacKinnon","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/230303_blogbanner_DMACOwningTheRisk_V1_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Dave MacKinnon","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation"},"author":{"name":"Dave MacKinnon","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e"},"headline":"How MSPs Can Own the Risk Management Conversation","datePublished":"2023-03-14T11:38:32+00:00","dateModified":"2023-04-13T10:14:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation"},"wordCount":1152,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Business Growth","Managed Services","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation","url":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation","name":"How MSPs Can Own the Risk Management Conversation - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2023-03-14T11:38:32+00:00","dateModified":"2023-04-13T10:14:44+00:00","description":"Helping customers understand why they need to continue investing in their cybersecurity stack is key to getting them onboard. Find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-own-risk-management-conversation#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Managed Services","item":"https:\/\/www.n-able.com\/it\/blog\/category\/managed-services-it"},{"@type":"ListItem","position":2,"name":"How MSPs Can Own the Risk Management Conversation"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e","name":"Dave MacKinnon","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","caption":"Dave MacKinnon"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/43705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=43705"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/43705\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=43705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}