{"id":4986,"date":"2020-03-24T03:35:32","date_gmt":"2020-03-24T03:35:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4986"},"modified":"2021-05-06T13:39:09","modified_gmt":"2021-05-06T12:39:09","slug":"types-of-social-engineering-attacks-in-2020","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020","title":{"rendered":"Types of Social Engineering Attacks in 2020"},"content":{"rendered":"<p>Most digitally driven organizations today understand the grave potential consequences that cybercrime can bring. Whether they invest in their own in-house cybersecurity infrastructure or work with an experienced managed services provider (MSP) for streamlined, around-the-clock support, companies of all sizes appreciate that doing business online exposes them to an increasingly sophisticated array of digital threats.<\/p>\n<p>While organizations know they need to work closely with their MSPs to help prevent brute force attacks from gaining access to network assets, one area of cybercrime tends to get overlooked\u2014social engineering. Although businesses and their MSPs are investing more seriously in their cybersecurity infrastructure to defend network hardware and software, social engineering exploits the most vulnerable aspect of organizational cybersecurity: its people.<\/p>\n<p>Social engineering attacks rely on human error in order to gain access to an organization\u2019s network and wreak whatever kind of havoc cybercriminals have planned. Even if organizations and their MSPs work hand in hand in order to secure valuable hardware and protect business software, MSPs cannot constantly monitor employee activity. One wrong click on a cybercriminal\u2019s well-crafted phishing email or harpoon attack can jeopardize an entire business\u2019s IT environment.<\/p>\n<p>With the cost of phishing and social engineering attacks in 2019\u00a0averaging $1.4 million\u00a0per organization, MSPs need to consider how they can best defend their customers against this kind of cybercrime. From teaching employees how to spot suspicious emails to investing in sophisticated tools specifically designed to look out for social engineering, MSPs have an effective slate of strategies at their disposal when it comes to protecting partners from social engineering.<\/p>\n<h3><b>What are social engineering attacks?<\/b><\/h3>\n<p>Social engineering attacks are cybersecurity incidents that specifically target people instead of hardware or software. Rather than attempting to use brute force to bypass a network\u2019s existing cybersecurity defenses, cybercriminals deploying social engineering strategies attempt to prey on unsuspecting employees\u2014at every level of an organization\u2014to steal log-in credentials access otherwise off-limits areas, and hack valuable files.<\/p>\n<p>These kinds of attacks can take many forms, but all appeal to specific human weaknesses in order to work. They can take place online, such as over email, or in the physical world, such as at a building\u2019s security checkpoint. Some social engineering strategies even involve both worlds. For instance, a bad actor might leave corrupted flash drives in a company parking lot or lying around on office desks in the hope that an authorized employee will pick them up and accidentally download malware to their computer.<\/p>\n<p>Quid pro quo social engineering attacks rely on exchanging a good or service for information that a cybercriminal can use to access a private network. An employee might receive a call or email from a bad actor impersonating an external IT expert or internal tech support professional. They may press the employee to give them their\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/single-sign-on-authentication\" target=\"_blank\" rel=\"noopener\">log-in information<\/a>\u00a0so they can upload a security patch, improve their computer\u2019s performance, or render some other kind of IT service. If they successfully convince an employee to provide those credentials, they can use that access to infect a computer with malware that will then spread throughout the network.<\/p>\n<p>Other kinds of social engineering attacks abound. Baiting attacks attempt to appeal to an employee\u2019s curiosity\u2014for good or for ill. For instance, cybercriminals may attempt to bait workers into clicking on a link to download free music, or as we mentioned earlier, they may leave flash drives around that appear to store sensitive company information. Clicking on any such link or plugging that kind of flash drive into a company computer can be enough to give hackers all the access they need. Tailgating is another method of social engineering that involves unauthorized personnel following employees into areas that would otherwise be off-limits. They may appeal to their goodwill by claiming they forgot their access card, only to use that access to get onto the organization\u2019s network.<\/p>\n<p>While these types of social engineering attacks might not be top of mind for many organizations, it\u2019s becoming increasingly common\u2014and increasingly successful. A recent report found that\u00a0<a class=\"ext\" href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/howto-detection-response-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">83% of all companies<\/a>\u00a0were the victims of phishing attacks in 2018. What\u2019s more, according to\u00a0CyberEdge,\u00a0the number of successful social engineering attacks continues to grow as the years go by. In 2014, 63% of social engineering attacks accomplished their goals. That figure rose to 71% in 2015, jumped to 76% in 2016, and hit 79% in 2017.<\/p>\n<h3><b>Is phishing a type of social engineering attack?<\/b><\/h3>\n<p>While quid pro quo, baiting, and tailgating have become prevalent in recent years, phishing might be the most well-known\u2014and the most effective type of social engineering attack. While quid pro quo and baiting attacks attempt to fool employees into providing network access either by offering a service that workers think they need or by appealing to their curiosity to take advantage of real-world trust, phishing relies on creating a false sense of urgency.<\/p>\n<p>Phishing, which is the most relevant kind of social engineering attack today, primarily targets regular employees outside of the executive suite. Workers might receive an email, an instant message, or be directed to a particular website that has been carefully constructed to look like it\u2019s connected to a trustworthy source or reputable organization. Phishing has become increasingly sophisticated and hard to detect. Emails might include properly formatted hyperlinks, instant messages might appear to be coming from trusted personnel within an organization, and websites might have the appropriate branding and user interface.<\/p>\n<p>However, what these forms of phishing all share is the urgency they try to create in the recipient.\u00a0<b>Phishing messages often appear to come from banks, government agencies, or a particular department within an organization<\/b>. These attacks essentially threaten employees with some kind of blowback\u2014an account being locked, activity being reported, funds being frozen\u2014in order to get the recipient to immediately act without slowing down to use proper judgment.<\/p>\n<p>If employees take the time to look closer, however, they\u2019ll be able to notice discrepancies that indicate common phishing techniques, as well as tip-offs that someone might be attempting to steal sensitive information. For example, hovering over email hyperlinks may reveal a different destination than the text would convey. Similarly, demands to immediately verify log-in credentials\u2014credentials that the supposed organization would not have a reason to request\u2014are a telltale sign that employees might be the target of a phishing attempt.<\/p>\n<h3><b>What are harpooning social engineering attacks?<\/b><\/h3>\n<p>Phishing inherently casts a wide net. All it takes is one employee to fall for this kind of social engineering attack for cybercriminals to get the access they need. However, a similar type of social engineering\u2014known as harpooning or whaling\u2014takes a different approach. Rather than mass emails with the hope that at least one employee might fall for it, harpooning specifically targets executives\u2014and does so with pinpoint precision.<\/p>\n<p>The method of delivery with harpooning is typically the same as phishing. An upper-level management professional might receive what appears to be a particularly important work-related email. Bad actors will have taken the time to make the message seem like it\u2019s coming from a legitimate entity, either within the organization or from a trusted third party. While phishing emails might run the gamut, from work-related materials to claims that employees have won a grand prize, harpooning scams attempt to draw executives\u2019 concern for top-tier problems.<\/p>\n<p>For instance, a harpooning attack might take a particular executive\u2019s department into consideration and claim to be sharing highly sensitive materials relevant to their role. By doing so, these types of social engineering attacks aim to create the same sense of urgency in upper-level management as they do with regular employees\u2014with the shared goal of getting people to click before they take the time to carefully investigate messages for any inconsistencies.<\/p>\n<h3><b>How can organizations protect themselves against social engineering attacks?<\/b><\/h3>\n<p>If organizations haven\u2019t invested in staff security awareness training or cybersecurity tools specifically geared toward preventing successful social engineering attacks, it\u2019s critical that they do. Defending against spear-phishing is an increasingly common priority for organizations of varying sizes and diverse industries. As an MSP,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security?promo=blog\" target=\"_blank\" rel=\"noopener\">ensuring security measures<\/a>\u00a0are put in place is critical to help keep customers protected from the full range of tactics that cybercriminals will deploy.<\/p>\n<p>To that end, MSPs should be able to provide their customers with the kind of social engineering attack prevention they need to maintain a safe IT environment. With the right\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail-assure\/use-cases\/microsoft-365-email-protection\" target=\"_blank\" rel=\"noopener\">email threat intelligence software<\/a>\u2014such as\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail?promo=blog\" target=\"_blank\" rel=\"noopener\">Mail Assure from SolarWinds<\/a>\u2014MSPs can monitor partner networks specifically for social engineering attacks, helping deliver anti-malware prevention and security against cybercriminals to those that need it most.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most digitally driven organizations today understand the grave potential consequences that cybercrime can bring. Whether they invest in their own in-house cybersecurity infrastructure or work with an experienced managed services&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4986","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Types of Social Engineering Attacks in 2020 - N-able<\/title>\n<meta name=\"description\" content=\"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Social Engineering Attacks in 2020 - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-24T03:35:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-06T12:39:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Types of Social Engineering Attacks in 2020\",\"datePublished\":\"2020-03-24T03:35:32+00:00\",\"dateModified\":\"2021-05-06T12:39:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\"},\"wordCount\":1441,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\",\"name\":\"Types of Social Engineering Attacks in 2020 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2020-03-24T03:35:32+00:00\",\"dateModified\":\"2021-05-06T12:39:09+00:00\",\"description\":\"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Types of Social Engineering Attacks in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Types of Social Engineering Attacks in 2020 - N-able","description":"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020","og_locale":"it_IT","og_type":"article","og_title":"Types of Social Engineering Attacks in 2020 - N-able","og_description":"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.","og_url":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-24T03:35:32+00:00","article_modified_time":"2021-05-06T12:39:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Types of Social Engineering Attacks in 2020","datePublished":"2020-03-24T03:35:32+00:00","dateModified":"2021-05-06T12:39:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020"},"wordCount":1441,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020","url":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020","name":"Types of Social Engineering Attacks in 2020 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2020-03-24T03:35:32+00:00","dateModified":"2021-05-06T12:39:09+00:00","description":"Read about the various types of social engineering attacks bad actors use to target employees within a business\u2014and how MSPs can use Mail Assure to help.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/types-of-social-engineering-attacks-in-2020#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Types of Social Engineering Attacks in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/4986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=4986"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/4986\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=4986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}