{"id":5806,"date":"2017-05-18T23:44:51","date_gmt":"2017-05-18T22:44:51","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5806"},"modified":"2021-07-12T14:55:18","modified_gmt":"2021-07-12T13:55:18","slug":"msp-data-breach-101-4-things-you-need-know-about-data-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security","title":{"rendered":"MSP Data Breach 101: 4 things you need to know about data security"},"content":{"rendered":"<p>According to the UK Government\u00a0<a class=\"ext\" href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2017\" target=\"_blank\" rel=\"noopener noreferrer\">&#8216;Cyber Security Breaches Survey 2017<\/a>&#8216;, some\u00a0 46% of British businesses had at least &#8216;one breach or attack&#8217; during the past year. The most common threat?\u00a0 Phishing.<\/p>\n<p>However, such reports should be treated with caution as an attack isn&#8217;t the same as a breach. Every business on the planet must have received at least one phishing email last year after all. Indeed, SolarWinds MSP\u2019s Global Security Strategist, Ian Trump, and I co-authored a paper on the importance of &#8216;<a class=\"ext\" href=\"https:\/\/www.academia.edu\/19891233\/FUD\" target=\"_blank\" rel=\"noopener noreferrer\">meaningful measurement methodologies<\/a>&#8216; a couple of years back which is still very much worth a read.<\/p>\n<h3>Too many companies failing to implement basic security controls<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\" alt=\"defending.jpg\" width=\"392\" height=\"194\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>No need to get overly concerned about the data breach threat then, right? Wrong, very wrong indeed. The threat is very real, and the attack methodologies are varied and increasingly complex. Burying your head in the sand is not an option, despite only 52% of the organizations surveyed in that government report admitting to implementing the basic technical controls as recommended by the\u00a0<a class=\"ext\" href=\"https:\/\/www.cyberaware.gov.uk\/cyberessentials\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Essentials<\/a>\u00a0scheme.<\/p>\n<p>It doesn&#8217;t take a genius to realize that there remains a disconnect between the realities of the breach threat and the practicalities of defending against it. Managed service providers (MSPs) and other IT service providers must understand the risks of the business they are in, and how to best protect themselves and their clients against a potential breach.\u00a0 At the end of the day a ransomware outbreak or data breach will strain the relationship between the MSP and their client, so you need to focus on delivering r consistent, quality service and limiting the possibility of your customer leaving you.<\/p>\n<p>Remember that it&#8217;s not just client data that you have to worry about, it&#8217;s your own as well. You face the exact same breach threats as your customers at the end of the day. It&#8217;s what I like to call &#8216;eating your own dogfood&#8217;, also known as practicing what you preach!<\/p>\n<p>Here are four things you definitely need to think about:<\/p>\n<h3>1. Employ a risk management framework approach<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/risk.jpg\" alt=\"risk.jpg\" width=\"392\" height=\"194\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>This means you need to have a structured assessment or audit to enable risks, and their mitigation strategies, to be identified. Every risk should be considered and analysed, in turn this enables you to prioritize the mitigation required for each. In practical terms this means employing some kind of vulnerability scanning, which includes understanding what sensitive data is held and where. SolarWinds has the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/risk-intelligence\" target=\"_blank\" rel=\"noopener\">Risk Intelligence<\/a>\u00a0product, for example, that brings all of this information into a single dashboard. Most security experts would agree that a layered approach to breach defense is the way to go. This means ensuring you have the right firewalling in place along with intrusion detection systems (IDS), intrusion protection systems (IPS), and data loss prevention (DLP) systems.<\/p>\n<h3>2. You need to stay on top of your patch management game<\/h3>\n<p>Vulnerabilities turn into &#8216;in the wild&#8217; exploits very quickly indeed these days. Believe me, an attacker will be out there scanning for vulnerable systems and software within days (if not hours) of a patch becoming available. <a href=\"\/features\/patch-management-tool-for-msp\">N&#8209;able patch management solution<\/a> can help here as it can notify you about missing patches.<\/p>\n<h3>3. It\u2019s not just about the technology<\/h3>\n<p>While the technical side of data breach mitigation is, of course, vital to the security of your clients, it&#8217;s not the be all and end all of the security equation. Understanding the threat is just as important if you are ever going to get on top of the risk. This means taking a broader view of the threat landscape to ensure you are not front and center on the attack map. Don&#8217;t underestimate the insider threat. Plenty of breaches (as much as\u00a0<a class=\"ext\" href=\"https:\/\/www.scmagazineuk.com\/the-2017-verizon-breach-report-attacks-pervasive-but-defenders-have-options\/article\/653226\/\" target=\"_blank\" rel=\"noopener noreferrer\">25%<\/a>) are actually inside jobs. They don&#8217;t even have to be malicious\u2014indeed, many are the result of negligence or error. Which is why security awareness training is an essential part of any data breach mitigation plan. Ensure that your employees\u2014from shop floor to boardroom if you have one\u2014are aware of the dangers of social engineering\/phishing. Also ensure that those with control of the IT infrastructure are aware of the implications of slack access privilege controls.<\/p>\n<h3>4. Also remember to see the smaller picture<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/security.jpg\" alt=\"security.jpg\" width=\"390\" height=\"193\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>That sounds like the opposite of what good security is all about, right? Wrong again, sorry. Yes, you need to be able to lockdown your network and that of your clients, but you also need to be able to do this in the most granular of ways. With smartphones now being more like mini-laptops, especially when coupled to (often unknown to the business) cloud data stores, a lost or stolen one can mean a data breach right there on the spot. It may only be a mini-breach, but it can have mega-consequences if the lost data is of a sensitive nature. Remote locking of company devices, along with data wiping, is a minimum requirement for a strong security posture. That staff awareness training thing, with some backup from contractual accessible use policies, should also be in place.<\/p>\n<p>These will all make it harder for the bad guys to get into your network and exfiltrate data. It&#8217;s all about widening the window of opportunity to detect an attack before it becomes a breach, while simultaneously reducing the threat surface for the attacker. But what if the smelly stuff does hit the cooling device? That&#8217;s where your breach response plan kicks in.<\/p>\n<p>You do have a breach response plan, don&#8217;t you?<\/p>\n<h3>Protect your partnerships<\/h3>\n<p>Dealing with a breached client is never going to be easy, but how you communicate the issue is key to your ongoing relationship. Which means, in the shortest practical timeframe, you need to let them know what data has been compromised, how the breach occurred (if you know at this stage, be honest and say you are still investigating if this is the case), and what is being done to prevent it happening again. Don&#8217;t wait for a client to find out from a journalist or customer if you want your reputation to remain intact.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Davey has been writing about IT security for more than two decades, and is a three times winner of the BT Information Security Journalist of the Year title. An ex-hacker turned security consultant and journalist, Davey was given the prestigious &#8216;Enigma&#8217; award for his &#8216;lifetime contribution&#8217; to information security journalism in 2011.\u00a0\u00a0You can follow Davey on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/happygeek?lang=en-gb\" target=\"_blank\" rel=\"noopener noreferrer\">@happygeek<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5806","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MSP Data Breach 101: 4 things you need to know about data security - N-able<\/title>\n<meta name=\"description\" content=\"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSP Data Breach 101: 4 things you need to know about data security - N-able\" \/>\n<meta property=\"og:description\" content=\"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-18T22:44:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:55:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"MSP Data Breach 101: 4 things you need to know about data security\",\"datePublished\":\"2017-05-18T23:44:51+01:00\",\"dateModified\":\"2021-07-12T13:55:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\",\"name\":\"MSP Data Breach 101: 4 things you need to know about data security - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\",\"datePublished\":\"2017-05-18T23:44:51+01:00\",\"dateModified\":\"2021-07-12T13:55:18+00:00\",\"description\":\"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSP Data Breach 101: 4 things you need to know about data security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MSP Data Breach 101: 4 things you need to know about data security - N-able","description":"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security","og_locale":"it_IT","og_type":"article","og_title":"MSP Data Breach 101: 4 things you need to know about data security - N-able","og_description":"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.","og_url":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-05-18T22:44:51+00:00","article_modified_time":"2021-07-12T13:55:18+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Guest","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"MSP Data Breach 101: 4 things you need to know about data security","datePublished":"2017-05-18T23:44:51+01:00","dateModified":"2021-07-12T13:55:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg","articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security","url":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security","name":"MSP Data Breach 101: 4 things you need to know about data security - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg","datePublished":"2017-05-18T23:44:51+01:00","dateModified":"2021-07-12T13:55:18+00:00","description":"Security writer Davey Winder looks at four basic things MSPs need to understand about protecting their clients\u2019 networks.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/defending.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/msp-data-breach-101-4-things-you-need-know-about-data-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"MSP Data Breach 101: 4 things you need to know about data security"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5806"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5806\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}