{"id":6117,"date":"2015-10-21T14:35:08","date_gmt":"2015-10-21T13:35:08","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6117"},"modified":"2021-04-09T16:57:24","modified_gmt":"2021-04-09T15:57:24","slug":"five-tips-for-creating-a-meaningful-security-awareness-training-program","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program","title":{"rendered":"Security Awareness Training Tips"},"content":{"rendered":"<p>There&#8217;s a big difference between having a cybersecurity awareness training program, and having one that actually makes a difference to the security positioning of an organisation. So how can you ensure that security awareness in the workplace becomes a reality for your end users? The answer that gets thrown around all too often \u2013 by those who don&#8217;t actually have to get hands-on with implementation \u2013 is to \u201cmake security awareness part of the DNA of the business.\u201d Truth be told, that isn&#8217;t a methodology but rather a destination; what you need to be doing as a managed service provider (MSP) is not only build the road that leads there, but also ensure it is adequately sign posted.<\/p>\n<p>With that in mind, here are five things to remember when crafting a cybersecurity awareness training course:<\/p>\n<p><strong>Make it personal<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"size-medium wp-image-5604 alignleft\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2015\/10\/shutterstock_174128882-350x233.jpg\" alt=\"shutterstock_174128882\" width=\"350\" height=\"233\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Sorry to burst your bubble, but employees tend to care less about the business (at a technical level) than you might think. This is one of the reasons that cybersecurity awareness in the workplace isn&#8217;t, on average, as good as it should be. The really simple way to combat this is to make your awareness training personal. By which I mean that it should provide the kind of advice that an employee can take home with them, and apply out of the workplace to help secure their personal data.<\/p>\n<p>In doing so, you will find that it quickly becomes second nature to apply the same skills in the workplace. The worst thing that you can do is make security awareness training a boring and non-personal lecture. I&#8217;m not saying it has to be fun, fun, fun all the way but it does have to be relevant to the individual as well as to the business they work at.<\/p>\n<p><strong>Get up close and \u2026 personal<\/strong><br \/>\nOne of the ways of making awareness training more personal is to make it less remote and clinical. Online learning tools should obviously play their part in any security awareness training program that includes &#8216;cyber&#8217; in the remit, but &#8216;part&#8217; is not the same as &#8216;whole&#8217; and you need to remember this.<\/p>\n<p>The best security training, the sort that leaves a lasting impression and actually instills the kind of security awareness in the workplace that you\u2019re aiming for, comes from face-to-face sessions. Only by asking questions, and getting considered answers from someone who has done their homework and understands the issues, will employees actually become properly &#8216;aware&#8217; of risk and how to mitigate it rather than the much less useful (about as useful as a chocolate teapot, in fact) act of just being &#8216;notified&#8217; about risk.<\/p>\n<p>So, for sure, include interactive phishing simulations to teach employees about how to spot the signs of social engineering in action; but follow this up with one-to-one (or group) sessions where their questions can be answered and mitigating procedures discussed.<\/p>\n<p><strong>Make it clear<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"alignright wp-image-5605 size-medium\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2015\/10\/shutterstock_164665187-350x189.jpg\" alt=\"shutterstock_164665187\" width=\"350\" height=\"189\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Clarity is everything, so don&#8217;t beat about the bush when creating a cybersecurity awareness training program. Only by ensuring that the employees taking the course fully understand why policies and procedures are in place, what the consequences to the business and to them personally are of not following those procedures, and clearly communicating the joint responsibility nature of security will your client\u2019s security positioning be strengthened.<\/p>\n<p>In order to get this clarity within the course itself, you have to understand exactly what is being taught in the first place. That may sound obvious, but you&#8217;d be surprised how many security awareness training programs are templated and ill-researched. The best ones rely upon you knowing the client, the client&#8217;s business and the security threats that can impact upon them the most.<\/p>\n<p>This isn&#8217;t to say that you can&#8217;t have a basic template structure, but you do need to flesh this out with relevant and researched content rather than cut and paste stuff from a customer service-like script. It&#8217;s all about engagement, and that starts with you engaging with the subject matter.<\/p>\n<p><strong>Make it dynamic<\/strong><br \/>\nThe security landscape is constantly changing, which means that security awareness training needs to be dynamic in order to keep up. This doesn&#8217;t mean that the whole thing needs to be rewritten every six months, but it does mean that the &#8216;researched and relevant&#8217; point from the previous tip needs to be carried forward within regular updates.<\/p>\n<p>It doesn&#8217;t need to be extensive, nor does it need to reinvent the wheel in terms of getting everyone back in the classroom; email is your friend here, and those updates can take the form of scheduled mailouts. In order to ensure they are read it&#8217;s a good idea to mandate a &#8216;seen by, on, any questions&#8217; type response. At the end of the day you have to bear in mind that the most successful security awareness training methodology will be the one that understands there is no completion date, and no structured timeline, but instead looks at it as an ongoing development of a culture of security within your client&#8217;s organisation.<\/p>\n<p><strong>Make it positive<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"alignleft wp-image-5603 size-medium\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2015\/10\/shutterstock_149987258-350x350.jpg\" alt=\"GR Julio 26 PENDIENTE 395\" width=\"350\" height=\"350\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Perhaps the single most important thing to bear in mind when tasked with creating a program to improve security awareness in the workplace is the power of positivity. By which I mean that it&#8217;s way better to lay off the &#8216;Thou Shalt Not&#8217; statements and focus instead on getting things done in a secure manner that benefits everyone. Of course, there are going to be a few &#8216;policy dictates you must not&#8217; rules in there but they should be in the minority and only used when absolutely necessary.<\/p>\n<p>By way of an example, think of the Bring Your Own Device (BYOD) debate. The temptation may be to dictate within such an awareness course that personal devices must not be used for work purposes, but it&#8217;s much more effective to illustrate the risks of doing so and then explain how such devices can be used in a secure fashion that mitigates the risk.<\/p>\n<p>Although these are obviously just a starting point. Where you end up is, ultimately, down to you. The main thing is to understand that common knowledge is the key to instilling common sense in the workforce; without that knowledge they cannot act safely upon it. Much as I hate to say so, it really is all about aiming at the endpoint of changing the security culture at an organisation for the better, to make security part of the DNA\u2026 dammit!<\/p>\n<p>By Davey Winder<\/p>\n<hr \/>\n<p class=\"xs-margin-bottom-0 text-align-center\">With data breach increasingly likely to be caused by insiders, find out how to make your approach to security more proactive\u2026 DONWLOAD our free eBook.<\/p>\n<article>\n<h5 class=\"h5\"><a href=\"https:\/\/www.solarwindsmsp.com\/resources\/wp-10-steps-proactive-security?promo=blog\">10 Steps to Proactive Security<\/a><\/h5>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\" alt=\"download the ebook\" width=\"274\" height=\"137\" \/><\/p>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6117","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Awareness Training Tips - N-able<\/title>\n<meta name=\"description\" content=\"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Awareness Training Tips - N-able\" \/>\n<meta property=\"og:description\" content=\"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-21T13:35:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T15:57:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Security Awareness Training Tips\",\"datePublished\":\"2015-10-21T14:35:08+01:00\",\"dateModified\":\"2021-04-09T15:57:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\",\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\",\"name\":\"Security Awareness Training Tips - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\",\"datePublished\":\"2015-10-21T14:35:08+01:00\",\"dateModified\":\"2021-04-09T15:57:24+00:00\",\"description\":\"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage\",\"url\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\",\"contentUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Awareness Training Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Awareness Training Tips - N-able","description":"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program","og_locale":"it_IT","og_type":"article","og_title":"Security Awareness Training Tips - N-able","og_description":"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.","og_url":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2015-10-21T13:35:08+00:00","article_modified_time":"2021-04-09T15:57:24+00:00","og_image":[{"url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Security Awareness Training Tips","datePublished":"2015-10-21T14:35:08+01:00","dateModified":"2021-04-09T15:57:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program"},"wordCount":1120,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png","articleSection":["MSP Business"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program","url":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program","name":"Security Awareness Training Tips - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png","datePublished":"2015-10-21T14:35:08+01:00","dateModified":"2021-04-09T15:57:24+00:00","description":"As security becomes more important in the lives of MSPs, Davey Winder outlines how to deliver the perfect security awareness training program.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#primaryimage","url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png","contentUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/covers\/SW-MSP_10-Steps-Security_WP_WebsiteBanner.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/five-tips-for-creating-a-meaningful-security-awareness-training-program#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/it\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Security Awareness Training Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6117"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}