{"id":66953,"date":"2025-05-22T11:16:07","date_gmt":"2025-05-22T10:16:07","guid":{"rendered":"https:\/\/www.n-able.com\/?p=66953"},"modified":"2025-05-22T11:16:07","modified_gmt":"2025-05-22T10:16:07","slug":"how-msps-can-overcome-customer-cost-objections-for-security-services","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services","title":{"rendered":"How MSPs Can Overcome Customer Cost Objections for Security Services"},"content":{"rendered":"<p>For many Managed Service Providers (MSPs), cybersecurity services represent a double-edged sword. On one hand, they are an essential, high-value offering that can differentiate an MSP in a crowded market. On the other, many Small and Medium-Sized Businesses (SMBs) hesitate when it comes to pricing, often underestimating the real costs of robust security.<\/p>\n<p>The challenge isn\u2019t just about setting the right price \u2013 it\u2019s about effectively <span><a href=\"https:\/\/www.n-able.com\/blog\/how-msps-can-communicate-the-value-of-cybersecurity-to-their-clients\" target=\"_blank\" rel=\"noopener\">communicating the value of cybersecurity<\/a><\/span> and justifying the cost to customers who may not fully understand the risks they face. This blog will explore why SMBs often push back on security costs, how MSPs can use cyber risk assessments to demonstrate value, and strategies to reposition security as an investment rather than an expense.<\/p>\n<p><strong><em>These insights are drawn from a recent podcast, <\/em><\/strong><span><a href=\"https:\/\/www.youtube.com\/watch?v=WnrOjMwhhVg\" target=\"_blank\" rel=\"noopener\"><strong><em>Selling Security: How MSPs Can Drive Cybersecurity Revenue and Protect Their Customers.<\/em><\/strong><\/a><\/span><\/p>\n<h2><strong>Why Small Businesses Underestimate the Cost of Cybersecurity<\/strong><\/h2>\n<p>The reluctance to invest in cybersecurity is often rooted in a lack of understanding rather than a refusal to pay. SMBs frequently hold misconceptions about cybersecurity, including:<\/p>\n<h3>1. &#8220;It Won\u2019t Happen to Us&#8221;<\/h3>\n<p>Many business owners still believe cyberattacks primarily target large enterprises, despite evidence showing that SMBs are actually more vulnerable. According to a 2023 Verizon Data Breach Investigations Report, 43% of cyberattacks target SMBs because they are perceived as easy prey due to weaker defenses.<\/p>\n<h3>2. &#8220;We Already Have Antivirus and a Firewall&#8221;<\/h3>\n<p>Many SMBs equate cybersecurity with traditional antivirus software and basic firewall protection, unaware that modern threats like ransomware, phishing, and insider threats <span><a href=\"https:\/\/www.n-able.com\/blog\/edr-vs-antivirus-three-reasons-to-step-up-your-game\" target=\"_blank\" rel=\"noopener\">require layered security approaches<\/a><\/span>.<\/p>\n<h3>3. &#8220;Cybersecurity is Too Expensive&#8221;<\/h3>\n<p>Business leaders often compare cybersecurity costs against IT maintenance or hardware upgrades, failing to grasp that cybersecurity is an ongoing necessity, not a one-time investment.<\/p>\n<h3>4. &#8220;We Can Handle It Ourselves&#8221;<\/h3>\n<p>Some SMBs rely on internal IT staff, believing they can manage security in-house. However, even large corporations with dedicated security teams often struggle against sophisticated cyber threats.<\/p>\n<p>The common thread in all these objections is an education gap. MSPs must bridge this gap by translating cybersecurity risks into business language that resonates with SMB leaders.<\/p>\n<h2><strong>How to Overcome Cost Objections: Risk Assessments and Business Impact Analysis<\/strong><\/h2>\n<h3>1. Conduct Cyber Risk Assessments<\/h3>\n<p>A cybersecurity risk assessment is one of the most powerful tools an MSP can use to justify pricing. These assessments provide hard data and evidence to show customers what\u2019s at stake.<\/p>\n<p>Key risk assessment strategies include:<\/p>\n<ul>\n<li>Dark Web Scanning: Show customers if their credentials have already been leaked.<\/li>\n<li>Phishing Simulations: Demonstrate how susceptible their employees are to social engineering.<\/li>\n<li>Endpoint Vulnerability Audits: Identify outdated software and unpatched security gaps.<\/li>\n<li>Backup &amp; Recovery Testing: Show how quickly (or slowly) their business can recover from an attack.<\/li>\n<\/ul>\n<p>By making the risks tangible, SMBs are more likely to accept the need for advanced cybersecurity services.<\/p>\n<h3><strong>2. Use Business Impact Analysis (BIA) to Demonstrate Financial Risk<\/strong><\/h3>\n<p>A Business Impact Analysis (BIA) helps MSPs quantify the potential financial damage of a cyberattack. Instead of focusing on technical threats, focus on business consequences:<\/p>\n<ul>\n<li>Downtime Costs: How much revenue would they lose if their operations were down for 24 hours?<\/li>\n<li>Compliance Penalties: What fines could they face for failing to protect customer data?<\/li>\n<li>Brand Reputation: How would a data breach impact customer trust and future business?<\/li>\n<\/ul>\n<p>By framing cybersecurity as a financial safeguard, SMBs are more likely to view it as an essential investment rather than an optional cost.<\/p>\n<h2><strong>Pricing Strategies: How to Position Cybersecurity as an Investment, Not an Expense<\/strong><\/h2>\n<h3>1. Bundle Security into Tiered Packages<\/h3>\n<p>One of the most effective ways to structure cybersecurity pricing is through standardized security bundles rather than \u00e0 la carte pricing. This aligns with the &#8220;Defend &amp; Prosper: Maximizing the Cybersecurity Opportunity&#8221; playbook, which emphasizes the importance of bundling to drive value and simplify customer decisions.<\/p>\n<ul>\n<li>Essentials Security Package: Covers basic protections like endpoint security, MFA, and DNS filtering.<\/li>\n<li>Advanced Security Package: Adds Managed Detection &amp; Response (MDR), dark web monitoring, and compliance tools.<\/li>\n<li>Premium Security Package: Includes full security orchestration, 24\/7 SOC monitoring, and SIEM integration.<\/li>\n<\/ul>\n<p>Why bundling works:<\/p>\n<ul>\n<li>Reduces Decision Fatigue: Customers don\u2019t have to choose individual services; they select a level of protection.<\/li>\n<li>Encourages Higher Spend: Tiered pricing psychologically encourages customers to choose mid-tier or top-tier packages.<\/li>\n<li>Provides Consistency: Standardized security stacks streamline service delivery and reduce support complexity.<\/li>\n<\/ul>\n<h3>2. Price Per User, Not Per Device<\/h3>\n<p>Many MSPs make the mistake of pricing security per device, but this dilutes the value proposition. Instead, price security per user, emphasizing that employees\u2014not just devices\u2014are the primary attack vector.<\/p>\n<h3>3. Offer a Cybersecurity SLA to Reinforce Value<\/h3>\n<p>A well-defined Cybersecurity Service Level Agreement (SLA) clarifies what\u2019s included and establishes clear expectations for response times and remediation. This helps shift the conversation away from pricing and toward business resilience.<\/p>\n<h3>4. Educate Customers Through Regular Security Reviews<\/h3>\n<p>Regular Quarterly Business Reviews (QBRs) or Monthly Security Reports keep cybersecurity top-of-mind. These touchpoints reinforce the value of an MSP\u2019s security services by showcasing real-world threats prevented, updates to compliance requirements, and new security enhancements.<\/p>\n<h2><strong>Positioning MSPs as Cybersecurity Authorities<\/strong><\/h2>\n<p>For MSPs, overcoming pricing objections isn\u2019t just about selling security\u2014it\u2019s about changing the conversation. Customers must see <span><a href=\"https:\/\/www.n-able.com\/blog\/building-a-resilient-business-why-cybersecurity-is-key-to-long-term-success\" target=\"_blank\" rel=\"noopener\">cybersecurity as a business continuity strategy<\/a><\/span>, not just an IT expense.<\/p>\n<p>Key Takeaways for MSPs:<\/p>\n<ul>\n<li>Educate SMBs on Real Cyber Risks \u2013 Use tangible evidence like risk assessments, phishing tests, and financial impact projections.<\/li>\n<li>Bundle Security Services \u2013 Present security as a comprehensive package, not a piecemeal add-on.<\/li>\n<li>Shift to Per-User Pricing \u2013 Focus on protecting employees, not just devices.<\/li>\n<li>Use Business Impact Analysis \u2013 Quantify downtime costs, reputational damage, and compliance risks.<\/li>\n<li>Demonstrate Continuous Value \u2013 Conduct regular security reviews to reinforce ROI.<\/li>\n<\/ul>\n<p>By implementing these strategies, MSPs can move beyond cost objections and position cybersecurity services as an indispensable investment in business resilience.<\/p>\n<h2><strong>Final Thoughts<\/strong><\/h2>\n<p>The cybersecurity pricing dilemma is a challenge all MSPs face, but it\u2019s also an opportunity. By educating customers, structuring pricing strategically, and demonstrating real business impact, MSPs can increase adoption, boost recurring revenue, and strengthen customer trust.<\/p>\n<p><strong>For a deeper dive into cybersecurity sales strategies, check out the Podcast <\/strong><span><a href=\"https:\/\/youtu.be\/WnrOjMwhhVg?si=M2v1mxS9jkr-SBLV\" target=\"_blank\" rel=\"noopener\"><strong>Selling Security: How MSPs Can Drive Cybersecurity Revenue and Protect Their Customers<\/strong><\/a><\/span><strong> on YouTube. This podcast episode provides real-world insights from industry experts on how to structure and sell cybersecurity effectively. You can also download my Selling Security Digital Playbook, <\/strong><span><a href=\"https:\/\/www.n-able.com\/resources\/selling-security-playbook\" target=\"_blank\" rel=\"noopener\"><strong>Defend &amp; Prosper: Maximizing the Cybersecurity Opportunity Security Sales<\/strong><\/a><\/span><strong>, designed to help MSPs build successful security programs.<\/strong><strong><span>\u00a0<\/span><\/strong><\/p>\n<p><strong>You can also listen to the podcast on the following streaming platforms: <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/beyond-the-horizon-future-focused-msp-insights\/id1747403359\" target=\"_blank\" rel=\"noopener\">Apple<\/a> | <a href=\"https:\/\/open.spotify.com\/show\/27hwam77sN1hauIZ9TS8bt\" target=\"_blank\" rel=\"noopener\">Spotify<\/a> | <a href=\"https:\/\/www.buzzsprout.com\/2364768\" target=\"_blank\" rel=\"noopener\">Buzzsprout<\/a><\/strong><\/p>\n<p><em>Stefanie Hammond is Head Sales and Marketing Nerd at N\u2011able. You can follow her on <\/em><a href=\"https:\/\/www.linkedin.com\/in\/stefanie-hammond\" target=\"_blank\" rel=\"noopener\"><em>LinkedIn<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.<\/p>\n","protected":false},"author":64,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-66953","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-sales-strategies"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How MSPs Can Overcome Customer Cost Objections for Security Services - N-able<\/title>\n<meta name=\"description\" content=\"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How MSPs Can Overcome Customer Cost Objections for Security Services - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-22T10:16:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/040225_BB_Cost-Objections_PD_Final_1200x628-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefanie Hammond\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Hammond\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\"},\"author\":{\"name\":\"Stefanie Hammond\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\"},\"headline\":\"How MSPs Can Overcome Customer Cost Objections for Security Services\",\"datePublished\":\"2025-05-22T11:16:07+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\",\"name\":\"How MSPs Can Overcome Customer Cost Objections for Security Services - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2025-05-22T11:16:07+01:00\",\"description\":\"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\",\"name\":\"Stefanie Hammond\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"caption\":\"Stefanie Hammond\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How MSPs Can Overcome Customer Cost Objections for Security Services - N-able","description":"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services","og_locale":"it_IT","og_type":"article","og_title":"How MSPs Can Overcome Customer Cost Objections for Security Services - N-able","og_description":"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.","og_url":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-05-22T10:16:07+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/05\/040225_BB_Cost-Objections_PD_Final_1200x628-scaled.jpg","type":"image\/jpeg"}],"author":"Stefanie Hammond","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Stefanie Hammond","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services"},"author":{"name":"Stefanie Hammond","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8"},"headline":"How MSPs Can Overcome Customer Cost Objections for Security Services","datePublished":"2025-05-22T11:16:07+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services"},"wordCount":1105,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services","url":"https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services","name":"How MSPs Can Overcome Customer Cost Objections for Security Services - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2025-05-22T11:16:07+01:00","description":"Learn how MSPs can overcome customer objections to cybersecurity costs by demonstrating value and positioning it as an investment.","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/how-msps-can-overcome-customer-cost-objections-for-security-services"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8","name":"Stefanie Hammond","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","caption":"Stefanie Hammond"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/66953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=66953"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/66953\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=66953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}