{"id":34800,"date":"2022-06-21T13:25:22","date_gmt":"2022-06-21T12:25:22","guid":{"rendered":"https:\/\/www.n-able.com\/?p=34800"},"modified":"2022-09-02T13:32:59","modified_gmt":"2022-09-02T12:32:59","slug":"are-macs-more-secure","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure","title":{"rendered":"Macs and malware, part 2: Are Macs more secure?"},"content":{"rendered":"<p class=\"p3\">Are Macs more secure? If that\u2019s not the very definition of a clickbait headline, I don\u2019t know what is.<\/p>\n<p class=\"p3\"><i>Spoiler warning: While I have opinions, I\u2019m not a security expert with multiple certifications or years of experience in the field. So, I won\u2019t take sides as to which operating system is the most secure.\u00a0<\/i><\/p>\n<p class=\"p3\">The first follow-up question you should ask, dear reader, is, \u201cMore secure than <i>what<\/i>?\u201d Certainly, modern macOS is more secure than previous generations of OS X. You would have to roll back the clock to a time before Macs could connect to the internet to find one more resistant to remote exploits. Data loss was a concern, though, since those early compact Macs had integrated handles. If your physical security wasn\u2019t sufficient, all your work could literally walk out the door. That is, if you had one of the fancy Macs with a hard drive. Otherwise, all of your documents were safely tucked away on floppies.<\/p>\n<p class=\"p3\">But I digress. My point in writing this post is not to indulge my nostalgia for computing in that simpler era. At least not my only point.<\/p>\n<h2 class=\"p4\">Security Lasagna<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34826 size-full\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg\" alt=\"\" width=\"275\" height=\"230\" \/><\/p>\n<p class=\"p3\">The best approach to security, regardless of the platform you\u2019re securing, is <a href=\"https:\/\/www.n-able.com\/resources\/n-able-rmm-layered-security-for-it-departments?promo=blog\" target=\"_blank\" rel=\"noopener\">layered security<\/a>. As you can see, the N&#8209;able example <a href=\"https:\/\/www.n-able.com\/solutions\/security?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">security model<\/span><\/a> consists of many layers, like an onion. And, like an onion, when someone cuts through those layers, it will bring tears to your eyes.<\/p>\n<p class=\"p3\">Most of the tools I wrote about in <a href=\"https:\/\/www.n-able.com\/blog\/the-myth-of-the-missing-mac-malware-part-1\" target=\"_blank\" rel=\"noopener\">part 1 of this series<\/a> exist at the center of the model: the device and applications layers. Which makes sense, as those protections are built into Apple\u2019s hardware and operating systems. It\u2019s those outer layers, beyond the individual user\u2019s control, where most vulnerabilities reside.<\/p>\n<p class=\"p3\">You will likely be familiar with the common types of threats that affect computers today: adware, ransomware, spyware, and bots. The significant distinctions between them can be derived from the attacker\u2019s preferred method of making an illicit profit. With ransomware, you pay them directly. They could instead slurp up and sell your information or sell access to your computer to other attackers to use in their attacks. Regardless of the \u201cbusiness model\u201d, all malware has one thing in common: the attacker needs to get <i>your<\/i> computer to run <i>their<\/i> software.<\/p>\n<p class=\"p3\">To be fair, Macs are at a slight advantage in this respect: a malicious application written for Windows just won\u2019t run on a Mac. And with a market share of about 10% (depending on whose numbers you go by) it\u2019s even difficult to get some legitimate software vendors to provide Mac versions of their apps. As a smaller potential target, there\u2019s less incentive to write Mac-specific malware.<\/p>\n<p class=\"p3\">But<span class=\"s3\">\u2014<\/span>like I keep telling people<span class=\"s3\">\u2014<\/span>Mac malware exists, so it\u2019s part of the Mac admin\u2019s job to be ever vigilant.<\/p>\n<p class=\"p3\">As an MSP or IT pro, securing your customers\u2019 data from threats at each layer boils down to three essential functions. First, prevent an attacker or their software from gaining access. Second, alert the admin and user if their device does get breached. And finally, remove any traces from the affected machines, or at least quarantine the infection so it doesn\u2019t spread. Or, \u201cProtect. Detect. Disinfect.\u201d<\/p>\n<p class=\"p3\">I\u2019ll start with \u201cprotect\u201d.<\/p>\n<h2 class=\"p4\">What\u2019s our vector, Victor?<\/h2>\n<p class=\"p3\">One of the scarier terms in the modern IT vocabulary is \u201cattack vector\u201d. In this case, scary is good, because the visceral fight-or-flight response it evokes reminds you that you\u2019re a target, or at least your data is. An attack vector is the path (vector) that an attacker uses to get to you. Any gaps in your security onion are potential vectors for malware to ooze in.<\/p>\n<p class=\"p3\">The simplest method of delivery, and therefore the most common, is email. Mac or Windows user, everyone gets email. Everyone gets spam (even John Dvorak). Everyone gets scams, phishing links, and infected attachments. Aside from the aforementioned Windows executables that won\u2019t run, Macs have no inherent advantage here. Even an all-Mac business needs to invest in good <a href=\"https:\/\/www.n-able.com\/products\/mail-assure?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">email filtering<\/span><\/a>.<\/p>\n<p class=\"p3\">More sophisticated, and more difficult for the average user to detect than phishing (<i>e.g. an email with grammatical and spelling errors with a suspicious attachment<\/i>), are so called \u201cdrive-by\u201d attacks. You follow a dodgy link, or just visit one of your bookmarked websites, and an ad or script embedded on the site squeezes through a vulnerability in your web browser to infect your machine. Often, the target is the browser itself, which then opens the doors to further unwanted guests. All the major web browsers, and quite a few minor ones, have Mac versions. Most, if not all of them, have been vulnerable to published exploits in the past. This is where a <a href=\"https:\/\/www.n-able.com\/products\/dns-filtering?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">DNS filter<\/span><\/a> is particularly useful, as it will prevent the devices on your network (Mac, PC, or mobile) from connecting to the sites that host the source of the infection in the first place.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/p>\n<p class=\"p3\">It\u2019s 2022 (right?), and RDP is still a popular and viable attack vector for Windows PCs connected to the internet. Remote Desktop Protocol, advertising a machine\u2019s availability on the common port 3389, is such low-hanging fruit for the bad guys that there are search engines (that I will not link to) dedicated to RDP-enabled endpoints. Seriously, turn that off. RDP is generally a non-starter on Macs, but there are other convenient ways to offer up remote control of your Mac. With employees and clients all over the map, you can\u2019t simply block remote access outright, unfortunately. But it can be locked down by tweaking firewall rules to limit connections to trusted networks and turning all the security features of your remote app to 11.<\/p>\n<p class=\"p3\">Last, and most dangerous of all the attack vectors, is social engineering. No amount of technology can fix people. The best you can do is make it harder for your users to do na\u00efve things like allowing a stranger on the phone to walk them through downloading and installing remote desktop software to fix \u201cWindows error messages\u201d. Personally, I enjoy wasting the time of these scammers when I can, and I have yet to find one that wasn\u2019t stymied by the fact I was using a Mac.<\/p>\n<h2 class=\"p4\">Protect. Detect. Disinfect.<\/h2>\n<p class=\"p6\">Once something has made its way past your defenses, all is not lost as long as you can catch malware before it can do any damage. A signature-based antivirus or, better yet, a <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">behavior-based EDR<\/span><\/a>, can quarantine and remove the nasty buggers. Just be sure to keep it updated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the second part of a series looking at Macs and Malware, this blog investigates layered Mac security.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-34800","post","type-post","status-publish","format-standard","hentry","topic-apple","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are Macs More Secure? - N-able<\/title>\n<meta name=\"description\" content=\"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Macs More Secure? - N-able\" \/>\n<meta property=\"og:description\" content=\"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-21T12:25:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-02T12:32:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V2_ss.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2501\" \/>\n\t<meta property=\"og:image:height\" content=\"1310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V2_ss.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Macs and malware, part 2: Are Macs more secure?\",\"datePublished\":\"2022-06-21T13:25:22+01:00\",\"dateModified\":\"2022-09-02T12:32:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg\",\"articleSection\":[\"Head Nerds\",\"Mac Support\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\",\"name\":\"Are Macs More Secure? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg\",\"datePublished\":\"2022-06-21T13:25:22+01:00\",\"dateModified\":\"2022-09-02T12:32:59+00:00\",\"description\":\"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mac Support\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/mac-support\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Macs and malware, part 2: Are Macs more secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are Macs More Secure? - N-able","description":"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure","og_locale":"pt_BR","og_type":"article","og_title":"Are Macs More Secure? - N-able","og_description":"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-06-21T12:25:22+00:00","article_modified_time":"2022-09-02T12:32:59+00:00","og_image":[{"width":2501,"height":1310,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V2_ss.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220622_Blogbanner_Headnerds_socials_V2_ss.png","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Macs and malware, part 2: Are Macs more secure?","datePublished":"2022-06-21T13:25:22+01:00","dateModified":"2022-09-02T12:32:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure"},"wordCount":1105,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg","articleSection":["Head Nerds","Mac Support"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure","url":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure","name":"Are Macs More Secure? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg","datePublished":"2022-06-21T13:25:22+01:00","dateModified":"2022-09-02T12:32:59+00:00","description":"In the second part of our series on Macs and Malware, we challenge the myth that Macs are more secure and looks at layered Mac security.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/graph.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/are-macs-more-secure#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mac Support","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/mac-support"},{"@type":"ListItem","position":2,"name":"Macs and malware, part 2: Are Macs more secure?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/34800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=34800"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/34800\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=34800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}