{"id":41552,"date":"2020-04-28T16:37:14","date_gmt":"2020-04-28T15:37:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=41552"},"modified":"2023-03-22T09:05:04","modified_gmt":"2023-03-22T09:05:04","slug":"best-practices-storing-company-passwords","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords","title":{"rendered":"5 Best Practices for Storing Company Passwords"},"content":{"rendered":"<p class=\"p4\"><span class=\"s1\">As a managed services provider (MSP), you likely spend a good amount of time thinking about your customers\u2019 password security. As you are often responsible for helping <a href=\"https:\/\/www.n-able.com\/blog\/password-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">manage passwords<\/span><\/a> for a wide range of other businesses, it could become easy to let your own company\u2019s password security fall to the wayside\u2014but that would be a mistake. Protecting your own passwords is critical not only for protecting your own assets, but also for preventing bad actors from gaining access to your customers\u2019 assets.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">How do companies store passwords?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">The unfortunate reality is that many people today still use incredibly insecure methods to safeguard their passwords. Many people simply store passwords in the places most easily accessible to them, such as on documents or notes applications on their phones or laptops. Some people even write their passwords on sticky notes and leave them near their desktop. These methods are practically asking for your accounts and business to be exposed to data theft and cyberattacks. While MSP technicians tend to know better in regards to password storage, even the most technically savvy users might be known to resort to the most convenient rather than the most secure methods from time to time.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Other companies may use a master document or spreadsheet where they keep all passwords, mistakenly believing this is more secure than sticky notes. The\u00a0<\/span><span class=\"s4\">issue with using spreadsheets<\/span><span class=\"s1\">\u00a0or other document types is they are simply unsecure. If bad actors gain access, it\u2019s all too easy for them to download and copy spreadsheet files. A lack of audit capabilities also means it will be hard for you to trace a breach or prove compliance.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Additionally, spreadsheets are highly subject to human error. It is all too easy for a password to be changed but not updated in the file. This can lock you out of critical programs or platforms, reducing productivity and wasting time.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">MSPs that value password security are advised to make use of password management tools, which can dramatically improve employee productivity while keeping passwords safe and secure. Many of these tools feature granular access control, which allows you to define who in your team has access to which settings and system components.<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">How important is it to store passwords securely?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Secure password storage is important for a number of reasons, the most notable of which is it allows your MSP to employ strong passwords without the pressure to remember them. The best passwords are long, complex, and generated arbitrarily. This makes them very difficult to remember, which means hackers are less likely to succeed in guessing them.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">If you leave it up to your team members to memorize them, however, you may end up resorting to frequent password resets\u2014which eventually tends to result in weaker passwords over the course of multiple resets. If your password storage is secure, it offers you the ability to generate complex and random passwords for all your platforms and accounts without fear of forgetting or exposing yourself to cyberthreats.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">In order to maximize the effectiveness of any password management tool you implement, here are five best practices for storing company passwords.<b>\u00a0<\/b><\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">1. ESTABLISH A SINGLE POINT OF CONTACT<\/span><\/h3>\n<p class=\"p4\"><span class=\"s1\">To optimize your MSP\u2019s responsiveness to password protection and data security issues, it is best practice to establish an official point of contact within your organization. This individual will be responsible for answering any questions other employees might have, disseminating password protection policies throughout the company, and escalating any password breaches appropriately. Having a designated contact for password security can save precious time during a breach and streamline your response.<\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">2. KEEP EMPLOYEES INFORMED AND AWARE<\/span><\/h3>\n<p class=\"p4\"><span class=\"s1\">One of the most important best practices for improving password security is making certain your team is aware of how much of a threat poor password practices can pose to your MSP\u2019s data. Companies should consider disseminating information during initial training with regular reminders in meetings, or in the form of a guide distributed to all employees. This should include making staff aware of the risks associated with using a poor password, like data theft and other cyberattacks.<\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">3.\u00a0DEFINE AND ENFORCE PASSWORD POLICIES\u00a0<\/span><\/h3>\n<p class=\"p4\"><span class=\"s1\">What does a strong password look like? First, a password should be complex and at least eight characters in length. Special characters, like apostrophes and brackets, can help add complexity and make it harder for hackers to guess passwords. Second, passwords are strongest when generated randomly. This means you should avoid using names, locations, or dates that might be easily guessed.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Remember there is a lot of personal and company information circulating online, whether you realize it or not\u2014which is why passwords with dates and names can be so easily guessed by hackers. Last, ensure different passwords are used for each platform or account in use, and that passwords are changed immediately if you suspect your details may have been exposed or you\u2019ve been alerted of suspicious activity on an account.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Defining\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-build-password-policies-for-your-customers\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">password policies<\/span><\/a>\u00a0is a good start, but properly enforcing them is what will really take your security to the next level. Unfortunately, many people know the implications of poor password security but do not implement the recommended password policies. MSPs can enforce their password policies by adjusting their password settings via a password manager to monitor certain requirements. For example, MSPs should use their tool to ensure that, at minimum, passwords are over eight characters in length and include numbers, uppercase letters, and special characters.\u00a0\u00a0<\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">4. DEFINE POLICIES FOR CHANGING PASSWORDS<\/span><\/h3>\n<p class=\"p4\"><span class=\"s1\">Even the most robust passwords must be changed from time to time. However, with the release of the new\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/nist-password-standards2\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">NIST guidelines<\/span><\/a>\u00a0at the end of last year, it\u2019s become more clear that mandating regular password changes can actually have an adverse effect on password security.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">It is much more important for passwords to be changed when employees leave the company, to prevent them from accessing data from outside the organization. As soon as an employee leaves, their passwords should be changed immediately across all platforms and accounts they had access to. To ensure things like this don\u2019t slip through the cracks, employees should be made aware of the company policy on changing passwords\u2014and a password manager can help execute on these changes.<\/span><\/p>\n<h3 class=\"p6\"><span class=\"s1\">6. BOOST PRODUCTIVITY WITH A PASSWORD MANAGEMENT TOOL<\/span><\/h3>\n<p class=\"p4\"><span class=\"s1\">One of the main reasons companies fail to implement appropriate password protection and storage policies is because doing so can decrease productivity. The additional meetings, trainings, updates, and even the need to remember multiple complex passwords can use up a significant amount of time. Ensuring productivity is not affected will go a long way in encouraging employees to follow password best practices. To prevent productivity from being impacted by your\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/password-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">password management strategy<\/span><\/a>, consider using a secure password manager that can store all your passwords in one place.<\/span><\/p>\n<p class=\"p4\"><span class=\"s4\">Documentation management\u00a0<\/span><span class=\"s1\">tools and password managers can streamline your processes by storing company passwords in a centralized location, with just one master password required in order to obtain access. This will also save time otherwise spent retrieving\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/forgotten-passwords-bane-admins-existence\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">forgotten passwords<\/span><\/a>.\u00a0<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">The best tool for storing company passwords<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Choosing between the many password and\u00a0<\/span><span class=\"s4\">IT document management tools<\/span><span class=\"s1\">\u00a0on the market can seem like an overwhelming task. If you\u2019re looking for a solution specifically designed for MSPs, however<a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">, N&#8209;able<\/span><span class=\"s6\"><sup>\u00ae<\/sup><\/span><span class=\"s3\">\u00a0Passportal<\/span><\/a> is the clear choice. This tool was designed specifically for MSPs and can help technicians get rapid access to the privileged data needed to support their customers.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Passportal is a highly advanced\u00a0<\/span><span class=\"s4\">password management tool<\/span><span class=\"s1\">\u00a0that uses military grade password data security to keep your MSP secure. All Passportal security features are tested and audited by some of the leading security assessment firms in the world, ensuring you receive uncompromised security. Passportal also includes granular access control, which lets you choose which functions can be accessed by each user. Granular data access assignments can be applied at numerous levels, such as subfolders, clients, and individual passwords.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">For busy MSPs, a tool like Passportal can help ensure you\u2019re providing top-notch password security\u2014both for your customers and within your own organization. With a tool built with MSPs in mind, applying these five best practices has never been easier.<\/span><\/p>\n<p class=\"p7\"><strong><span class=\"s2\">To learn more,\u00a0<a href=\"https:\/\/www.n-able.com\/products\/passportal\/demo\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">access a demo of Passportal today.<\/span><\/a><\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here&#8217;s five best practices for storing passwords.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-41552","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Best Practices for Storing Company Passwords - N-able<\/title>\n<meta name=\"description\" content=\"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here&#039;s five best practices for storing passwords.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Best Practices for Storing Company Passwords - N-able\" \/>\n<meta property=\"og:description\" content=\"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here&#039;s five best practices for storing passwords.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-28T15:37:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T09:05:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-7.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"5 Best Practices for Storing Company Passwords\",\"datePublished\":\"2020-04-28T16:37:14+01:00\",\"dateModified\":\"2023-03-22T09:05:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\"},\"wordCount\":1374,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\",\"name\":\"5 Best Practices for Storing Company Passwords - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-04-28T16:37:14+01:00\",\"dateModified\":\"2023-03-22T09:05:04+00:00\",\"description\":\"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here's five best practices for storing passwords.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Best Practices for Storing Company Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Best Practices for Storing Company Passwords - N-able","description":"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here's five best practices for storing passwords.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords","og_locale":"pt_BR","og_type":"article","og_title":"5 Best Practices for Storing Company Passwords - N-able","og_description":"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here's five best practices for storing passwords.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-04-28T15:37:14+00:00","article_modified_time":"2023-03-22T09:05:04+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-7.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/02\/Blog-7.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"5 Best Practices for Storing Company Passwords","datePublished":"2020-04-28T16:37:14+01:00","dateModified":"2023-03-22T09:05:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords"},"wordCount":1374,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords","url":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords","name":"5 Best Practices for Storing Company Passwords - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-04-28T16:37:14+01:00","dateModified":"2023-03-22T09:05:04+00:00","description":"MSPs: Protecting your passwords helps protect your own assets, and your customers\u2019 assets. Here's five best practices for storing passwords.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/best-practices-storing-company-passwords#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"5 Best Practices for Storing Company Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/41552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=41552"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/41552\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=41552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}