{"id":5119,"date":"2020-02-10T15:35:25","date_gmt":"2020-02-10T15:35:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5119"},"modified":"2021-04-01T15:36:57","modified_gmt":"2021-04-01T14:36:57","slug":"common-byod-challenges","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges","title":{"rendered":"Common BYOD Challenges"},"content":{"rendered":"<p>For many people in today\u2019s increasingly digital landscape, \u201cgoing to work\u201d has become synonymous with \u201cgoing to the living room.\u201d\u00a0<a class=\"ext\" href=\"https:\/\/www.flexjobs.com\/blog\/post\/flexjobs-gwa-report-remote-growth\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote work has grown a staggering 159%<\/a>\u00a0over the past 12 years. In the face of a global talent shortage, IT industry leaders have been forced to expand their talent pool to find qualified people with specialized skill sets, and sometimes those people are a country or two away. Luckily, many of today\u2019s jobs can be done remotely, and<a href=\"https:\/\/www.n-able.com\/blog\/moving-cloud-help-ensure-your-cloud-based-web-security\" target=\"_blank\" rel=\"noopener\">\u00a0cloud technologies<\/a>\u00a0make it possible for business teams to collaborate on projects from miles away without missing a beat.<\/p>\n<p>The rapid rise of remote work may not be possible without the<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/byod-software\">\u00a0Bring Your Own Device (BYOD)<\/a>\u00a0trend. In part to accommodate the increasing number of remote workers, many employers allow employees to use their personal digital devices\u2014namely smartphones, laptops, and tablets\u2014to access the company network. Despite the benefits of BYOD in the workplace, it\u2019s not without its faults. Here\u2019s what managed services providers (MSPs) need to know about the BYOD trend and how to manage the challenges that come with it.<\/p>\n<h3><b>What are the advantages of a BYOD environment?<\/b><\/h3>\n<p>Frankly, one of the reasons BYOD is so popular is because employees love it. There has been a recent paradigm shift away from working solely within the confines of an office, and BYOD is a big part of that. For instance, if you\u2019re too sick to manage your regular commute but not sick enough to warrant taking time off work, remote work is a good option. If you\u2019re more productive when you\u2019re free to move around and change your scenery, BYOD can accommodate you.<\/p>\n<p>Ultimately, BYOD fosters flexibility, which can in turn boost company morale and increase productivity. In fact, research shows that using portable devices for work\u00a0<a class=\"ext\" href=\"https:\/\/www.forbes.com\/sites\/lilachbullock\/2019\/01\/21\/the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future\/#3d6302591f30\" target=\"_blank\" rel=\"noopener noreferrer\">can save employees up to 58 minutes per day<\/a>, while increasing productivity by 34%.<\/p>\n<p>From an organizational standpoint, BYOD can also cut into an organization\u2019s overhead hardware costs by relieving some of the responsibility of paying for equipment and services. With BYOD, it\u2019s up to employees to maintain their own devices, which has the added benefit of granting the organization access to the latest technology.<\/p>\n<h3><b>What are the disadvantages of BYOD?<\/b><\/h3>\n<p>Even so, the BYOD trend also comes with its fair share of challenges, caveats, and concerns. Here are the top seven BYOD challenges MSPs should be aware of:<\/p>\n<ul>\n<li><b>BYOD challenge #1: a wide variety of security risks<\/b><br \/>\nBYOD security challenges and portable device security challenges may appear to be the same, but the former is much more serious because a company\u2019s sensitive information may be co-mingled with an employee\u2019s information. A portable device is typically associated with a device that is allowed to connect to the network, but isn\u2019t governed by the organization. When we consider that the user is typically the weakest link in endpoint security, trusting your employees to handle sensitive data on their\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\">personal devices<\/a>\u00a0can be extremely risky. Without strict regulations on BYOD devices, bad actors can easily use a compromised phone to gain access to your organization\u2019s network. In addition, confidential information can easily fall into the wrong hands if your employee\u2019s phone is lost or stolen. Unfortunately, these examples only scratch the surface of what can happen when employees don\u2019t exercise BYOD security best practices.<\/li>\n<li><b>BYOD challenge #2: BYOD compliance issues<\/b><br \/>\nCertain industries\u2014like healthcare for example\u2014have very strict laws about how information is accessed, used, and distributed. A company\u2019s compliance responsibilities extend to employees\u2019 personal devices used for work, even though they aren\u2019t part and parcel of the company, because they still come into contact with the company\u2019s data. The inherent security risks associated with BYOD and the increased likelihood that employees might share confidential information with someone outside of the corporate network make compliance hard to enforce.<\/li>\n<li><b>BYOD challenge #3: issues with data removal and retrieval<\/b><br \/>\nLet\u2019s imagine that an employee is fired. If they previously accessed or stored sensitive information on their personal devices, they might take that information with them as they walk out the door. To reduce security risks, the employer must race to remove company data from the ex-employee\u2019s laptop or phone. To prevent this mad dash, all employees should sign an agreement regarding the use of company data upon employment\u2014but there are still no guarantees they\u2019ll keep up their end of the bargain.<\/li>\n<li><b>BYOD challenge #4: loss of control over hardware<\/b><br \/>\nIt\u2019s true that BYOD reduces hardware costs and takes some of the burden away from IT teams when it comes to maintaining employees\u2019 devices\u2014but that advantage comes with one very large disadvantage. Allowing employees to use their personal devices means that the IT department can\u2019t control what apps are used, what files are downloaded, how often vulnerabilities are patched, or what security measures are taken on people\u2019s personal devices. It\u2019s much harder to prevent and mitigate data breaches when devices are not under IT department jurisdiction.<\/li>\n<li><b>BYOD challenge #5: vulnerability to malware<\/b><br \/>\nCybersecurity experts agree that\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/6-most-effective-tactics-to-protect-your-business-from-malware-in-2020\" target=\"_blank\" rel=\"noopener\">malware attacks\u00a0are one of the fastest-growing cybersecurity threats<\/a>\u00a0out there. It\u2019s hard enough for businesses with full-fledged IT departments to stay on top of these viruses, but it\u2019s even more difficult in a BYOD environment. Personal devices are more susceptible to malware because security measures for them aren\u2019t as strict, particularly devices that are \u201cjail-broken\u201d or feature additional software the device wasn\u2019t built for. One well-timed malware attack could instantly jeopardize the confidentiality of sensitive data.<\/li>\n<li><b>BYOD challenge #6: decreased productivity<\/b><br \/>\nThis challenge is somewhat contradictory\u2014as mentioned earlier, many argue that the BYOD trend increases productivity because portable devices mean that employees can work more flexibly. However, workplace distractions still exist. On company-provided computers, system administrators can block specific websites or apps to keep employees focused, but the same cannot be said for personal devices. Although BYOD may enable productivity in some ways, it\u2019s also very possible for it to introduce new interruptions to a work environment.<\/li>\n<li><b>BYOD challenge #7: inefficient password management<\/b><br \/>\nPasswords are an organization\u2019s first line of defense against data breaches and other cybersecurity threats. BYOD makes it harder to ensure that employees are using strong passwords, and many don\u2019t change their passwords as frequently as they should. Small BYOD challenges like this can snowball into large network security concerns.<\/li>\n<\/ul>\n<p>Despite all the aforementioned BYOD challenges, it\u2019s difficult for organizations to truly eliminate BYOD in today\u2019s digital age\u2014especially while remaining competitive and attracting top talent. As an MSP, part of your job is supporting the needs of your customers and enabling more secure BYOD policies wherever possible. The key is to be smart about how you implement new customer BYOD policies, and having the right tools at your disposal goes a long way in managing BYOD challenges.<\/p>\n<p><a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u2122 <\/sup>\u00a0Passportal<\/a>\u00a0is an important addition to any BYOD security policy. Passportal is a cloud-based,\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/automated-password-reset-tool\" target=\"_blank\" rel=\"noopener noreferrer\">automated password management solution<\/a>\u00a0that helps MSPs regulate password access to their customers\u2019 devices, networks, applications, and confidential files. This tool is built specifically for MSPs, meaning you\u2019ll get everything necessary for gapless password management from one intuitive tool.<\/p>\n<p>Nip BYOD compliance issues in the bud with the Passportal reporting and auditing features, plus a systematic and simplified client documentation process. Password change automation makes it easier for MSPs to change passwords across an entire fleet of devices, no matter where they are. For an additional layer of security, passwords and credentials are stored in an encrypted vault behind\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/two-factor-authentication\" target=\"_blank\" rel=\"noopener\">multifactor authentication<\/a>\u00a0and role-based permissions.<\/p>\n<p>&nbsp;<\/p>\n<p><b>For more information on BYOD policies and implementation,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/search?keywords=BYOD\">read through our related blog posts<\/a>.\u00a0<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5119","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 BYOD Challenges to Know When Implementing BYOD Policies - N-able<\/title>\n<meta name=\"description\" content=\"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 BYOD Challenges to Know When Implementing BYOD Policies - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T15:35:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-01T14:36:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Common BYOD Challenges\",\"datePublished\":\"2020-02-10T15:35:25+00:00\",\"dateModified\":\"2021-04-01T14:36:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\"},\"wordCount\":1286,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\",\"name\":\"7 BYOD Challenges to Know When Implementing BYOD Policies - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-02-10T15:35:25+00:00\",\"dateModified\":\"2021-04-01T14:36:57+00:00\",\"description\":\"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common BYOD Challenges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 BYOD Challenges to Know When Implementing BYOD Policies - N-able","description":"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges","og_locale":"pt_BR","og_type":"article","og_title":"7 BYOD Challenges to Know When Implementing BYOD Policies - N-able","og_description":"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-02-10T15:35:25+00:00","article_modified_time":"2021-04-01T14:36:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Common BYOD Challenges","datePublished":"2020-02-10T15:35:25+00:00","dateModified":"2021-04-01T14:36:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges"},"wordCount":1286,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges","url":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges","name":"7 BYOD Challenges to Know When Implementing BYOD Policies - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-02-10T15:35:25+00:00","dateModified":"2021-04-01T14:36:57+00:00","description":"Learn about common BYOD challenges that you could face when implementing new BYOD policies in your organization.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/common-byod-challenges#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Common BYOD Challenges"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5119"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5119\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}