{"id":5290,"date":"2019-12-31T18:37:05","date_gmt":"2019-12-31T18:37:05","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5290"},"modified":"2021-04-05T22:31:08","modified_gmt":"2021-04-05T21:31:08","slug":"how-does-ransomware-spread","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread","title":{"rendered":"How Does Ransomware Spread?"},"content":{"rendered":"<p>Today\u2019s managed services providers (MSPs) face an increasingly sophisticated cybercriminal landscape. As the Internet of Things (IoT) and BYOD policies grow in popularity in the workplace, and as business networks become more complex, MSPs trusted with the security of their customers\u2019 networks need to stay ahead of the curve when it comes to bad actors and the types of malware they deploy.<\/p>\n<h2><b>The History of Ransomware<\/b><\/h2>\n<p>Ransomware has been a mainstay of malware cybercrime since the first recorded attack in 1989. Since then, it\u2019s kept pace with new technologies and adapted to the vulnerabilities those technologies open up. As far as malware goes, ransomware is bread and butter for cybercriminals. If your customers are asking questions like \u201cHow does ransomware work?\u201d or \u201cWhat does ransomware do?\u201d the simplest way to explain it is that bad actors encrypt files and demand payment for you to regain access. The specific attack vectors differ, as we\u2019ll discuss going forward, but the overall goal is to ransom valuable proprietary information.<\/p>\n<p>Ransomware has been around for decades and isn\u2019t going anywhere anytime soon. In fact, ransomware attacks have continued to proliferate in 2019, ]. What\u2019s more, these figures only represent attacks that have been reported\u2014it\u2019s likely that many businesses choose not to make attacks public knowledge lest they damage their reputation or have to deal with the broader implications of a potential breach. In short, ransomware is a critical issue for businesses across the digital landscape.<\/p>\n<p>New external factors also affect the cybercriminal landscape and change how ransomware is deployed. For example, the rise and fall of cryptocurrency has altered how bad actors seek to make a profit. Hard-to-trace cryptocurrencies like Bitcoin have emboldened bad actors using ransomware, making them more likely to carry out these attacks knowing the likelihood of being tracked down is low.<\/p>\n<p>For MSPs to provide their clients with the most reliable cybersecurity possible, the complex nature of ransomware calls for the appropriate skill set and tech stack for the job. As cybercriminals adapt to evolving technology, the tools MSPs use to counter them must evolve in turn. In order to protect their customers from the full range of attacks levied by bad actors of today and tomorrow,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/all-one-software-msps\" target=\"_blank\" rel=\"noopener\">MSPs should consider what software will best serve them<\/a>\u00a0in an increasingly hostile digital environment.<\/p>\n<h2><b>How Common Are Ransomware Attacks?<\/b><\/h2>\n<p>Ransomware continues to grow in both frequency and scope of damage. By the end of 2019, global ransomware events are projected to\u00a0<a class=\"ext\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/cybercrime-costs-global-economy\/\" target=\"_blank\" rel=\"noopener noreferrer\">cost $22,184 per minute<\/a>. Even between Q1 and Q2, the average ransom payment increased 184%\u2014<a class=\"ext\" href=\"https:\/\/www.coveware.com\/blog\/2019\/7\/15\/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread\" target=\"_blank\" rel=\"noopener noreferrer\">from $12,762 in Q1 to $36,295 in Q2<\/a>.<\/p>\n<p>In addition to the staggering financial impact of ransomware in recent years, it\u2019s also important to note that ransomware attacks are particularly common in specific industries and subsectors. For instance,\u00a0<a class=\"ext\" href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon\u2019s 2019 Data Breach Investigations Report\u00a0<\/a>\u00a0found that of the different kinds of malware that affect the healthcare industry, 85% of infections are ransomware. And according to cybersecurity provider\u00a0<a class=\"ext\" href=\"https:\/\/www.edelman.com\/insights\/the-ransomware-problem-how-financial-institutions-can-mitigate-reputational-risk\" target=\"_blank\" rel=\"noopener noreferrer\">IntSights, more than 25% of all malware attacks<\/a>\u00a0have hit banks and other financial firms\u2014more than any other industry.<\/p>\n<p>Because these industries handle information that is carefully regulated and highly valuable, it\u2019s no wonder bad actors target them with ransomware attacks. Organizations that handle financially sensitive files or data governed by strict HIPAA laws have a vested interest in the security and privacy of the information they manage. Accordingly, ransomware attacks that encrypt these files or threaten to make them public pose a particularly debilitating\u2014and increasingly common\u2014threat to such public and private organizations.<\/p>\n<p>One dimension of ransomware that makes it so common is that it\u2019s easy for cybercriminals to lean on existing ransomware variants to execute their attacks. There are even opportunities for bad actors to use prefabricated ransomware software. This means cybercriminals ranging from amateurs to the most experienced often see ransomware as a low-risk, high-reward option. As one might expect, this has led to a digital environment rife with ransomware attacks\u2014both sophisticated and simple.<\/p>\n<h2><b>How Does a Ransomware Attack Work?<\/b><\/h2>\n<p>While the specific attack vectors will differ depending on what vulnerabilities bad actors are trying to exploit, most ransomware shares the same goal: to deny users access to their files and extort payment from them for the (potentially false) promise of returning that access. At the most basic level, cybercriminals carry out ransomware attacks by using encryption software to encrypt files and bar traditional access to them. The only way to decrypt them is to use complex mathematical keys only the encrypter knows.<\/p>\n<p>For those wondering how ransomware spreads, it relies on various modes of infiltrating networks and gaining access to sensitive files. Although each ransomware variant has its own methods, all ransomware relies on similar social engineering tactics to trick legitimate network users into unknowingly granting bad actors access.<\/p>\n<p>Once this has happened, ransomware software will use whatever access has been granted to locate sensitive proprietary information and encrypt it. Users then receive some kind of alert warning them access to their files has been blocked and directing them to a portal where they must pay\u2014usually in cryptocurrency\u2014for the files to be decrypted. It\u2019s important to note not all ransomware will present itself as such. Some attacks will masquerade as government agencies, such as the Department of Justice, and claim that a user\u2019s files have been locked for breaking the law and they must pay a fine in order to reaccess them.<\/p>\n<p>In the same vein, cybercriminals may attempt to extort victims using other forms of intimidation rather than demanding payment in return for reaccess. For example, a specific variant of ransomware known as leakware or doxware involves bad actors infiltrating a user\u2019s device, encrypting files, and then threatening to make that information public unless payment is received. Leakware can have particularly high stakes for image-conscious organizations or those who deal with especially sensitive information, like healthcare companies and government agencies.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/www.itproportal.com\/features\/the-four-most-popular-methods-hackers-use-to-spread-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">While email is the most common way ransomware attacks are carried out<\/a>, it\u2019s not the only method. Ransomware software can be delivered via social media messaging platforms, untrustworthy domains, and drive-by-download attacks. Frighteningly, advanced cybercriminals have developed ransomware\u2014such as NotPetya\u2014that can infiltrate networks, exploit vulnerabilities, and access sensitive information without social engineering tricks that try to get users to grant access themselves.<\/p>\n<h2><b>Can You Remove Ransomware?<\/b><\/h2>\n<p>It\u2019s possible to remove ransomware once it\u2019s affected your device, but the extent to which you\u2019ll be successful depends on the kind of malware you\u2019re dealing with. Additionally, it\u2019s important to acknowledge that removing ransomware will not necessarily decrypt files that have already been encrypted. Instead, you\u2019ll be working to restart and restore your device to an earlier, uninfected setting. This means you\u2019ve accepted the reality you will not be regaining access to the files in question.<\/p>\n<p>If you\u2019re facing relatively basic ransomware, for example, you can attempt to neutralize the attack by entering your computer\u2019s safe mode and deploying antivirus software. However, if you\u2019re up against a kind of ransomware that has locked your screen and barred you from starting other programs and applications, Windows users can try System Restore to return their device to an earlier state. Beyond that, you may be facing the prospect of a complete restore, although most ransomware won\u2019t require you to go quite this far.<\/p>\n<p>After this, you can begin an inventory of your files. If you\u2019re not seeing your typical icons and shortcuts, for example, the ransomware you\u2019re dealing with may have just hidden them. This can be fixed by checking on hidden files in your File Explorer window. If your files aren\u2019t just hidden, there\u2019s a good chance they\u2019ve been successfully encrypted by ransomware. At this point, you should begin looking at previous backups, scanning them for viruses and malware, and restoring them. There are also\u00a0<a class=\"ext\" href=\"https:\/\/www.maketecheasier.com\/best-ransomware-decryption-tools-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware decryption tools<\/a>\u00a0on the market that may be able to help you unlock your files without paying the ransom fee.<\/p>\n<h2><b>How Can You Defend Against Ransomware?<\/b><\/h2>\n<p>While it\u2019s possible to remove ransomware once it\u2019s already affected your computer, it\u2019s better for users to know how to prevent ransomware from infiltrating devices in the first place. To do so, MSPs need to take a proactive approach to malware defense rather than solving crises only as they occur. By doing this, they can help themselves and their customers stay ahead of the most recent ransomware developments.<\/p>\n<p>For example, it\u2019s critical you keep operating systems and other important software up-to-date with the most recent security patches. Doing so will help ensure devices and networks are not vulnerable to new types of malware. Users should also be careful about what programs they give administrative access to, which can help stymie potential attack vectors. Similarly, you and your customers should be\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/business-continuity-plans\" target=\"_blank\" rel=\"noopener\">backing up your files<\/a>\u00a0as frequently as possible. This will put you in a better position if you do face an attack, allowing you to preserve your files without having to pay the ransom.<\/p>\n<p>Beyond that, MSPs should invest in cybersecurity applications capable of protecting organizational devices and networks from the full range of digital threats. Ideally, the right software will be able to provide the kind of security monitoring you need to exercise visibility over your digital environment, detect threats as they occur, and connect you with the tools necessary to act.<\/p>\n<p>With\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor#?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0Threat Monitor<\/a>, MSPs can do just that. Threat Monitor leverages cloud technology to provide MSPs with powerful control over complex managed networks. Threat Monitor is a security information and event management (SIEM) tool that uses threat intelligence, network and host intrusion detection systems, and other monitoring tools to deliver better visibility across managed networks. And with centralized security monitoring, this near-comprehensive solution makes it possible to exercise this kind of control from a single central command.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5290","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Does Ransomware Spread?<\/title>\n<meta name=\"description\" content=\"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does Ransomware Spread?\" \/>\n<meta property=\"og:description\" content=\"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-31T18:37:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-05T21:31:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How Does Ransomware Spread?\",\"datePublished\":\"2019-12-31T18:37:05+00:00\",\"dateModified\":\"2021-04-05T21:31:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\"},\"wordCount\":1650,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\",\"name\":\"How Does Ransomware Spread?\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2019-12-31T18:37:05+00:00\",\"dateModified\":\"2021-04-05T21:31:08+00:00\",\"description\":\"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Does Ransomware Spread?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Does Ransomware Spread?","description":"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread","og_locale":"pt_BR","og_type":"article","og_title":"How Does Ransomware Spread?","og_description":"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-12-31T18:37:05+00:00","article_modified_time":"2021-04-05T21:31:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How Does Ransomware Spread?","datePublished":"2019-12-31T18:37:05+00:00","dateModified":"2021-04-05T21:31:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread"},"wordCount":1650,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread","url":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread","name":"How Does Ransomware Spread?","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2019-12-31T18:37:05+00:00","dateModified":"2021-04-05T21:31:08+00:00","description":"Learn how ransomware spreads and what you can do to ensure your infrastructure is secure.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-does-ransomware-spread#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How Does Ransomware Spread?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5290"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5290\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}