{"id":69677,"date":"2025-08-05T10:15:22","date_gmt":"2025-08-05T09:15:22","guid":{"rendered":"https:\/\/www.n-able.com\/?p=69677"},"modified":"2025-09-09T17:54:57","modified_gmt":"2025-09-09T16:54:57","slug":"how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","title":{"rendered":"How to Prepare for the UK Cyber Security and Resilience Bill"},"content":{"rendered":"<p>The UK Cyber Security and Resilience Bill represents a significant milestone in the nation&#8217;s fight against growing cyber threats. Anticipated to reshape cybersecurity protocols across industries, this legislation aims to enhance national resilience by addressing vulnerabilities in critical infrastructure, supply chains, and digital service providers.<\/p>\n<p>For IT service providers, business leaders, IT professionals, and compliance managers, understanding and preparing for these changes is not just a matter of compliance; it&#8217;s a necessary step to safeguard operations in an increasingly volatile digital landscape.<\/p>\n<p>This guide is designed to outline what the bill means for your business, its global context, and practical steps you can take to align with its provisions.<\/p>\n<p><strong>Click here to read the other blogs in this series: <\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/understanding-the-uk-cyber-security-and-resilience-bill-what-it-means-for-msps-it-professionals-and-how-n-able-can-help\" target=\"_blank\" rel=\"noopener\"><strong>Understanding the UK Cyber Security and Resilience Bill: What It Means for MSPs, IT Professionals, and How N&#8209;able Can Help<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/uk-cyber-security-and-resilience-bill-compliance-checklist\" target=\"_blank\" rel=\"noopener\"><strong>UK Cyber Security and Resilience Bill Compliance Checklist<\/strong><\/a><\/li>\n<\/ul>\n<h2><strong>Why the Cyber Security and Resilience Bill Matters <\/strong><\/h2>\n<p>Cyber-attacks are becoming more frequent, complex, and far-reaching. A key area of concern is around the risk to supply chains. According to the UK\u2019s Department for Media, Culture, Media, and Sport 2024 Security Breaches Survey, <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2024\/cyber-security-breaches-survey-2024\" target=\"_blank\" rel=\"noopener\">less than half (48%) of businesses reported reviewing their immediate suppliers<\/a> and this drops to 23% for the wider supply chain. This lack of preparedness leaves businesses and consumers vulnerable to disruptive incidents, such as ransomware attacks or data breaches.<\/p>\n<p>Beyond organizational risks, there&#8217;s a broader economic implication. <a href=\"https:\/\/www.gov.uk\/government\/news\/new-cyber-laws-to-safeguard-uk-economy-secure-long-term-growth\" target=\"_blank\" rel=\"noopener\">Cybercrime costs the UK economy billions annually<\/a>, impacting innovation, trust, and international competitiveness. The Cyber Security and Resilience Bill addresses these concerns by enforcing proactive measures across many industries, setting a new standard for business operations.<\/p>\n<h2><strong>The Bill in a Global Context <\/strong><\/h2>\n<p>The Cyber Security and Resilience Bill aligns with international efforts such as the EU\u2019s NIS2 Directive and the Cyber Resilience Act, reflecting a global shift toward stricter cybersecurity measures. These legislative frameworks aim to standardize critical infrastructure protection, incident reporting, and risk management.<\/p>\n<p>For businesses operating internationally, aligning with these frameworks can simplify compliance across borders and ensure competitive relevance in global markets.<\/p>\n<h2><strong>The Role of the NCSC <\/strong><\/h2>\n<p>The National Cyber Security Centre (NCSC) plays a pivotal role in guiding businesses through this transition. By providing resources like the Cyber Assessment Framework (CAF) and Cyber Essentials certifications, the NCSC helps organizations evaluate cyber risks and implement best practices. Leveraging these tools can demonstrate commitment to compliance and security.<\/p>\n<h2><strong>Practical Steps to Prepare for the Cyber Security and Resilience Bill<\/strong><\/h2>\n<p>Preparation for the Cyber Security and Resilience Bill doesn\u2019t have to be overwhelming. Here\u2019s a practical 6-step framework to help your business align with its provisions effectively.<\/p>\n<h3><strong>1. Conduct Cyber Risk Assessments<\/strong><\/h3>\n<p>Start by evaluating your organization\u2019s current cybersecurity posture. Identify vulnerabilities in systems, infrastructure, and supply chains that could be exploited by attackers. Tools like the NCSC\u2019s Cyber Assessment Framework (CAF) can provide structured guidance.<\/p>\n<h3><strong>2. Update Compliance Policies<\/strong><\/h3>\n<p>Align your policies with the bill\u2019s requirements. Prepare for stricter incident reporting standards and ensure your processes allow for quick reporting and recovery. Engage legal experts to review and adapt your compliance framework as needed.<\/p>\n<h3><strong>3. Vet Supply Chain Partners<\/strong><\/h3>\n<p>Assess the <a href=\"https:\/\/www.n-able.com\/blog\/strengthening-supply-chain-security-for-smes-and-enterprises\" target=\"_blank\" rel=\"noopener\">cybersecurity readiness of third-party suppliers<\/a> and MSPs. Establish contract clauses that enforce compliance with cybersecurity best practices. Remember, your security is only as strong as the weakest link in your supply chain.<\/p>\n<h3><strong>4. Utilize AI-Powered Threat Detection<\/strong><\/h3>\n<p>Stay ahead of sophisticated threats by integrating AI-powered cybersecurity tools. These can improve threat detection, allow for predictive analytics, and enhance incident response times. Platforms such as <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Darktrace and SentinelOne<\/a> can complement existing security measures.<\/p>\n<h3><strong>5. Prepare for Incident Reporting<\/strong><\/h3>\n<p>Develop a robust incident response plan that helps ensure your team can report incidents within the 24-hour window required by the bill. Establish a clear chain of command and ensure all stakeholders are trained in incident communication protocols.<\/p>\n<h3><strong>6. Leverage NCSC Guidance<\/strong><\/h3>\n<p>Tap into resources provided by the NCSC, like Cyber Essentials certifications or the new Cyber Resilience Audit Scheme. These tools not only improve your resilience but can also bolster your credibility with regulators and customers alike.<\/p>\n<h2><strong>Applying the Framework in Your Industry <\/strong><\/h2>\n<p>To ground these steps in real-world application, here\u2019s how specific industries can prepare for the Cyber Security and Resilience Bill.<\/p>\n<ul>\n<li><strong>Retail<\/strong>: Enhance the security of Point of Sale (POS) systems and customer databases. Implement robust supply chain vetting due to the increased use of third-party logistics providers.<\/li>\n<\/ul>\n<ul>\n<li><strong>Tech Sector<\/strong>: Prioritize resilience in software development and DevOps practices. Use AI to manage vulnerabilities in complex tech ecosystems.<\/li>\n<\/ul>\n<ul>\n<li><strong>Critical National Infrastructure (CNI)<\/strong>: For utilities, healthcare, and transport sectors, focus on implementing scalable solutions for incident reporting and operational continuity.<\/li>\n<\/ul>\n<h2><strong>Navigating Challenges <\/strong><\/h2>\n<p>While the bill promises stronger defenses, it could present challenges for businesses, particularly small-to-medium enterprises (SMEs). Key pain points include higher compliance costs, resource allocation for supply chain audits, and the need for continuous regulatory updates.<\/p>\n<p>Partnering with cybersecurity experts and investing in scalable tools can mitigate these challenges. Consider allocating budget resources strategically, starting with high-risk areas.<\/p>\n<h2><strong>Taking Your Cybersecurity to the Next Level <\/strong><\/h2>\n<p>The Cyber Resilience Bill is a wake-up call to prioritize cybersecurity at every business level. Beyond pure compliance, this legislation offers an opportunity to build trust with customers, safeguard competitive advantages, and position your organization as a leader in the increasingly digital economy.<\/p>\n<p>Don\u2019t wait for the legislation to take effect. Begin implementing these proactive measures now to ensure your business is prepared and ready to set the standard for cybersecurity excellence.<\/p>\n<h2><strong>How N&#8209;able Products Can Help Support CS&amp;R Compliance\u2026<\/strong><\/h2>\n<p><a href=\"https:\/\/www.n-able.com\/products\/n-central-rmm\" target=\"_blank\" rel=\"noopener\"><strong>1. N&#8209;able N&#8209;central<\/strong><\/a><\/p>\n<ul>\n<li>Real-time endpoint and network monitoring.<\/li>\n<li>Patch management and automated policy enforcement.<\/li>\n<li>Antivirus and EDR integration.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/products\/n-sight-rmm\" target=\"_blank\" rel=\"noopener\"><strong>2. N&#8209;able N&#8209;sight RMM<\/strong><\/a><\/p>\n<ul>\n<li>Lightweight remote monitoring and management for SMB-focused MSPs.<\/li>\n<li>Built-in automation for patching, alerts, and reporting.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/solutions\/security\/endpoint-security\" target=\"_blank\" rel=\"noopener\"><strong>3. N&#8209;able Endpoint Detection and Response (EDR)<\/strong><\/a><\/p>\n<ul>\n<li>AI-powered threat detection and response.<\/li>\n<li>Incident alerting and logging for reporting compliance.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/products\/adlumin-managed-detection-and-response\" target=\"_blank\" rel=\"noopener\"><strong>4. Adlumin Managed Detection and Response (MDR)<\/strong><\/a><\/p>\n<ul>\n<li>24\/7 threat monitoring and response delivered by a dedicated SOC.<\/li>\n<li>Expert-led threat hunting, analysis, and remediation.<\/li>\n<li>Helps meet requirements for continuous security operations and rapid incident handling.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\" target=\"_blank\" rel=\"noopener\"><strong>5. Cove Data Protection<\/strong><\/a><\/p>\n<ul>\n<li>Cloud-first, encrypted backup solutions.<\/li>\n<li>Disaster recovery and business continuity tools.<\/li>\n<li>Comprehensive backup for endpoints, servers, and Microsoft 365.<\/li>\n<li>Long-term retention and flexible recovery options.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><strong>6. N&#8209;able Passportal<\/strong><\/a><\/p>\n<ul>\n<li>Secure credential storage and access management.<\/li>\n<li>Full audit trail for compliance reviews.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.n-able.com\/products\/mail-assure\" target=\"_blank\" rel=\"noopener\"><strong>7. N&#8209;able Mail Assure<\/strong><\/a><\/p>\n<ul>\n<li>Email filtering, continuity, and archiving.<\/li>\n<li>Protection from phishing and business email compromise.<\/li>\n<\/ul>\n<p><em>DISCLAIMER: This document is provided for informational purposes only and should not be relied upon as legal advice. N&#8209;able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein. The N&#8209;able trademarks, service marks, and logos are the exclusive property of N&#8209;able Solutions ULC and N&#8209;able Technologies Ltd. All other trademarks are the property of their respective owners.<\/em><\/p>\n<p><strong>Looking for more blogs on compliance and regulation, then check out the <a href=\"https:\/\/www.n-able.com\/blog?filter_topic=compliance\" target=\"_blank\" rel=\"noopener\">Compliance<span class=\"linkline\"><span>\u00a0section of our blog<\/span><\/span><\/a>.<\/strong><\/p>\n<p><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/em><a href=\"https:\/\/twitter.com\/cybersec_nerd\" class=\"line--added\" target=\"_blank\" rel=\"noopener\"><span class=\"linkline\"><em>@cybersec_nerd<\/em><\/span><\/a><\/p>\n<p><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"line--added\"><span class=\"linkline\"><span>thesecuritypope<\/span><\/span><\/a><\/em><\/p>\n<p><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"line--added\"><span class=\"linkline\"><span>cybersec_nerd<\/span><\/span><\/a>\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how UK businesses can prepare for the Cyber Security and Resilience Bill with practical steps for compliance and resilience.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-69677","post","type-post","status-publish","format-standard","hentry","topic-compliance","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>UK Cyber Resilience Bill Guide for Businesses<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK Cyber Resilience Bill Guide for Businesses\" \/>\n<meta property=\"og:description\" content=\"Learn how UK businesses can prepare for the Cyber Security and Resilience Bill with practical steps for compliance and resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-05T09:15:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T16:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/062525_BB_CSR_PD_Prepare_Final_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"How to Prepare for the UK Cyber Security and Resilience Bill\",\"datePublished\":\"2025-08-05T10:15:22+01:00\",\"dateModified\":\"2025-09-09T16:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\"},\"wordCount\":1184,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\",\"name\":\"UK Cyber Resilience Bill Guide for Businesses\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2025-08-05T10:15:22+01:00\",\"dateModified\":\"2025-09-09T16:54:57+00:00\",\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"UK Cyber Resilience Bill Guide for Businesses","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","og_locale":"pt_BR","og_type":"article","og_title":"UK Cyber Resilience Bill Guide for Businesses","og_description":"Learn how UK businesses can prepare for the Cyber Security and Resilience Bill with practical steps for compliance and resilience.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-08-05T09:15:22+00:00","article_modified_time":"2025-09-09T16:54:57+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/062525_BB_CSR_PD_Prepare_Final_1200x628.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"How to Prepare for the UK Cyber Security and Resilience Bill","datePublished":"2025-08-05T10:15:22+01:00","dateModified":"2025-09-09T16:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill"},"wordCount":1184,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","url":"https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill","name":"UK Cyber Resilience Bill Guide for Businesses","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2025-08-05T10:15:22+01:00","dateModified":"2025-09-09T16:54:57+00:00","inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/how-to-prepare-for-the-uk-cyber-security-and-resilience-bill"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/69677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=69677"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/69677\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=69677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}