{"id":61371,"date":"2025-11-20T14:18:22","date_gmt":"2025-11-20T10:18:22","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=61371"},"modified":"2025-11-25T18:08:32","modified_gmt":"2025-11-25T14:08:32","slug":"msp-best-practices","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/msp-best-practices\/","title":{"rendered":"MSP Best Practices: How to Streamline Operations and Strengthen Data Protection"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">While MSP best practices involve a set of performance management around the security and compliance, the real success of a Managed Service Provider (MSP) business hinges in large part on two key criteria:<\/span><\/p>\n<p><!--more--><\/p>\n<ol>\n<li><b>Efficiency<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The more streamlined any MSP\u2019s internal processes are, the better it can support customers and the more <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-profit-margins\/.\"><span style=\"font-weight: 400;\">profits it can generate<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>2. Security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">MSPs must also be able to deliver managed services with a high degree of security. Without protecting client data and maintaining security and compliance, MSPs are likely to lose customers and revenue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, these goals can be tough for some MSPs to achieve in tandem. A heavy focus on security and compliance can slow down operational efficiency, while MSPs who fixate too much on fast processes risk making security mistakes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that it\u2019s possible to square this circle. By adopting the right practices, MSPs can have it all \u2013 meaning they can operate efficiently while also keeping data safe and mitigating security risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read on for tips on MSP best practices,\u00a0 as we unpack key best practices for modern MSPs. We\u2019ve broken the practices into categories, each aligned with different areas of responsibility that MSPs must typically handle.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Core MSP Best Practices for a Strong Operational Foundation<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Let\u2019s start with the most basic practices every MSP should embrace to lay the groundwork for operational efficiency. They include:<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Standardized processes<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">MSPs should strive to follow consistent, standardized routines across all aspects of their business \u2013 from delivering client support, to <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-employees-onboarding\/\"><span style=\"font-weight: 400;\">employee onboarding<\/span><\/a><span style=\"font-weight: 400;\">, to <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/designing-a-ransomware-response-plan\/\"><span style=\"font-weight: 400;\">ransomware response<\/span><\/a><span style=\"font-weight: 400;\"> and beyond.<\/span><\/p>\n<h3><b>Centralized management<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Centralized management breeds efficiency by allowing MSPs to work using a single platform and location. MSPs should select software tools that include features like <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/what-is-rmm\/\"><span style=\"font-weight: 400;\">remote monitoring and management<\/span><\/a><span style=\"font-weight: 400;\"> (RMM) so they can support customers without having to travel on-site. Routines like reporting, endpoint management and patching operations should also occur through centralized systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[notebox] Explore unified <\/span><a href=\"https:\/\/www.msp360.com\/msp-platform\/\"><span style=\"font-weight: 400;\">MSP software<\/span><\/a><span style=\"font-weight: 400;\"> in a single pane of glass: MSP360 Platform is a centralized, all-in-one IT management and data protection platform for MSPs, that combines MSP360 Managed Backup, MSP360 Managed Backup for Microsoft 365 and Google Workspace, MSP360 RMM, and MSP360 Managed Connect under one management console for MSPs.<\/span><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img decoding=\"async\" class=\"aligncenter\" src=\"\/wp-content\/uploads\/2025\/11\/Blog-cover1_-Getting-Started-with-MSP360-Backup-Free-and-IDrive-e2-5.png\" alt=\"MSP Platform\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP Platform<\/div>\n<div class=\"call-to-action__text\">Centralized, all-in-one IT management and data protection platform for MSPs.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-5e675f7a-c488-46f0-9a4f-3f63a2e2457b\" data-portal=\"5442029\" data-id=\"5e675f7a-c488-46f0-9a4f-3f63a2e2457b\"><span class=\"hs-cta-node hs-cta-5e675f7a-c488-46f0-9a4f-3f63a2e2457b\" id=\"hs-cta-5e675f7a-c488-46f0-9a4f-3f63a2e2457b\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/5e675f7a-c488-46f0-9a4f-3f63a2e2457b\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-5e675f7a-c488-46f0-9a4f-3f63a2e2457b\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/5e675f7a-c488-46f0-9a4f-3f63a2e2457b.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h3><span style=\"font-weight: 400;\">\u00a0MSP Best Practices: Automation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Automation is also a key ingredient in efficiency. Automating recurring tasks like patching, endpoint checks and report generation not only saves time and reduces toil for staff. It also helps to reduce the risk of errors or oversights, which are more likely to occur during manual operations.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Security and Compliance Best Practices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As far as security and compliance concerned, the following best practices help ensure MSP success:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Multi-layered security<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Because there is no way to guarantee completely that a breach will never occur, MSPs should adopt a multi-layered security strategy (sometimes called defense-in-depth) that provides multiple levels of protection: Physical security, network security, device security, data security and so on. The more defensive lines MSPs erect, the harder they make it for attackers to breach systems.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Regular vulnerability assessments<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Rather than waiting for attacks to occur, MSPs should proactively perform <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/threat-and-vulnerability-management-for-msps\/\"><span style=\"font-weight: 400;\">vulnerability assessments<\/span><\/a><span style=\"font-weight: 400;\"> by checking for unpatched software and insecure configurations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Compliance-ready backup and workflows<\/span><\/h3>\n<p><a href=\"https:\/\/www.msp360.com\/resources\/blog\/a-guide-to-compliance-management-for-msps\/\"><span style=\"font-weight: 400;\">Compliance mandates that apply to MSPs<\/span><\/a><span style=\"font-weight: 400;\"> often require security to be built into processes and workflows. For example, in the context of data backup, MSPs may need to be able to ensure that backup data is secure (to protect sensitive information inside backups). They may also face a mandate to generate reports that demonstrate the compliant status of their operations.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How MSP360 Helps MSPs Achieve Security and Compliance Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSP360 considers security a core priority, and we do our utmost to protect your information with all our solutions. We keep your data safe and secure with a wide range of mechanisms for the ultimate data protection strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, you can prevent backup data from being altered, deleted or corrupted by ransomware with the additional GFS retention settings available for Amazon S3, Wasabi and Backblaze B2 storage providers called <a href=\"https:\/\/www.msp360.com\/resources\/blog\/immutable-backups\/\">Object Lock (Immutability)<\/a>. Object lock is the ultimate insurance policy against ransomware attacks that is currently available. Second, our <\/span><a href=\"https:\/\/www.msp360.com\/managed-backup\/\"><span style=\"font-weight: 400;\">MSP backup software<\/span><\/a><span style=\"font-weight: 400;\"> implements end-to-end encryption, audit logging, advanced retention settings, 2FA, and multi-level access control, ensuring your backups are compliance-ready.\u00a0<\/span><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP360 Managed Backup<\/div>\n<div class=\"call-to-action__text\">\n<ul>\n<li>Cross-platform backup and recovery<\/li>\n<li>Flexible licensing<\/li>\n<li>Bring-your-own storage approach<\/li>\n<\/ul>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-579f9213-baa5-44ff-8bd8-23cac4aa9d78\" data-portal=\"5442029\" data-id=\"579f9213-baa5-44ff-8bd8-23cac4aa9d78\"><span class=\"hs-cta-node hs-cta-579f9213-baa5-44ff-8bd8-23cac4aa9d78\" id=\"hs-cta-579f9213-baa5-44ff-8bd8-23cac4aa9d78\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/579f9213-baa5-44ff-8bd8-23cac4aa9d78\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-579f9213-baa5-44ff-8bd8-23cac4aa9d78\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/579f9213-baa5-44ff-8bd8-23cac4aa9d78.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 40%;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/10\/Product_section-1.png\" \/><\/div>\n<\/div>\n<h2><span style=\"font-weight: 400;\">Enhanced Data and Protection Best Practices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Any MSP can back up data. But to do so efficiently and securely, MSPs need to think beyond basic backup and data protection practices. They should also adhere to concepts like the following:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3-2-1-1-0 backup rule<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This practice, which refers to the way MSPs store and configure backup data, minimizes the risk that attackers will compromise backups or that recovery operations will fail.\u00a0<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/3-2-1-1-0-backup-rule\/\" target=\"_blank\" rel=\"noopener\"><span class=\"ss360-highlight\">3-2-1-1-0<\/span>\u00a0Backup Rule: Extend Your Backup Security<\/a><\/p>\n<h3><span style=\"font-weight: 400;\">Regular backup monitoring<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You don\u2019t want to wait until recovery is underway to discover that your backups have a problem and can\u2019t be used. <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/remote-monitoring-and-management-in-msp360-managed-backup-service\/\"><span style=\"font-weight: 400;\">Backup monitoring<\/span><\/a><span style=\"font-weight: 400;\"> helps to prevent this risk by keeping MSPs abreast of the status of backups and proactively alerting them to issues like failed or incomplete backups.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Backup testing is a cornerstone on MSP best practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">For similar reasons, it\u2019s a best practice to <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-test-your-backups-comprehensive-guide\/\"><span style=\"font-weight: 400;\">test backups<\/span><\/a><span style=\"font-weight: 400;\"> regularly. This is another way of identifying backup issues proactively.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Secure backup access controls<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Backups can contain sensitive data. In addition, ransomware attackers sometimes target backups for deletion, knowing that if they destroy backups, they are more likely to force their victims to pay ransom. Access controls for backup data reduce both risks by restricting who can access and modify backups.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Document processes<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Backup processes and routines should be extensively documented to ensure that all relevant employees know what\u2019s being backed up, how it\u2019s backed up and how to use backups for recovery. The easier it is to find information like this, the more efficiently and quickly MSPs can perform backup and recovery operations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Backup considerations for Microsoft 365 and Google Workspace<\/span><\/h3>\n<p>Cloud-based platforms, like Microsoft 365 and Google Workspace, don\u2019t prevent accidental deletion, misconfigured retention, or tenant-level compromise. According to the <a href=\"https:\/\/www.msp360.com\/resources\/blog\/understanding-microsoft-365-shared-responsibility-model\/\">Shared Responsibility Model,<\/a> the service provider is responsible for the availability of the platform, and the user is responsible for the data they put into it. For MSPs, this means the necessity of a separate, independent <a href=\"https:\/\/www.msp360.com\/saas-backup\/\">backup for M365\/Google<\/a>.<\/p>\n<h3><span style=\"font-weight: 400;\">How MSP360 Helps MSPs Achieve Data Protection Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSP360 offers a suite of robust backup solutions that contribute to building an efficient and reliable data protection strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MSP360 <a href=\"https:\/\/www.msp360.com\/backup\/cloud-backup\/\">cloud backup solutions<\/a> helps you to follow the 3-2-1-1-0 rule seamlessly. It supports multiple storage destinations and allows you to implement the bring-your-own storage approach by choosing the cloud storage provider of your choice. This helps you to comply with two of the requirements, where the first one is about storing data copies across at least 2 storage types, and the second one is about locking one dataset from alterations or deletions. This can be done with the object lock, a feature that is supported across all MSP360 Backup products when using AWS, Wasabi Hot Cloud Storage, and Backblaze B2.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another important feature of MSP best practices, which is available across all backup solutions is built-in backup testing called Restore Verification and Consistency Check: these features help you to test backup recoverability and ensure that data in storage remains unmodified.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MSP360 Managed Backup also helps users with monitoring and reporting: in the MSP360 web console, you can track your users\u2019 backup and restore activities with a high level of detail.\u00a0<\/span><span style=\"font-weight: 400;\">You can review failed backups, check backups with warning statuses, and analyze backup trends. These insights help you identify patterns and prevent recurring issues.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security is also a top priority for us: with MSP360 Managed Backup, you get multi-layered protection designed to keep your data safe, your access secure, and your business running smoothly with backup encryption, custom roles and permissions, 2FA, IP allowlisting, and more.\u00a0<\/span><\/p>\n<p>For MSPs who manage M365 and Google environments, MSP360 provides a cloud-to-cloud <a href=\"https:\/\/www.msp360.com\/saas-backup\/\">SaaS backup solution<\/a> that simplifies deployment, minimizes infrastructure overhead and ensures data is always recoverable.<\/p>\n<h2><span style=\"font-weight: 400;\">Customer Service\u00a0 MSP Best Practices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Businesses hire MSPs because they want efficient, reliable service. To deliver it, MSPs should embrace best practices like the following:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">MSP Best Practices: Proactive communication<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Don\u2019t wait until something goes wrong, or your customers ask for a status update, to tell them what you\u2019re doing. Keep them abreast of operations proactively. They\u2019ll appreciate the communication, and will be more likely to trust you to provide great service.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Training and education<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Another way to build client trust and keep customers informed about what you are doing for them is to offer training and education where relevant. For instance, if you offer ransomware protection services, providing <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing-training-importance-explained\/\"><span style=\"font-weight: 400;\">anti-phishing training<\/span><\/a><span style=\"font-weight: 400;\"> to your clients\u2019 employees could help to reduce the risk of a ransomware attack, while also highlighting your competence and proactive engagement as an MSP.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">MSP Best Practices: Transparent SLAs<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Define clear <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-agreement-guide\/\"><span style=\"font-weight: 400;\">Service Level Agreements<\/span><\/a><span style=\"font-weight: 400;\"> (SLA), meaning the contracts that specify which level of service you\u2019ll deliver as an MSP. Transparent SLAs benefit your business as well as your customers by setting clear expectations.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Managing Pricing and Service Offerings<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">From a pricing and service offering standpoint, these best practices can help MSPs to maximize value for clients while also optimizing profitability for MSPs:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Value-based pricing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">While there are multiple <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-pricing\/\"><span style=\"font-weight: 400;\">MSP pricing strategies<\/span><\/a><span style=\"font-weight: 400;\"> to consider, value-based pricing is often ideal. By linking pricing to the value that customers receive, it rewards MSPs based on the quality of the services they deliver while leaving clients with the feeling that they are getting maximum value.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Variety and flexibility<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Consider offering multiple tiers or packages at different price points. For instance, you might give customers the option of choosing from varying cloud storage options. This makes it easier for each client to find a service package aligned with its needs and budget.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">MSP Best Practices for Performance Management<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The final essential set of best practices for MSPs centers on performance management. You can\u2019t understand the state of your business and find ways to optimize if you don\u2019t effectively track what you\u2019re doing and where you may be able to improve. Toward that end, consider:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Essential KPIs for the business, according to MSP best practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Identify which key business performance indicators (KPIs) to track in areas like <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-financial-kpis\/\"><span style=\"font-weight: 400;\">finance<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-sales-metrics\/\"><span style=\"font-weight: 400;\">sales<\/span><\/a><span style=\"font-weight: 400;\">. These metrics provide critical insight into how well your business is operating and achieving its goals.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Technical metrics<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Alongside business KPIs, MSP best practices involve also monitoring technical metrics, such as backup success and failure rates, mean ticket resolution times and system uptimes. Here again, you can use these metrics to determine where you\u2019re succeeding and falling short, and to identify opportunities for improvement.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Collect feedback<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Determine what your customers think of the services you\u2019re providing by distributing surveys and keeping communication channels open. This is another way to be proactive about customer engagement and get ahead of issues before they snowball into crises.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion On MSP Best Practices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Again, being both an efficient MSP, and one that meets key obligations in the areas of security and compliance, is not always easy. But it\u2019s eminently feasible when you embrace best practices like those described above, which offer a balanced approach to operating an MSP business that maximizes value for everyone involved \u2013 clients and the MSP.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While MSP best practices involve a set of performance management around the security and compliance, the real success of a Managed Service Provider (MSP) business hinges in large part on two key criteria:<\/p>\n","protected":false},"author":82,"featured_media":61373,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-61371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/61371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=61371"}],"version-history":[{"count":8,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/61371\/revisions"}],"predecessor-version":[{"id":61469,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/61371\/revisions\/61469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/61373"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=61371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=61371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=61371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}