{"id":66622,"date":"2023-04-28T16:12:29","date_gmt":"2023-04-28T08:12:29","guid":{"rendered":"https:\/\/version-2.com\/?p=66622"},"modified":"2024-09-13T16:31:20","modified_gmt":"2024-09-13T08:31:20","slug":"why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/04\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\/","title":{"rendered":"Why security mindset for small-medium companies is critical to business success: talk with Cutec"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"66622\" class=\"elementor elementor-66622\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n<div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong><i>A discussion with Mark Rowland, Co-Founder &amp; Managing Director at Cutec, about how they solved client problems using NordLayer and what to expect for next cybersecurity&#8217;s major challenges and possibilities.<\/i><\/strong><\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.cutec.co.uk\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cutec<\/a> is a Managed Service Provider (MSP) and IT support company from England. Operating in the industry for 25 years, a 20-employee expert team supports a range of small and medium clients across the UK. Whether an organization has a staff of just a few or hundreds of people, Cutec&#8217;s role is to consult companies with technical focus and accuracy to fill in the vacancy of an internal IT person for the client.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7HddHI7np8nBfpO8JIlwyq\/bca45f073b9f5a636587ebb0e516a96e\/Profile_of_Cutec_web_1400x696.png?w=1400&amp;h=696&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"696\" \/>\n\n<picture>The consultancy firm fills in the IT management and knowledge gap, which is a recurring issue for many businesses, especially smaller organizations Cutec gets to consult. However, conversing with different clients revealed another concern \u2014 there\u2019s no cybersecurity mindset. <\/picture><strong>Mark Rowland<\/strong><picture>, a Co-founder and Managing Director at Cutec, shares his insight on how crucial security awareness is for business continuity.\u00a0<\/picture>\n\n<\/div>\n<h2 id=\"business-case-decentralizing-singlesite-infrastructure\" class=\"Heading Heading-h2 text-dark-blue\">Business case: decentralizing single-site infrastructure<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The client has been with Cutec for about 6 years \u2014 during this time, the company of 30 people expanded to an almost 300-employee organization. And as this financial services provider grew into a country-wide company, it started facing security challenges.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cAs for a managed IT service provider, it is important to be there for your client when they need you. It\u2019s our responsibility to support branches dotted around different parts of the UK \u2014 online presence becomes a necessity over physical.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CAs%2520for%2520a%2520managed%2520IT%2520service%2520provider,%2520it%2520is%2520important%2520to%2520be%2520there%2520for%2520your%2520client%2520when%2520they%2520need%2520you.%2520It%25E2%2580%2599s%2520our%2520responsibility%2520to%2520support%2520branches%2520dotted%2520around%2520different%2520parts%2520of%2520the%2520UK%2520%25E2%2580%2594%2520online%2520presence%2520becomes%2520a%2520necessity%2520over%2520physical.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fsecurity-mindset-talk-with-cutec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Being contained in one place and managing 20 people is relatively easy. However, the client business model involved advisors spread all over the country. Combine it with rapid growth during a short time and data sensitivity due to the nature of financial services \u2014 the need to protect databases, CRM, and phone systems was critical.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The foundational elements for security were there: the client had two-factor authentication, password management, and fixed IP in place. It\u2019s secure enough for 20 people sitting in one office, but not if numbers jump to hundred users in dozen cities \u2014 circumstances urged for an extra layer of security.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">An increasing number of VPN connections to internal applications started causing connectivity issues and quickly bogged the network. This was the turning point for Cutec to find a better solution for a VPN route that would ensure security.<\/p>\n\n<h2 id=\"closeup-on-the-solution\" class=\"Heading Heading-h2 text-dark-blue\">Close-up on the solution<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">One of the available options for the client was to get much more powerful broadband for the HQ office, install hardware firewalls, and achieve the wanted level of security for an outrageous expense bill.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Moreover, the solution would bind everything to one location. From a disaster management perspective, it\u2019s not sustainable for business continuity \u2014 if the power is cut off, the internet goes down, and all employees get disconnected despite their location.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The alternative was getting a NordLayer subscription. Although it meant paying per user license, it offered what the company needed \u2014 a fixed IP address that provided much-needed flexibility and stability.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Choosing NordLayer allowed upgrading and downgrading the number of member accounts as the staff comes and leaves and, most importantly, eliminating the dependence on the HQ office \u2014 if the power got cut off, server design allowed carry-on working.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Sorting out the inconvenience of in-house security<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1vupnshNCVs2fN0Gf3vi0A\/85741f878beeae735aaa3953526dbb08\/Types_of_cybersecurity_deployments_web_1400x734.png?w=1400&amp;h=734&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"734\" \/>\n\n<picture>Deployment and maintenance of the on-premise solution meant a lot of man-hours. It included a remote connection to a client&#8217;s PC and setting up their VPN connection.\u00a0<\/picture>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer, on the other hand, provided a simple solution. The MSP had to connect to the Partner Portal and add the user, so they could complete the setup themselves \u2014 click the welcome link to install the VPN.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe solution setup was fantastic as we looked at a massive project and a big headache. Rolling out NordLayer VPN connection to 300 people was achieved in four days. And out of 300 members, we had only five people calling for help, but that&#8217;s because they were cautious, not because they didn&#8217;t know what to do.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520solution%2520setup%2520was%2520fantastic%2520as%2520we%2520looked%2520at%2520a%2520massive%2520project%2520and%2520a%2520big%2520headache.%2520Rolling%2520out%2520NordLayer%2520VPN%2520connection%2520to%2520300%2520people%2520was%2520achieved%2520in%2520four%2520days.%2520And%2520out%2520of%2520300%2520members,%2520we%2520had%2520only%2520five%2520people%2520calling%2520for%2520help,%2520but%2520that's%2520because%2520they%2520were%2520cautious,%2520not%2520because%2520they%2520didn't%2520know%2520what%2520to%2520do.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fsecurity-mindset-talk-with-cutec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">It\u2019s worth mentioning that the client has no one in-house with the knowledge and expertise on cybersecurity. In this case, Cutec is an advisor and a guide for organizations\u2019 cybersecurity strategy, closely collaborating with a single point of contact on-premise, the Technology Director, to help steer the business away from cyber threats.<\/p>\n\n<h2 id=\"expert-insights-take-on-smbs-security\" class=\"Heading Heading-h2 text-dark-blue\">Expert insights: take on SMBs security<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The client scope Cutec works with is usually small-medium sized businesses without internally dedicated IT staff. Better to say SMBs have little understanding of cybersecurity. There\u2019s a persistent tendency for a slow but inevitable change in the business mindset:<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">A now-outdated perspective of \u2018antivirus solves all our security problems\u2019 was effective 10\u201320 years ago \u2014 today you have to think outside the box.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Small-medium enterprises tend to give on-premise servers and migrate to the cloud more often. Core IT support is going to change. It will be more about picking the right cloud solution for people driving the migration to the cloud. Over the next three years, people will drop on-premise stuff and go to the cloud completely, and we&#8217;ll be there to help them with that.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud-edge solutions like NordLayer are going to get more popular over time. Teams work from coffee shops and McDonald\u2019s \u2014 they connect to public Wi-Fi and hot spots and must protect their traffic with tools that work well.<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">A future notion on SMBs from sensitive industries<\/h3>\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5cupUqUaOG1TOttRfdHHvn\/27bce416b955c2b1ca1e584aba8a64f7\/Adoption_of_online_service_provider_products_web_1400x574.png?w=1400&amp;h=574&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"574\" \/>\n\n<picture>The cybersecurity landscape changed\u2014 now it\u2019s about protecting yourself online. At our company, we notice clients are transitioning to online cloud services. The number of adopted vendors and service providers can be three, five, or a dozen online solutions and tools.<\/picture>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Previously, having a server in the office under lock and key with a firewall allowed us to assume that that was enough to keep the company secure. However, small businesses struggle to comprehend the gravity of cybersecurity.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cUsing Office365, therefore, thinking my data is secure is a mistaken approach. Company data might be secure in the Microsoft Data Center, but is it safe where you are accessing it from?\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CUsing%2520Office365,%2520therefore,%2520thinking%2520my%2520data%2520is%2520secure%2520is%2520a%2520mistaken%2520approach.%2520Company%2520data%2520might%2520be%2520secure%2520in%2520the%2520Microsoft%2520Data%2520Center,%2520but%2520is%2520it%2520safe%2520where%2520you%2520are%2520accessing%2520it%2520from?%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fsecurity-mindset-talk-with-cutec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">After Covid, once people started connecting from their home PCs and smartphones, companies without proper security measures risked having their business data on employees&#8217; personal devices.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Larger enterprises and governmental institutions already have an awareness &#8211; sometimes forced by insurance companies and bank regulations &#8211; of owning some security accreditations to filter down the risks. Meanwhile, small-medium enterprises don\u2019t have this perception, and MSPs like Cutec help them drive in the right direction.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Our biggest challenge is overcoming the big issue of clients thinking that security is finite. Threats are layered and complex \u2014 getting an antivirus or a firewall might solve only a small part of the potential risks and gaps for threat actors to exploit. Instead, business owners and their teams must keep up-to-date with a cybersecurity mindset to guarantee business continuity.<\/p>\n\n<h2 id=\"pro-cybersecurity-tips\" class=\"Heading Heading-h2 text-dark-blue\">Pro cybersecurity tips<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Education on cybersecurity is increasing, and it is becoming a common topic of conversation. More and more employees and decision-makers now acknowledge a serious lack of digital security knowledge. To make the learning process easier, it\u2019s better to ask questions and have some starting points. Here\u2019re some pro tips you can begin with:<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7Hxmlxgold5rnvrYsubsZY\/e217ee8c56f4b11d3cb1a78c70f3ae09\/Quotes_of_Cutec_web_1400x704.png?w=1400&amp;h=704&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"704\" \/>\n\n<picture>Explore cybersecurity to broaden your knowledge about threats and solutions for managing them. NordLayer offers layered-by-design network access solutions for all kinds of businesses and their team setups to rise to the challenges of a modern company. And at NordLayer, we care about guidance. Thus, explore our <\/picture><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/learn\/\">Cybersecurity Learning Center<\/a><picture> and <\/picture><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/decision-makers-kit\/\">Decision Maker\u2019s Kit<\/a><picture> for in-depth support for building your own cybersecurity strategy.<\/picture>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Want to join forces to build a more resilient and aware cybersecurity landscape for businesses and organizations? NordLayer invites Managed Service Providers to seize the opportunity to join our <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/partner-program\/\">Partner Program<\/a> \u2014 reach out to learn more about it.<\/p>\n\n<\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A discussion with Mark Rowland, Co-Founder &amp; Managi [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,973,1075,61],"tags":[974,1076,1132],"class_list":["post-66622","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-nord-security","category-year2023","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2\" \/>\n<meta property=\"og:description\" content=\"A discussion with Mark Rowland, Co-Founder &amp; Managi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-28T08:12:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Why security mindset for small-medium companies is critical to business success: talk with Cutec\",\"datePublished\":\"2023-04-28T08:12:29+00:00\",\"dateModified\":\"2024-09-13T08:31:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\\\/\"},\"wordCount\":1324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5EL8rnbgJ2jlE7Leer2X4j\\\/30e748b1cee4832f6af4e098ebfc0c70\\\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"NordLayer\",\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/\",\"name\":\"Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5EL8rnbgJ2jlE7Leer2X4j\\\/30e748b1cee4832f6af4e098ebfc0c70\\\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-04-28T08:12:29+00:00\",\"dateModified\":\"2024-09-13T08:31:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5EL8rnbgJ2jlE7Leer2X4j\\\/30e748b1cee4832f6af4e098ebfc0c70\\\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5EL8rnbgJ2jlE7Leer2X4j\\\/30e748b1cee4832f6af4e098ebfc0c70\\\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/healthcare-cybersecurity-and-patient-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why security mindset for small-medium companies is critical to business success: talk with Cutec\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/","og_locale":"en_US","og_type":"article","og_title":"Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2","og_description":"A discussion with Mark Rowland, Co-Founder &amp; Managi [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/","og_site_name":"Version 2","article_published_time":"2023-04-28T08:12:29+00:00","article_modified_time":"2024-09-13T08:31:20+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/04\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Why security mindset for small-medium companies is critical to business success: talk with Cutec","datePublished":"2023-04-28T08:12:29+00:00","dateModified":"2024-09-13T08:31:20+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/04\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\/"},"wordCount":1324,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["NordLayer","Nord Security","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/04\/why-security-mindset-for-small-medium-companies-is-critical-to-business-success-talk-with-cutec\/","url":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/","name":"Why security mindset for small-medium companies is critical to business success: talk with Cutec - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-04-28T08:12:29+00:00","dateModified":"2024-09-13T08:31:20+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5EL8rnbgJ2jlE7Leer2X4j\/30e748b1cee4832f6af4e098ebfc0c70\/Case_Study_Cutec_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/healthcare-cybersecurity-and-patient-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Why security mindset for small-medium companies is critical to business success: talk with Cutec"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hky","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=66622"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66622\/revisions"}],"predecessor-version":[{"id":66626,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/66622\/revisions\/66626"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=66622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=66622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=66622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}