{"id":78139,"date":"2024-05-06T17:35:57","date_gmt":"2024-05-06T09:35:57","guid":{"rendered":"https:\/\/version-2.com\/?p=78139"},"modified":"2024-05-02T17:39:30","modified_gmt":"2024-05-02T09:39:30","slug":"the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/05\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\/","title":{"rendered":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"78139\" class=\"elementor elementor-78139\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Humans, by nature, are complex creatures resistant to change and education.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b> explains that the struggle lies not only in our cognitive limitations but also in our emotional makeup. Overcoming these barriers requires motivation, passion, and consistency\u2014qualities that are not always easy to foster.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In a fascinating dive into the intricacies of human behavior and social engineering, Dr. Abbie Maro\u00f1o shares her journey into psychology, sparked by a youthful curiosity and an early commitment to research. Her path from academia to applying her expertise in the private sector demonstrates her strong commitment to understanding human dynamics, particularly its intersection with cybersecurity.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In the context of social engineering, this article highlights the powerful influence of group dynamics and the principle of social proof.<\/p><h2 id=\"the-interviews-highlights\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The interview\u2019s highlights<\/h2><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Educating humans is challenging<\/b>. Success in educating humans hinges on motivation due to our natural resistance to change and limitations in memory and cognitive capacity.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Embracing shame for personal growth<\/b>. Dr. Maro\u00f1o\u2019s work suggests that acknowledging and understanding shame can catalyze deep personal development, challenging the notion that shame should be entirely dismissed.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Group dynamics\u2019s role in social engineering<\/b>. Cybercriminals exploit social proof and our propensity to follow the crowd. Awareness and resistance are key to safeguarding against these tactics.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Real-world cybersecurity training is crucial<\/b>. Dr. Maro\u00f1o advocates for simulation-based training over traditional methods, particularly in sectors like healthcare, to make learning more relevant and effective.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>The power of self-relevance in learning<\/b>. Effective education requires making cybersecurity personally relevant, using real-world simulations to improve engagement and practical application.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>&#8220;Trust but verify&#8221; enhances cybersecurity<\/b>. Emotional intelligence and critical thinking are vital in defending against manipulation, emphasizing a balanced approach to trust.<\/p><\/li><\/ul><h2 id=\"key-insight-1-motivation-and-engagement-are-crucial-for-effective-learning\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #1: motivation and engagement are crucial for effective learning.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: Abbie, you\u2019ve been studying human behavior for a while now. What\u2019s your conclusion? Are humans easy to train and educate by nature?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: No, human beings are not easy to educate. The memory system is very prone to errors, and we have a limited cognitive capacity. No doubt, we have the ability to be educated, but it really depends on a ton of different factors.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Educating someone against their will, especially in areas like security practices, is ineffective. For learning to be effective and for information to transition into long-term memory, the learner must be engaged and attentive.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Without motivation, information will likely enter one ear and exit the other. This is supported by research indicating that mere exposure to information is insufficient for learning\u2014attention to the material is essential.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 1\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/41Kg6wcRPJMGdvtZahyx4i\/5d200157fae396f90d653850f0cdbb25\/Quote1.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"589\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">However, learning becomes much more attainable if there is motivation, passion, and dedication. The concept of &#8216;cramming&#8217; before an exam illustrates this well. It&#8217;s a widespread belief that we can quickly absorb information, but the reality is that both the brain&#8217;s short-term and long-term memory functions require time and consistency to learn truly.<\/p><h2 id=\"key-insight-2-group-motivation-and-social-proof-influence-individual-decisionmaking-in-social-engineering-contexts\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #2: Group motivation and social proof influence individual decision-making in social engineering contexts.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: Speaking of motivation\u2014personal or collective motives\u2014can bring better learning experiences and results?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: While individual self-interest can drive motivation, the presence of group motivations can significantly amplify it.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Being part of a team with shared goals fosters a sense of responsibility and accountability, much like the dynamic observed in programs like Weight Watchers. Despite criticisms of Weight Watchers for its food quality and the psychological implications of its &#8220;sins&#8221; concept, the program&#8217;s success is attributed to the strong social support and collective mindset it promotes.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This group cohesion encourages individuals to stay committed to their goals, as the sense of being observed and held accountable by peers increases their motivation to maintain progress.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: How do peers (a group) influence an individual&#8217;s decision-making in the event of social engineering?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: Social proof influences our decisions by making us more likely to trust or choose something endorsed by others. This tactic is frequently utilized by social engineers, who manipulate appearances to blend in or create false endorsements, leveraging our tendency to trust familiar figures or the majority.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 2\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4GkZBlBZ8u8uUgUTH2YIEX\/959d5d4395e06217fa342c8c5b5684c7\/Quote2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"545\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For instance, mentioning a known colleague like Sally from accounting in a story can foster trust by association. This principle is also why celebrity endorsements and the phenomenon of joining a queue at a busy restaurant work effectively.<\/p><h2 id=\"key-insight-3-embracing-and-understanding-shame-is-essential-for-genuine-personal-growth-instead-of-eradicating-it-for-the-narrative-of-mental-health-and-empowerment\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #3: embracing and understanding shame is essential for genuine personal growth instead of eradicating it for the narrative of mental health and empowerment.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: As a published author, your latest book explores personal improvement through shame. Can you tell us more about the premise of this approach?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: My first book will officially be released in July, though I&#8217;ve already been sharing it with select individuals and doing book signings. My second book is set to come out in December.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">I started writing this self-help book, &#8220;Work in Progress,&#8221; because I noticed a significant need for a deeper understanding of our emotions. Many self-help books and popular media, though well-intentioned, lack a scientific approach and often suggest that we must rid ourselves of shame to achieve good mental health and empowerment.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">However, this doesn&#8217;t align with the complex nature of the human brain or how we actually process emotions. Our brain, which is a significant energy consumer despite its small size, doesn&#8217;t generate emotions without reason. Emotions are signals, meant not always to be acted upon but to inform us. Dismissing shame overlooks a crucial aspect of our emotional well-being and self-awareness.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 3\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3D9anzPs2fAjgYC7NhqlCw\/3a58cf57799eed487159f44a4370b75c\/Quote3.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"545\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">My aim was to create a book that&#8217;s honest, raw, and relatable, challenging the overly optimistic narrative that &#8220;everything will be fine&#8221; with a more grounded, realistic approach to personal development.<\/p><h2 id=\"key-insight-4-cybercriminals-manipulate-nonverbal-cues-to-scrutinize-first-impressions\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #4: cybercriminals manipulate nonverbal cues to scrutinize first impressions.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: In your Forbes article, you said that certain social skills can help people elicit the information they want. What are these skills, and how do cybercriminals use them?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: Cybercriminals exploit nonverbal communication to manipulate perceptions, leveraging our instinctual habit of making rapid judgments about people&#8217;s personalities based on their appearance and behavior, a process known as &#8220;thin slicing.&#8221;<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This evolutionary trait, which helped our ancestors quickly assess threats, today leads us to assign traits like friendliness or competence based on superficial cues like smiles or confident demeanor, often without any supporting evidence.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 4\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5gaQE6AZ41s771vRzVSBPF\/a724f4af63ac82f8b5efda3f59d55523\/Quote4.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"595\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cybercriminals use this knowledge to their advantage, presenting themselves as authoritative and trustworthy to bypass our defenses.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Our reluctance to revise first impressions makes us vulnerable to such manipulation, as we seek to validate our initial judgments rather than question them. Thus, understanding and being aware of these cognitive biases can help us better defend against the tactics of social engineers.<\/p><h2 id=\"key-insight-5-emotional-awareness-is-critical-in-resisting-manipulation-by-social-engineers-and-making-more-informed-decisions\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #5: emotional awareness is critical in resisting manipulation by social engineers and making more informed decisions.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: Can you share what personality traits and psychological defenses should be nurtured to resist social engineering attempts?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: General emotional awareness in cybersecurity, explaining how social engineers exploit emotions to manipulate their targets, is important.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Recognizing when emotions like fear or anger influence decisions is crucial, as these emotions can cloud judgment and lead to quick, unthoughtful actions.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"498\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/lYslZ7Vi2RLbmYO863r1X\/a52df3b2f164b03c26a9275da4ef1af1\/Quote5.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 5\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For example, taking a moment to breathe and assess one&#8217;s feelings before reacting to a potentially malicious email can allow the brain&#8217;s logical centers, like the prefrontal cortex, to engage and evaluate the situation more critically. This approach is vital because, despite the sophistication of attacks, the final decision to engage (e.g., clicking a link) rests with the human user.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Beyond technical measures, fostering a security mindset that includes emotional regulation and awareness is key. This not only helps individuals resist manipulation but also adapts to evolving threats, emphasizing the role of human judgment in cybersecurity defenses.<\/p><h2 id=\"key-insight-6-effective-cybersecurity-training-requires-realworld-simulations-and-engagement\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #6: effective cybersecurity training requires real-world simulations and engagement.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: Let\u2019s explore dynamic and sensitive environments like healthcare where cybersecurity awareness is crucial, but there\u2019s no time to train and educate specialists. What human behavior traits and social engineering tactics could be exploited to achieve positive learning results?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: Learning is most effective when information directly relates to the individual.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Traditional security training, like online videos, often fails to engage healthcare professionals because it lacks this personal relevance and fails to bridge the gap between theoretical knowledge and practical application.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 6\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5KPsM72fdTwrqnwlnb52by\/e9b8c6ba430dca1118387a120b043de9\/Quote6.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"449\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This approach not only identifies vulnerabilities but also personalizes the learning process, making it more impactful. By engaging employees in scenarios like simulated phishing (vishing and smishing) attacks, they learn to recognize and react to threats more effectively.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Positive behaviors are reinforced, while areas for improvement are identified and addressed. It is important to invest in comprehensive security training to protect sensitive information proactively, warning that the costs of inadequate training far outweigh the investment in robust, interactive learning experiences.<\/p><h2 id=\"key-insight-7-trust-but-verify-ensures-safety-in-cybersecurity-by-combining-trust-with-critical-verification-of-requests\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key insight #7: &#8220;trust but verify&#8221; ensures safety in cybersecurity by combining trust with critical verification of requests.<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>NordLayer<\/b>: What benefits should be amplified, and what behaviorist tactics should be used to help people become more aware of cyber threats? What should be included in the cybersecurity training, in your opinion?<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>: Tactics like &#8220;trust but verify&#8221; emphasize the balance between maintaining trustful relationships and being cautious.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quote 7\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7JfxfE3vRAuPRMyKgem8n4\/7ed7d663894745471a7b3772ff348cf4\/Quote7.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"545\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This method allows for cooperative relationships to flourish while safeguarding against manipulation. Verification becomes a critical step in this process, ensuring that one does not blindly fulfill requests without appropriate scrutiny.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Such an approach relies heavily on emotional responses and critical thinking to discern the legitimacy of requests, advocating for a balanced stance of trust with a readiness to verify, avoiding the pitfalls of unwarranted suspicion.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Thank you.<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Dr. Abbie Maro\u00f1o<\/b>\u2019s passion for understanding human behavior ignited at 17, leading her from early research endeavors in university to a fulfilling career in academia and, ultimately, into the private sector.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Dr. Maro\u00f1o\u2019s work reveals the intricate dance between human psychology and cybersecurity, highlighting the need for an empathetic, informed approach to educating and protecting against cyber threats. Her emphasis on emotional awareness, group influences, and innovative training methods offers a fresh perspective on building resilient cybersecurity defenses rooted in understanding human nature.<\/p><h2 id=\"how-nordlayer-can-help\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer can help<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer can significantly enhance an organization&#8217;s cybersecurity posture by fostering a culture of &#8220;<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/zero-trust\/network-access\/\">trust but verify<\/a>&#8221; within the workplace.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer empowers employees with the tools and knowledge necessary to scrutinize and validate requests, thus minimizing the risk of social engineering attacks. Its advanced security solutions, designed to address the nuanced challenges discussed, such as the need for emotional awareness and critical thinking, provide a robust framework for organizations to protect their sensitive data.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Humans, by nature, are complex creatures resistant to c [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-78139","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2\" \/>\n<meta property=\"og:description\" content=\"Humans, by nature, are complex creatures resistant to c [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-06T09:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o\",\"datePublished\":\"2024-05-06T09:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\\\/\"},\"wordCount\":1801,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/48rXoaF3lxVXqKQRrJwxLE\\\/4d3c6049cc71e4a03e51fb20ef815763\\\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/\",\"name\":\"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/48rXoaF3lxVXqKQRrJwxLE\\\/4d3c6049cc71e4a03e51fb20ef815763\\\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-05-06T09:35:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/48rXoaF3lxVXqKQRrJwxLE\\\/4d3c6049cc71e4a03e51fb20ef815763\\\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/48rXoaF3lxVXqKQRrJwxLE\\\/4d3c6049cc71e4a03e51fb20ef815763\\\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/the-role-of-emotions-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2","og_description":"Humans, by nature, are complex creatures resistant to c [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/","og_site_name":"Version 2","article_published_time":"2024-05-06T09:35:57+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o","datePublished":"2024-05-06T09:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\/"},"wordCount":1801,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/the-role-of-emotions-and-learning-in-cybersecurity-an-interview-with-dr-abbie-marono\/","url":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/","name":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-05-06T09:35:57+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/48rXoaF3lxVXqKQRrJwxLE\/4d3c6049cc71e4a03e51fb20ef815763\/Emotions_and_learning_in_cybersecurity__NordLayer_and_Dr._Abbie_Maron_o.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/the-role-of-emotions-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"The role of emotions and learning in cybersecurity: an interview with Dr. Abbie Maro\u00f1o"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kkj","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=78139"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78139\/revisions"}],"predecessor-version":[{"id":78143,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78139\/revisions\/78143"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=78139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=78139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=78139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}