{"id":102496,"date":"2025-01-27T16:08:33","date_gmt":"2025-01-27T08:08:33","guid":{"rendered":"https:\/\/version-2.com\/?p=102496"},"modified":"2025-01-24T16:11:17","modified_gmt":"2025-01-24T08:11:17","slug":"cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/01\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\/","title":{"rendered":"Cybersecurity for small business: how to stay safe against digital threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"102496\" class=\"elementor elementor-102496\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"Article_wrapper__8_7eU [&amp;&gt;&lt;p&gt;*+*]:mt-12\"><div class=\"richtext\"><h2 id=\"phishing\" class=\"heading-xl text-primary\">Phishing<\/h2><p class=\"body-md text-primary\">According to <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\" data-link-full-refresh=\"true\">Verizon\u2019s 2024 Data Breach Investigations Report (DBIR)<\/a>, 68% of company data breaches involved non-malicious human elements, like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/social-engineering-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to \/blog\/social-engineering-attacks\/\">social engineering<\/a>. The FBI reported that, in 2023, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/sanfrancisco\/news\/fbi-releases-internet-crime-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.fbi.gov\/contact-us\/field-offices\/sanfrancisco\/news\/fbi-releases-internet-crime-report\" data-link-full-refresh=\"true\">phishing accounted for 34% of complaints<\/a>, making it the most reported type of cybercrime.<\/p><p class=\"body-md text-primary\">A phishing attack is a form of social engineering in which the attacker mimics a legitimate contact to trick an unsuspecting user into clicking on a malicious link, luring out their sensitive data, or infecting their device with <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/what-is-malware\/\" data-ga-slug=\"Link to \/blog\/what-is-malware\/\">malware<\/a>. Over the years, phishing scams have become increasingly sophisticated, making it harder to identify them.<\/p><p class=\"body-md text-primary\">There are a few things you can do to secure your business from a phishing attack. First, you need to get the entire staff on the same page. Educate them about the intricacies of phishing and provide avenues to report any suspicious events. You should also enable anti-phishing filters within your company&#8217;s email and consider installing additional security software optimized to detect fraudulent emails.<\/p><h2 id=\"ransomware\" class=\"heading-xl text-primary\">Ransomware<\/h2><p class=\"body-md text-primary\"><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/what-is-ransomware\/\" data-ga-slug=\"Link to \/blog\/what-is-ransomware\/\">Ransomware<\/a> hits SMBs at an incredible rate. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.datto.com\/resources\/ebook-comprehensive-ransomware-protection-detection-response-and-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.datto.com\/resources\/ebook-comprehensive-ransomware-protection-detection-response-and-recovery\/\" data-link-full-refresh=\"true\">Datto\u2019s Global State of the Channel Ransomware Report<\/a> notes that 85% of managed service providers (MSPs) reported ransomware attacks targeting their clients. In the first quarter of 2024, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.\/coveware.com\/blog\/2024\/4\/17\/raas-devs-hurt-their-credibility-by-cheating-affiliates-in-q1-2024\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.\/coveware.com\/blog\/2024\/4\/17\/raas-devs-hurt-their-credibility-by-cheating-affiliates-in-q1-2024\" data-link-full-refresh=\"true\">companies with up to 1,000 employees accounted for nearly 75% of all ransomware attacks<\/a>. In most cases, phishing emails are behind ransomware threats.<\/p><p class=\"body-md text-primary\">During a ransomware attack, data on the affected computer is almost instantly encrypted, making it unusable in any context unless it is decrypted. Once the files are encrypted, the attackers demand a ransom\u2014hence the name\u2014in return for the decryption procedure.<\/p><p class=\"body-md text-primary\">One of the best ways to defend your company\u2019s data from a ransomware attack is by making regular software updates and data backups. Software updates, including OSs, ensure that no security gaps can be exploited by bad actors. At the same time, data backups allow you to be safe even if any of your data is compromised. Another step is deploying company-wide antimalware and antivirus software that can detect any malware before it does any harm to your company\u2019s network.<\/p><p>\u00a0<\/p><\/div><div class=\"richtext\"><h2 id=\"viruses\" class=\"heading-xl text-primary\">Viruses<\/h2><p class=\"body-md text-primary\">Viruses are perhaps some of the most common cybersecurity threats affecting businesses and individuals alike. They\u2019re pieces of software that, when installed upon a device and activated, start executing various malicious commands.<\/p><p class=\"body-md text-primary\">Viruses can be transmitted to a device via hardware and software. Connecting a suspicious USB flash drive containing a virus to a device is a common strategy for spreading malware. Phishing is also frequently combined with viruses\u2014if a user downloads a suspicious attachment or opens a scam website, their device can be infected.<\/p><p class=\"body-md text-primary\">The damage that a virus causes depends on its programmed purpose. Some viruses might slow down a device and use its resources to mine cryptocurrencies in a process known as <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/what-is-cryptojacking\/\" data-ga-slug=\"Link to \/blog\/what-is-cryptojacking\/\">cryptojacking<\/a>. Others lurk in the system, granting access to all inner files without the victim noticing. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/what-is-keylogger\/\" data-ga-slug=\"Link to \/blog\/what-is-keylogger\/\">Keyloggers<\/a> are a type of virus that can read the user\u2019s keyboard input, allowing them to steal credentials and similar sensitive information.<\/p><p class=\"body-md text-primary\">Businesses are often targeted using viruses that can take over the whole internal network of computers, leading to ransom demands. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/what-is-trojan-horse-virus\/\" data-ga-slug=\"Link to \/blog\/what-is-trojan-horse-virus\/\">Trojans<\/a>, in particular, are dangerous, as they can destroy the entire system from within.<\/p><p class=\"body-md text-primary\">For small businesses, viruses can cause irreparable damage, starting from compromised and lost data to hardware damage and replacement demands. As viruses become increasingly sophisticated, they require more expensive measures than regular antivirus software. They might also exploit out-of-date software with security vulnerabilities.<\/p><p class=\"body-md text-primary\">Preventing an organization\u2019s devices from acquiring viruses calls for similar measures and phishing or ransomware protection. Companies must ensure all devices are up-to-date to avoid zero-day exploits or similar security gaps. All devices should be regularly monitored by antivirus software, and IT teams should be informed if suspicious programs or files appear on the device or if a user has opened a phishing email or website. Companies can also use anti-phishing and anti-malware plug-ins for their email services to prevent employees from accidentally downloading viruses.<\/p><h2 id=\"weak-passwords\" class=\"heading-xl text-primary\">Weak passwords<\/h2><p class=\"body-md text-primary\">As far as market research is concerned, weak passwords are the biggest threat to cybersecurity for small businesses. Here\u2019s just a handful of studies and reports that reveal password vulnerabilities in practice:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Verizon\u2019s 2024 Data Breach Investigations Report (DBIR) notes that 77% of hacking-related breaches are linked to stolen credentials.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/most-common-passwords-list\/\" data-ga-slug=\"Link to \/most-common-passwords-list\/\">NordPass\u2019 study of the 200 most common passwords in 2024<\/a> revealed that a whopping 79% of the world\u2019s most popular passwords could be cracked in under a second.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">A study into the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/fortune-500-password-study\/\" data-ga-slug=\"Link to \/fortune-500-password-study\/\" data-link-full-refresh=\"true\">password habits of Fortune 500 companies<\/a> highlighted that even the biggest players out there struggle with password security, with 20% of the passwords being the exact name of the company or some variation.<\/p><\/li><\/ul><p class=\"body-md text-primary\">Ensuring password security in a business environment is not that complicated. A password management solution should be on the company\u2019s must-have list, no matter its size or market. A <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\/\">password manager<\/a> such as NordPass allows businesses not only to securely store valuable login information but also share it within the confines of the organization. Additionally, it increases employee productivity and helps you meet compliance requirements.<\/p><h2 id=\"cloud-computing\" class=\"heading-xl text-primary\">Cloud computing<\/h2><p class=\"body-md text-primary\">Cloud computing products are a huge part of today\u2019s business. Nearly all SMBs use cloud-based applications in one way or another, whether for productivity or security benefits. In many instances, cloud computing solutions are highly scalable. However, as helpful as cloud computing solutions are for business IT security, organizations must understand that such products have their risks.<\/p><p class=\"body-md text-primary\">When it comes to cloud-based applications, it is essential to evaluate their security posture. For instance, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/features\/zero-knowledge-architecture\/\" data-ga-slug=\"Link to \/features\/zero-knowledge-architecture\/\">zero-knowledge architecture<\/a> is one thing to look for in applications, as it ensures the privacy and security of any data that the application handles. To reap all of the cloud\u2019s benefits, such as scalability, flexibility, and reduced IT costs, SMBs must develop a cloud security plan to clearly define security policies and procedures for using cloud-based applications.<\/p><h2 id=\"cybersecurity-tips-for-small-businesses\" class=\"heading-xl text-primary\">Cybersecurity tips for small businesses<\/h2><p class=\"body-md text-primary\">Establishing the right cybersecurity practices in an SMB does not have to be a costly affair. A large chunk of what makes small business IT security function like a well-oiled machine is down to employee awareness and correct credential management practices. Here are some cost-efficient ways you can employ safe practices in your organization:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Ensure employee education.<\/b> As you can tell, password mismanagement is a massive problem for company data security. This misuse often stems from a lack of employee awareness. Provide your team with regular training on cybersecurity practices, digital threats, and how to keep themselves protected from bad actors.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Perform routine security checks.<\/b> Zero-day exploits are beloved by hackers as an easy way in to systems. The best way to protect your company devices from unwanted visitors is to lock the backdoors by keeping all systems and software up-to-date and running regular checks for vulnerabilities.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Install a strong antivirus.<\/b> If you or another employee find a suspicious .exe file on your desktop, the first course of action is to quarantine it. This can be easily done by installing antivirus software on every company-run computer. SMB and enterprise antivirus solutions simplify this process by keeping all computers in the same network protected.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Add spam filters to company email.<\/b> Scammers who use social engineering are efficient at producing realistic emails that can trick even professionals. To avoid incidents of opening fishy attachments or logging in to a spoof portal, add a spam filter to your organization\u2019s email inboxes that lets employees easily flag and report suspicious emails.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Use a password manager.<\/b> Contrary to popular belief, password managers aren\u2019t just useful for generating complex, unique passwords. Business password managers like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/plans\/business\/\" data-ga-slug=\"Link to \/plans\/business\/\">NordPass<\/a> also offer centralized controls, such as setting up <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/password-policy\/\" data-ga-slug=\"Link to \/blog\/password-policy\/\">password policies<\/a>, observing all <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/activity-log-feature-live\/\" data-ga-slug=\"Link to \/blog\/activity-log-feature-live\/\">organizational activity<\/a>, or managing <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/blog\/sharing-hub\/\" data-ga-slug=\"Link to \/blog\/sharing-hub\/\">shared access<\/a> between all employees.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Enforce multi-factor authentication (MFA).<\/b> In the 2020s, a password is no longer enough to protect your organization\u2019s sensitive information. To improve their security measures, many companies enforce multi-factor authentication use for all work-related accounts. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/nordpass-authenticator\/\" data-ga-slug=\"Link to \/nordpass-authenticator\/\" data-link-full-refresh=\"true\">NordPass Authenticator<\/a> even lets you store your MFA codes with your login credentials and autofill everything at once.<\/p><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing According to Verizon\u2019s 2024 Data Breach Invest [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1305,61],"tags":[974,1077,1131],"class_list":["post-102496","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity for small business: how to stay safe against digital threats - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for small business: how to stay safe against digital threats - Version 2\" \/>\n<meta property=\"og:description\" content=\"Phishing According to Verizon\u2019s 2024 Data Breach Invest [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T08:08:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Cybersecurity for small business: how to stay safe against digital threats\",\"datePublished\":\"2025-01-27T08:08:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\\\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f518bf898f\\\/cybersecurity-threats-smb.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"Nord Security\",\"2025\",\"NordPass\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/\",\"name\":\"Cybersecurity for small business: how to stay safe against digital threats - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f518bf898f\\\/cybersecurity-threats-smb.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-01-27T08:08:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f518bf898f\\\/cybersecurity-threats-smb.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f518bf898f\\\/cybersecurity-threats-smb.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/cybersecurity-threats-small-medium-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for small business: how to stay safe against digital threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for small business: how to stay safe against digital threats - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/","og_locale":"zh_HK","og_type":"article","og_title":"Cybersecurity for small business: how to stay safe against digital threats - Version 2","og_description":"Phishing According to Verizon\u2019s 2024 Data Breach Invest [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/","og_site_name":"Version 2","article_published_time":"2025-01-27T08:08:33+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/01\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Cybersecurity for small business: how to stay safe against digital threats","datePublished":"2025-01-27T08:08:33+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/01\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["Nord Security","2025","NordPass"],"articleSection":["Nord Security","NordPass","2025","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/01\/cybersecurity-for-small-business-how-to-stay-safe-against-digital-threats\/","url":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/","name":"Cybersecurity for small business: how to stay safe against digital threats - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2025-01-27T08:08:33+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f518bf898f\/cybersecurity-threats-smb.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/cybersecurity-threats-small-medium-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for small business: how to stay safe against digital threats"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qFa","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=102496"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102496\/revisions"}],"predecessor-version":[{"id":102500,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102496\/revisions\/102500"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=102496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=102496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=102496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}