{"id":32576,"date":"2021-04-26T12:30:58","date_gmt":"2021-04-26T04:30:58","guid":{"rendered":"https:\/\/version-2.com\/?p=32576"},"modified":"2021-06-16T15:41:04","modified_gmt":"2021-06-16T07:41:04","slug":"find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/","title":{"rendered":"Find out which virtual attacks are most common in companies and how to avoid them"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32576\" class=\"elementor elementor-32576\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png\" alt=\"\" width=\"984\" height=\"400\" \/>\n\n<\/p><p>\nWe know that the protection and security of business activities and processes are of paramount importance for a company. This is because, in addition to cyber invasions being vastly frequent in the virtual space, they also offer several problems for a company, especially in the case of data leaks \u2013 whose action is intolerable by LGPD rules, for example.\n<\/p><p>\nFor this reason, we understand that virtual attacks are actions provoked by cybercriminals, who seek to steal business and customer data in order to use them for illicit purposes. Therefore, it is important to know\u00a0<strong>how to prevent cyberattacks\u00a0<\/strong>and how to better protect our systems from cybercriminals.\n<\/p><p>\nDo you want to learn more about it? So, keep reading our post and get all your questions answered.\n<\/p><p>\n<strong>What are the consequences of cyberattacks for companies?<\/strong>\n<\/p><p>\nAs we all know, the importance of knowing\u00a0<strong>how to prevent virtual attacks<\/strong>\u00a0in a company is crucial, as we are not only dealing with sensitive internal data, but also with our customers\u2019 data.\n<\/p><p>\nThus, we can predict some negative consequences for an organization as a result of the\u00a0virtual attacks. Take a look at them:<\/p>\n<ol>\n \t<li><strong>Unstable systems<\/strong><\/li>\n<\/ol>\n<p>\nIn general, one of the issues that we need to take into account as a consequence of virtual attacks is the instability in the entire infrastructure of the company. In other words, this can mean weaker and slower systems, causing processes and activities to be interrupted so that the repair actions themselves can be initiated.\n<\/p><p>\nThis process complicates the routine of work activities, disfavoring the quality and deadline for products and services to its end customers.<\/p>\n<ol start=\"2\">\n \t<li><strong>Reduction of customers<\/strong><\/li>\n<\/ol><p>\nAs a result of a completely inefficient system, we ended up noticing the loss of customers in the medium term. Customers dissatisfied with products and services offered by a company tend to cancel contracts immediately, generating even more losses for the organization.\n<\/p><p>\nThat\u2019s because employee and customer data can be exposed, which tarnishes the brand\u2019s reputation and makes it less competitive.<\/p>\n<ol start=\"3\">\n \t<li><strong>Increasing costs<\/strong><\/li>\n<\/ol>\n<p>\nIf computational and technological issues turn out to be frequent, repair and maintenance costs will also be higher.\n<\/p><p>\nThis is because criminal attacks \u2013 when carried out efficiently \u2013 generate continuous losses, leading to the contracting of outsourced personnel for performing preventive maintenance and monitoring, in addition to the purchase of new equipment, software, and other items to stabilize internal systems.\n<\/p><p>\n<strong>The 4 most common virtual attacks on companies<\/strong>\n<\/p><p>\nNow that you know the concept and consequences of cyberattacks, check out the ones that occur most often in the business environment:<\/p>\n<ol>\n \t<li><strong>Phishing<\/strong><\/li>\n<\/ol>\n<p>\nIn general, phishing is extremely well-known for being basically a strategy to clone pages, websites, messages, among others. The criminal who uses this practice seeks to win customers by having them send personal data, thinking that they are getting involved with reliable companies.\n<\/p><p>\nA practical example of this type of virtual attack is when we regularly see some internet pages \u2013 be it from banks, streaming services, e-mail providers \u2013 asking for personal data in exchange for benefits and advantages.<\/p>\n\n<ol start=\"2\">\n \t<li><strong>Ransomware<\/strong><\/li>\n<\/ol>\n<p>\nWhen dealing with virtual attacks, one of the most feared is, certainly, ransomware. In case you do not know, this type of attack is nothing more than an intelligent way to\u00a0<strong>hijack sensitive data and information<\/strong>, asking for their release.\n<\/p><p>\nIn practical terms, it can all start with malicious advertising, a social media trigger, or even a fake message.\n<\/p><p>\nAfter a certain employee of the company downloads a file with ransomware, the malware already begins to work on the computer system.\n<\/p><p>\nAs soon as it is installed, the ransomware encrypts data and allows criminals to enter the company\u2019s virtual systems and start browsing folders and documents, looking for personal information, data and bank accounts, strategies, among others.\n<\/p><p>\nWhen this occurs, the related processes for<strong>\u00a0preventing virtual attacks<\/strong>\u00a0become much more difficult.<\/p>\n<ol start=\"3\">\n \t<li><strong>Spear Phishing<\/strong><\/li>\n<\/ol>\n<p>\nSpear Phishing is nothing more than another type of Phishing, however, it is focused on specific companies and employees who work in the virtual environment.\n<\/p><p>\nThus, we consider that it is an invasion segmented by the criminals themselves, having techniques, devices, and tools of social engineering to elaborate deceptive schemes and share them as a completely harmless email, website, process, or even a downloadable file.<\/p>\n<ol start=\"4\">\n \t<li><strong>DDoS<\/strong><\/li>\n<\/ol>\n<p>\nCurrently, DDoS is considered one of the\u00a0<strong>most powerful<\/strong>\u00a0virtual attacks. This is because it is simply a \u201cmix of actions\u201d that are directed exclusively to the companies\u2019 servers. In practice, it is totally controlled through a master computer, which in this case, would be the criminal behind the action.\n<\/p><p>\nWith this, it works as if it were a type of system completely secure for the victims, and from there, it offers space for hackers and cybercriminals to exploit vulnerabilities to invade the virtual environment of companies.\n<\/p><p>\nThus, one of the symptoms that the system itself can show is its poor performance.\n<\/p><p>\n<strong>How to avoid virtual attacks?<\/strong>\n<\/p><p>\nAfter understanding the seriousness of virtual invasions, we can now think of efficient ways to protect ourselves from these possible attacks:<\/p>\n<ol>\n \t<li><strong>Using strong passwords<\/strong><\/li>\n<\/ol>\n<p>\nOne of the first tips is to have the responsibility and awareness\u00a0<strong>to create increasingly strong passwords<\/strong>, and preferably they should be different between each account. This makes access by cybercriminals much more difficult, since complex passwords end up not being deductible.\n<\/p><p>\nThe greater the importance of a given systemic process, the more complex the password must be. Examples: bigger passwords for banking processes and applications, less complex passwords for internet login, among others.<\/p>\n<ol start=\"2\">\n \t<li><strong>Using a good antivirus<\/strong><\/li>\n<\/ol>\n<p>\nThere are several efficient antiviruses on the virtual market. So, search for the one that best fits your needs, taking advantage of all its benefits and ensuring that it understands all the fields of protection your business needs.<\/p>\n<ol start=\"3\">\n \t<li><strong>Relying on specialized security companies<\/strong><\/li>\n<\/ol>\n<p>\nIf your company does not know where to start or does not have a more complete idea of the security processes its working activities must have, it can be crucial to have the support of a\u00a0<strong>company specialized in this subject<\/strong>. Therefore, look for a trustworthy brand, which has experience in the subject and an excellent reputation in the market.\n<\/p><p>\nIn addition to your virtual information being under the care of highly trained specialists, you will have even more time to focus on more important business activities.\n<\/p><p>\n<strong>Conclusion<\/strong>\n<\/p><p>\nAs we have seen, virtual attacks are extremely frequent and must be a factor to be taken into account by companies that wish to obtain excellence and quality in the market.\n<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We know that the protection and security of business ac [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,461,61],"tags":[420,462],"class_list":["post-32576","post","type-post","status-publish","format-standard","hentry","category-segura","category-year2021","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Find out which virtual attacks are most common in companies and how to avoid them - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Find out which virtual attacks are most common in companies and how to avoid them - Version 2\" \/>\n<meta property=\"og:description\" content=\"We know that the protection and security of business ac [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T04:30:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T07:41:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Find out which virtual attacks are most common in companies and how to avoid them\",\"datePublished\":\"2021-04-26T04:30:58+00:00\",\"dateModified\":\"2021-06-16T07:41:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/\"},\"wordCount\":1093,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/04\\\/layout-capa-blog-senhasegura-01-01.png\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"Segura\",\"2021\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/\",\"name\":\"Find out which virtual attacks are most common in companies and how to avoid them - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/04\\\/layout-capa-blog-senhasegura-01-01.png\",\"datePublished\":\"2021-04-26T04:30:58+00:00\",\"dateModified\":\"2021-06-16T07:41:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/04\\\/layout-capa-blog-senhasegura-01-01.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/04\\\/layout-capa-blog-senhasegura-01-01.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Find out which virtual attacks are most common in companies and how to avoid them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Find out which virtual attacks are most common in companies and how to avoid them - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/","og_locale":"zh_HK","og_type":"article","og_title":"Find out which virtual attacks are most common in companies and how to avoid them - Version 2","og_description":"We know that the protection and security of business ac [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/","og_site_name":"Version 2","article_published_time":"2021-04-26T04:30:58+00:00","article_modified_time":"2021-06-16T07:41:04+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Find out which virtual attacks are most common in companies and how to avoid them","datePublished":"2021-04-26T04:30:58+00:00","dateModified":"2021-06-16T07:41:04+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/"},"wordCount":1093,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png","keywords":["Segura","2021"],"articleSection":["Segura","2021","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/","url":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/","name":"Find out which virtual attacks are most common in companies and how to avoid them - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png","datePublished":"2021-04-26T04:30:58+00:00","dateModified":"2021-06-16T07:41:04+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png","contentUrl":"https:\/\/senhasegura.com\/assets\/uploads\/2021\/04\/layout-capa-blog-senhasegura-01-01.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/04\/find-out-which-virtual-attacks-are-most-common-in-companies-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Find out which virtual attacks are most common in companies and how to avoid them"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-8tq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/32576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=32576"}],"version-history":[{"count":8,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/32576\/revisions"}],"predecessor-version":[{"id":32826,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/32576\/revisions\/32826"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=32576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=32576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=32576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}