{"id":60611,"date":"2022-12-19T15:15:58","date_gmt":"2022-12-19T07:15:58","guid":{"rendered":"https:\/\/version-2.com\/?p=60611"},"modified":"2022-12-19T15:19:54","modified_gmt":"2022-12-19T07:19:54","slug":"why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/12\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/","title":{"rendered":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"60611\" class=\"elementor elementor-60611\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a107dd4 elementor-widget elementor-widget-text-editor\" data-id=\"a107dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"meta\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div class=\"meta\"><p>Life seems to be moving at a blazingly fast\u00a0 pace. As so does technology. Maybe even more so. Meaning, it is no wonder we sometimes feel overwhelmed and questioning whether we can keep up. Yes, it is hard to keep up with new technological advances and the threats accompanying them. But the fact is that because technology is moving so fast, that is exactly the reason to stay on top of the latest cybersecurity knowledge and solutions.<br \/>The saying \u201cNew is always better\u201d is clearly not always true, but when it comes to securing our devices, there is some truth to it. We trust what we know, and with technology changing rapidly, we may prefer to keep on using outdated, but trusted, products. But there are a few things to consider, especially in the field of digital security. There are malicious threats we need protection from that are testing and honing exploitation techniques against software product \u2013 especially older versions.<br \/>Upgrading to new software can be a difficult decision, especially when a business has invested heavily in a particular product or funds are scarce to ensure continuity after an upgrade. Some businesses may not want to update at all. Yet sometimes the manufacturer or software provider can press the issue by bringing products to their end of life. End of Life. Also known as a product sunset, this date is a communicated conclusion to the manufacturer\u2019s support for a product (or service) and is generally preceded by a period of limited support. In basic terms, this means that change is afoot.<\/p><\/div><div id=\"content-c8637125\" class=\"csc-frame csc-frame-default\"><p class=\"bodytext\"><strong><em>What is EOL?<br \/>End of Life is a policy change, applying to platforms or products, that has reached the end of its useful life. This decision is made by the manufacturer and typically occurs many years after the software\u2019s or hardware\u2019s production.<\/em><br \/><\/strong><\/p><\/div><div id=\"content-c8637126\" class=\"csc-frame csc-frame-default\"><p class=\"bodytext\">EOL policies evolve with the aim of reducing the number of older product versions that demand constant attention and maintenance. Why do providers do this? To focus time and resources on newer products so that they get the attention they need to protect our customers against new arising threats. Progress cannot be stopped, but attempts are constantly made via new threats to interrupt our journey forward. ESET is here to protect progress, so instead of resisting this momentum, we should ensure we not only appreciate the new technology but also the new threats. The newer the product, the better it is adapted to protect in the current threat environment. This will allow for better protection and make for a smoother experience for our business customers.<\/p><\/div><div id=\"content-c8637133\" class=\"csc-frame csc-frame-default\"><p class=\"bodytext\">It is very important, and we strongly advise our users, to always run the latest version of ESET products. Users should also ensure that other critical software, especially your device\u2019s Operating System (OS), is up to date and fully supported. The status of your OS is very important as it can have many implications to core functions and security too. For example, there have recently been changes to Window\u00b4s End of Life policy. To read more <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/windows-8-and-windows-8-1-end-of-support-and-office-34e28be4-1e4f-4928-b210-3f45d8215595\" target=\"_blank\" rel=\"noopener\">click on this link<\/a>.<\/p><p>The upgrade to the latest ESET product versions has always been at \u201cno cost,\u201d and that is still the case to this day; the fact that access to new product versions is included in the price of your valid license remains unchanged. In this way, updates allow users to employ the most advanced security technologies that are high performing and easy to use, all of which help make our products more effective for you. To check ESET\u00b4s End of Life policy <a href=\"https:\/\/support-eol.eset.com\/en\/\" target=\"_blank\" rel=\"noopener\">click this link<\/a>.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Life seems to be moving at a blazingly fast\u00a0 pace. As s [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,40,61],"tags":[41,489],"class_list":["post-60611","post","type-post","status-publish","format-standard","hentry","category-488","category-eset","category-press-release","tag-eset","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2\" \/>\n<meta property=\"og:description\" content=\"Life seems to be moving at a blazingly fast\u00a0 pace. As s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-19T07:15:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-19T07:19:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea\",\"datePublished\":\"2022-12-19T07:15:58+00:00\",\"dateModified\":\"2022-12-19T07:19:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/\"},\"wordCount\":614,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/0\\\/2\\\/csm_eol-1080x1080_8dcaa21dc6.png\",\"keywords\":[\"ESET\",\"2022\"],\"articleSection\":[\"2022\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/\",\"name\":\"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/0\\\/2\\\/csm_eol-1080x1080_8dcaa21dc6.png\",\"datePublished\":\"2022-12-19T07:15:58+00:00\",\"dateModified\":\"2022-12-19T07:19:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/0\\\/2\\\/csm_eol-1080x1080_8dcaa21dc6.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/_processed_\\\/0\\\/2\\\/csm_eol-1080x1080_8dcaa21dc6.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/","og_locale":"zh_HK","og_type":"article","og_title":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2","og_description":"Life seems to be moving at a blazingly fast\u00a0 pace. As s [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/","og_site_name":"Version 2","article_published_time":"2022-12-19T07:15:58+00:00","article_modified_time":"2022-12-19T07:19:54+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/12\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea","datePublished":"2022-12-19T07:15:58+00:00","dateModified":"2022-12-19T07:19:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/12\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/"},"wordCount":614,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png","keywords":["ESET","2022"],"articleSection":["2022","ESET","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/12\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/","url":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/","name":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png","datePublished":"2022-12-19T07:15:58+00:00","dateModified":"2022-12-19T07:19:54+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/_processed_\/0\/2\/csm_eol-1080x1080_8dcaa21dc6.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/consumer\/why-adding-end-of-life-to-your-cybersecurity-vocabulary-is-a-good-idea\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Why adding \u201cEnd of Life\u201d to your cybersecurity vocabulary is a good idea"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fLB","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=60611"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60611\/revisions"}],"predecessor-version":[{"id":60621,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60611\/revisions\/60621"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=60611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=60611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=60611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}