{"id":65634,"date":"2023-04-12T11:00:07","date_gmt":"2023-04-12T03:00:07","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=65562"},"modified":"2024-09-13T16:31:22","modified_gmt":"2024-09-13T08:31:22","slug":"top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/04\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\/","title":{"rendered":"Top cybersecurity trends to be on the lookout for in 2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"65634\" class=\"elementor elementor-65634\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><article><p class=\"my-4 blog-paragraph text-still-dark-blue\">Much like seasonal flu, cyber threats are constantly evolving every year. While the coronavirus curve has been, for the most part, flattened and more enterprises opened up their offices for on-premise employees, the number of cyberattacks continues to grow. Even last year, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.securitymagazine.com\/articles\/98810-global-cyberattacks-increased-38-in-2022\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cyberattacks increased by 38% in 2022, compared to 2021<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Even without covid as a catalyst, businesses are still becoming more digital, leading to increased attacks. In this environment, cybersecurity is a real challenge, and both business managers and network administrators have a real head-scratcher on their hands. Here are our predictions on the cybersecurity trends for this year.<\/p><h2 id=\"cybersecurity-trends-for-2023\" class=\"Heading Heading-h2 text-dark-blue\">Cybersecurity trends for 2023<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity is no longer an IT manager\u2019s concern. It\u2019s something that comes into play when making key business decisions. Data breaches can turn the business upside down with penalties and loss of customer trust. It\u2019s a challenge that can come from outside and inside with improperly configured networks.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">As <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/blog\/achieving-security-in-digital-transformation\/\">digital transformation<\/a> is becoming more prevalent among businesses, so does the increase of various threats. Here are the eight main cybersecurity trends shaping this year\u2019s digital environment.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=750&amp;h=452&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1080&amp;h=650&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1366&amp;h=823&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1400&amp;h=843&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><\/picture><\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1400&amp;h=843&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"843\" \/><\/p><p><picture><img decoding=\"async\" style=\"object-fit: cover; opacity: 1;\" title=\"Top cybersecurity trends for 2023 blog visual web 1400x843\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1400&amp;h=843&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=750&amp;h=452&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1080&amp;h=650&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1366&amp;h=823&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1ybyI6TtH7WOGYATNEMg7S\/9d5f281c3f1e0bdcba977fc186dcd444\/Top_cybersecurity_trends_for_2023_blog_visual_web_1400x843.png?w=1400&amp;h=843&amp;q=50&amp;fm=png 1400w\" alt=\"Top cybersecurity trends for 2023 blog visual web 1400x843\" width=\"1\" height=\"0.6021428571428572\" data-main-image=\"\" \/><\/picture><span style=\"color: #121213; font-size: 22px;\">Chat GPT-enforced attacks<\/span><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">Soon after OpenAI launched the intelligent chatbot ChatGPT, it was quickly revealed that it could do more than just form responses across many knowledge domains. Cybercriminals have <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2023\/01\/06\/chatgpt-cybercriminal-malware-female-chatbots\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">already started to use this tool for building hacking tools<\/a>, while scammers are gathering knowledge to build similar chatbots to use for impersonation.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">While the publicly available ChatGPT-coded tools are quite rudimentary, it seems that it\u2019s only a matter of time before hackers can turn the AI to their advantage. In general, the least of its contributions is that it lowers the entry threshold by being a huge help for novice malware developers. Even without coding assistance, it helps to write genuine-sounding phishing emails for hackers.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Although ChatGPT has various safeguards to prevent it from being used for exploitation, this is something that businesses should keep in mind. <strong>Artificial intelligence is going mainstream<\/strong> which levels the playing field for hackers and can put increased pressure on your cybersecurity plan.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Remote and hybrid employees risks<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">After the pandemic, businesses have settled with hybrid workforce models. In some cases, these models are relics of a period when the Covid-19 outbreak forced the digital transition. As this development had to happen very quickly and not interrupt business operations, this also meant that the security measures weren&#8217;t always without gaps.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This blend of employees working on-premises, remote working contractors, and a wide variety of their used company-issued and personal devices makes it <strong>a colossal job to secure everything<\/strong>. For IT administrators, the attack surface is too huge to oversee everything that is happening. As data breach cases pile up, we\u2019ll likely continue to see an increased interest in securing business networks and balancing them with workplace flexibility.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Automation of cybersecurity<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">As hackers themselves are starting to leverage AI for their exploits, it\u2019s only natural that businesses should keep up. Data sources multiply exponentially, <strong>so automation is necessary to crunch numbers<\/strong> before humans can analyze them. This allows companies to get the best of both worlds and dramatically improve their cybersecurity status.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Various sources show that successful AI pairings can <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/ai-cybersecurity\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">extend network visibility by up to 35%<\/a>. These developments clearly show that AI has the potential to be a key component when transforming network security operations. Leveraging machine learning moves organizations forward and builds more sophisticated systems to withstand the most complex online threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">International state-sponsored attacks<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">While state-sanctioned cyberattacks are nothing new, the ongoing war in Ukraine marked a turning point for a steep increase. Russia remains largely isolated from the rest of the Western world, and <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/dig.watch\/trends\/ukraine-conflict-digital-and-cyber-aspects\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">64% of Russian hacking was directed directly at Ukraine<\/a>. These are huge numbers, even without factoring in hacking attempts at their allies. Cyber espionage is escalating in other areas as the US recently shot down <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.cnbc.com\/2023\/02\/04\/us-military-prepares-to-take-down-suspected-chinese-surveillance-balloon.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the Chinese surveillance balloon<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">As all this is happening, <strong>a business can easily be caught in the crossfire<\/strong>. This makes private companies and critical infrastructure organizations prime targets for credential theft, vulnerability exploitation, or ransomware. In such a climate, not having a cybersecurity plan in place is a severe liability, and businesses will likely take action to address IT security shortcomings.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Building a security-aware culture<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">According to Verizon, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">85% of breaches involve a human element<\/a>, so investing in cybersecurity technologies but <strong>skimping on the workforce is missing the forest for the trees<\/strong>. In today\u2019s climate, thinking that cybersecurity risks are a problem for the IT department can blow up when you least expect it. Every single employee must be aware of potential cyber risks and know how to deal with them.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">In some cases, this may require building transparent information security policies. In others, security awareness training may be necessary. Security culture building will become a key factor in many organizations this year. As social engineering attack numbers aren\u2019t subsiding, there\u2019s no other way to combat these threats than through company culture.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Data breaches will continue to increase<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Data breaches increase yearly more than they did the previous year, and <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/data-breaches-rise-by-70-q3-2022\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">this year will be no exception<\/a>. Data is still one of the most valuable assets, and organizations still leave plenty of room for attackers to exploit gaps in the fence. Building a firm infrastructure isn\u2019t cheap or simple, either, so most companies exist hoping they won\u2019t be the next target.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This said prevention is much more effective (and cheaper) than settlements, lawsuits, and fines for data security violations. Yet, many businesses still rely on legacy software without any risk management policy and procedure updates. We can expect that more businesses will be caught off guard this year while others will try to learn from others\u2019 mistakes rather than their own.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Global recession serves as a catalyst for hackers<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">As many experts are warning about economic downturns, this can catalyze cybercrime. Most cyberattacks are financially backed, so as the economy shrinks due to global geopolitical events like Russia\u2019s war in Ukraine, this sends a shockwave throughout all spheres of life. Hacking, therefore, can become a lucrative option if a person has the skills and no other options to earn a living wage.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Hackers-for-hire, therefore, may emerge in search of easy money, which can have various devastating consequences for companies. While some might perform penetration tests or collect bug bounties, others may not be so ethical. This should be considered, especially in Europe, considering its geopolitical tensions.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Credential stealing will continue to rise<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Various reports show that <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.lookout.com\/documents\/threat-reports\/us\/lookout-rise-in-mobile-phishing-in-pubsec.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mobile device vulnerabilities targeting credentials are on the rise<\/a>. Hackers know that employees use their IoT devices to access the company network. So these devices are user-managed. They tend to have quite more vulnerabilities that hackers could exploit.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">What also helps hackers is that most systems are still protected with only passwords. It\u2019s especially easy to crack such a setup when employees reuse the same passwords. A move towards passwordless or hardware identity tokens is happening slowly. This proves to be a lucrative opportunity for thieves. Some experts claim that we\u2019ll also see more second-factor authentication exploits via SMS and push-based multi-factor authentication solutions this year.<\/p><h2 id=\"tips-on-how-to-prepare-your-business-for-2023\" class=\"Heading Heading-h2 text-dark-blue\">Tips on how to prepare your business for 2023<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">To prepare for this year, companies should <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/blog\/2023-budgeting-and-cybersecurity\/\">start with budgeting<\/a>. The amount spent on cybersecurity in 2021 and 2022 should be a benchmark for the 2023 budget. It should also adjust according to how many significant changes occurred in the organization and the cybersecurity landscape.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Adjusting the cybersecurity budget according to your company size is also common. A rule of thumb is to allocate at least 10-20% of your total budget. Revising the budgeting plan as you go is always a good idea. Cybersecurity threats and landscape can change a lot throughout the year, so staying flexible is one of the methods to stay ahead of the curve.<\/p><h2 id=\"how-can-nordlayer-help-to-protect-your-business-in-2023\" class=\"Heading Heading-h2 text-dark-blue\">How can NordLayer help to protect your business in 2023?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Most recent developments in cyberspace are relevant to every business as most of them will be affected by them. Organizations need trustworthy allies to deter cyber threats as the threats keep piling up.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">A modern remote network access solution like NordLayer is developed to integrate threat, network, and security management centrally to provide an explicit range of issue-targeted features. Especially with the help of a convenient design that combines cloud-based platforms, data privacy protection, and access control security strategies.\u00a0<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer covers security with a centralized control interface and product integration to existing infrastructure. It provides <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/secure-remote-access\/\">secure remote access solutions<\/a> for hybrid environments and implements <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/zero-trust-security\/\">zero trust<\/a> for distributed workforces conveying everything to the cloud environment.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Achieve a multilayered security protection network and data environment \u2014 secure your business in 2023 with NordLayer \u2014 <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\">reach out to talk more<\/a>.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Much like seasonal flu, cyber threats are constantly ev [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,1130,973,61],"tags":[974,1076,1132],"class_list":["post-65634","post","type-post","status-publish","format-standard","hentry","category-year2023","category-nordlayer","category-nord-security","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top cybersecurity trends to be on the lookout for in 2023 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top cybersecurity trends to be on the lookout for in 2023 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Much like seasonal flu, cyber threats are constantly ev [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T03:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Top cybersecurity trends to be on the lookout for in 2023\",\"datePublished\":\"2023-04-12T03:00:07+00:00\",\"dateModified\":\"2024-09-13T08:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\\\/\"},\"wordCount\":1459,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5qmu5Zc5D6JQt5CvdMJUhA\\\/cfab950eba58e6524d046b9e4cfbbd93\\\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"2023\",\"NordLayer\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/04\\\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/\",\"name\":\"Top cybersecurity trends to be on the lookout for in 2023 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5qmu5Zc5D6JQt5CvdMJUhA\\\/cfab950eba58e6524d046b9e4cfbbd93\\\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-04-12T03:00:07+00:00\",\"dateModified\":\"2024-09-13T08:31:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5qmu5Zc5D6JQt5CvdMJUhA\\\/cfab950eba58e6524d046b9e4cfbbd93\\\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5qmu5Zc5D6JQt5CvdMJUhA\\\/cfab950eba58e6524d046b9e4cfbbd93\\\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/top-cybersecurity-trends-for-in-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top cybersecurity trends to be on the lookout for in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top cybersecurity trends to be on the lookout for in 2023 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/","og_locale":"zh_HK","og_type":"article","og_title":"Top cybersecurity trends to be on the lookout for in 2023 - Version 2","og_description":"Much like seasonal flu, cyber threats are constantly ev [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/","og_site_name":"Version 2","article_published_time":"2023-04-12T03:00:07+00:00","article_modified_time":"2024-09-13T08:31:22+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/04\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Top cybersecurity trends to be on the lookout for in 2023","datePublished":"2023-04-12T03:00:07+00:00","dateModified":"2024-09-13T08:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/04\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\/"},"wordCount":1459,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["2023","NordLayer","Nord Security","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/04\/top-cybersecurity-trends-to-be-on-the-lookout-for-in-2023\/","url":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/","name":"Top cybersecurity trends to be on the lookout for in 2023 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-04-12T03:00:07+00:00","dateModified":"2024-09-13T08:31:22+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5qmu5Zc5D6JQt5CvdMJUhA\/cfab950eba58e6524d046b9e4cfbbd93\/Top_cybersecurity_trends_for_2023_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/top-cybersecurity-trends-for-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Top cybersecurity trends to be on the lookout for in 2023"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-h4C","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/65634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=65634"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/65634\/revisions"}],"predecessor-version":[{"id":65672,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/65634\/revisions\/65672"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=65634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=65634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=65634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}