{"id":68148,"date":"2023-06-12T11:52:35","date_gmt":"2023-06-12T03:52:35","guid":{"rendered":"https:\/\/version-2.com\/?p=68148"},"modified":"2023-06-12T11:54:23","modified_gmt":"2023-06-12T03:54:23","slug":"the-risks-of-using-spreadsheets-for-cyber-asset-management","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/06\/the-risks-of-using-spreadsheets-for-cyber-asset-management\/","title":{"rendered":"The risks of using spreadsheets for cyber asset management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"68148\" class=\"elementor elementor-68148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"mr-4 ml-4 pb-5 mb-5 mt-0 blog-body\"><p>An accurate and comprehensive asset inventory is vital for an effective cybersecurity program. Relying on basic spreadsheets for asset management could introduce severe risks to your entire organization.<\/p><p>Read on as we explore the downsides of using spreadsheets for cyber asset management and highlight the clear advantages of using a dedicated <strong>cyber asset management<\/strong> tool to empower your security program, rather than hinder it.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg\" width=\"3200\" height=\"1600\" \/><\/p><h2 id=\"spreadsheets-are-simply-inefficient-for-cyber-asset-management\">Spreadsheets are simply inefficient for cyber asset management <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>A recent study found that a staggering <strong>73% of cybersecurity and IT professionals <a href=\"https:\/\/pipelinepub.com\/news\/Research-73-Organizations-Use-Spreadsheets-to-Manage-Security-Hygiene-and-Posture\" target=\"_blank\" rel=\"noopener\">use spreadsheets to manage security hygiene<\/a><\/strong> and posture.<\/p><p>There are two primary reasons why one might use spreadsheets for asset management:<\/p><ol style=\"font-size: 1.1rem; margin-top: 1rem;\"><li style=\"margin-bottom: 0.5rem;\">An asset inventory tool has never been used in your organization.\u00a0<\/li><li>You need to work around your current asset inventory tools.<\/li><\/ol><p>While spreadsheets can adapt to numerous use cases since they handle all sorts of data, this dexterity also makes them less than ideal for IT asset management. Furthermore, while Excel and Google Sheets can be an easy first step to track asset data for an IT environment, they fail entirely as an efficient cyber asset management solution.<\/p><h3 id=\"7-disadvantages-to-spreadsheets-asset-management\">7 disadvantages to spreadsheets asset management <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><ol style=\"font-size: 1.1rem; margin-top: 2rem;\"><li style=\"margin-bottom: 1rem;\"><strong>Manual data collection<\/strong><br \/>Spreadsheets require time-consuming manual updates. Without automation, they often become outdated. Reliance on tracking changes and identifying responsible parties manually introduces errors, hindering the detection and resolution of security incidents. This limitation makes it harder to monitor the integrity of the asset inventory and respond swiftly to cyber threats.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Inconsistent attributes<\/strong><br \/>Different departments and individuals have discrepancies in what attributes they prioritize for data collection. Security teams may focus on listening ports, while IT may prioritize warranty expiration. This can lead to confusion and inconsistent data collection over time.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Outdated information<\/strong><br \/>Asset records in spreadsheets can vary widely in age, ranging from a week to a year, depending on when someone bothered to update them. This significantly hampers effective incident response and security program management.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Lack of detail<\/strong><br \/>Due to the aforementioned points, spreadsheets often lack sufficient detail. Humans dislike repetitive manual work, and the limitations of spreadsheets prevent them from containing comprehensive information.<\/li><li style=\"margin-bottom: 1rem;\"><strong>Incomplete inventory \/ managed-only devices<\/strong>The Achilles&#8217; heel of any asset inventory program is unmanaged devices. Spreadsheets cannot be updated with assets that are unknown.<p>According to a <a href=\"https:\/\/www2.deloitte.com\/global\/en\/pages\/risk\/articles\/it-asset-management-itam-global-survey-2021.html\" target=\"_blank\" rel=\"noopener\">Deloitte research report<\/a>, <strong>32% of organizations believe that &#8220;Shadow IT&#8221; assets pose the greatest challenge for ITAM<\/strong>. Rogue devices installed by employees, third-party vendors, or through shadow IT lack standard security controls like EDR agents, making them easy targets for adversaries.<\/p><p>The same report states that <strong>18% of organizations are considering non-active or repurposed IT assets<\/strong>. With manual data entry, unmanaged devices can go unnoticed or neglected for extended periods, leading to uncertainty within teams regarding their significance or reluctance to invest effort in investigating them.<\/p><p>Here are just some of the key problems unmanaged assets pose:<\/p><ul style=\"margin-top: -1rem;\"><li>Audit violations<\/li><li>Cannot be patched<\/li><li>Cannot be upgraded<\/li><li>Cannot be automated<\/li><li>Cannot be turned off<\/li><\/ul><\/li><li style=\"margin-bottom: 1rem;\"><strong>Hard to share<\/strong>Sharing is not built into Excel. Sharing Excel sheets linked to other dependencies also causes all sorts of problems. In the meantime, Google Sheets copies come with a touch of showmanship, flaunting a prepending &#8220;Copy of&#8221; like a magician demonstrating a trick. However, with it being so easy to duplicate documents, one sleight-of-hand from a nefarious user could go easily unnoticed.<\/li><li style=\"margin-bottom: 1rem;\"><strong>No version control<\/strong>Version control becomes a challenge as spreadsheets lack proper mechanisms to track changes and maintain data consistency. It is difficult and time-consuming to trace back who updated which asset in whose copy of which version of the spreadsheet.<p>Multiple copies of the same spreadsheet create confusion and hinder the ability to have accurate and up-to-date information. This limitation affects data integrity and poses challenges in maintaining a reliable asset inventory. With Excel, sharing automatically creates a copy, and with Google Sheets, anyone with edit access can make a copy. These copies can take on a life of their own, resulting in various states of inaccuracy.<\/p><\/li><\/ol><h2 id=\"spreadsheets-are-high-risk-for-sensitive-information\">Spreadsheets are high-risk for sensitive information <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>As if the inefficiencies weren\u2019t bad enough, spreadsheets lack sophisticated controls and are easily duplicated, increasing the risk of information exposure. In truth, using spreadsheets for <strong>any<\/strong> sensitive information is a liability. Storing asset details in a spreadsheet is <strong>perilous<\/strong>.<\/p><p>PeopleDAO, a group formed to buy a copy of the U.S. Constitution, lost 76.5 ETH ($120,000) after the accounting lead <a href=\"https:\/\/www.theblock.co\/post\/219214\/peopledao-hacked-via-google-sheets\" target=\"_blank\" rel=\"noopener\">mistakenly shared a Google Sheet<\/a> with edit access to a payout form on a public Discord channel.<\/p><p>Human error aside, hackers have a notorious history of exploiting enterprise products. In 2021, Microsoft fell victim to a <a href=\"https:\/\/blog.morphisec.com\/new-jssloader-trojan-delivered-through-xll-files\" target=\"_blank\" rel=\"noopener\">malware attack<\/a> spread through Excel spreadsheets, and in 2019, hackers bypassed Google filters to launch <a href=\"https:\/\/marcoramilli.com\/2019\/01\/30\/spreading-csv-malware-over-google-sheets\/\" target=\"_blank\" rel=\"noopener\">CSV malware via Google Sheets<\/a>.<\/p><p>Both companies have continued to be victims of vulnerabilities and phishing campaigns over the years:<\/p><ul style=\"font-size: 1.1rem;\"><li style=\"margin-bottom: 0.5rem;\"><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-beware-this-massive-phishing-campaign-using-malicious-excel-macros-to-hack-pcs\/\">Massive phishing campaign using malicious Excel macros to hack PCs<\/a> (2020)<\/li><li style=\"margin-bottom: 0.5rem;\"><a href=\"https:\/\/thehackernews.com\/2020\/12\/a-google-docs-bug-could-have-allowed.html\">A Google Docs Bug Could Have Allowed Hackers See Your Private Documents<\/a> (2021)<\/li><li><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/google-docs-comments-weaponized-in-new-phishing-campaign\">Google Docs Comments Weaponized in New Phishing Campaign<\/a> (2022)<\/li><\/ul><p>Access to just <strong>one<\/strong> spreadsheet could be the key to everything that a bad actor needs to compromise your entire network. The potential repercussions, including the costs associated with a data breach, loss of profits, expensive lawsuits, and customer and partner attrition, far exceed the investment required for a secure and comprehensive <a href=\"https:\/\/www.runzero.com\/solutions\/use-case\/cyber-asset-inventory\/\" target=\"_blank\" rel=\"noopener\">asset inventory solution<\/a>.<\/p><h2 id=\"beyond-spreadsheets--go-caasm\">Beyond spreadsheets \u2013 go CAASM <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>It is clear to see that there are significant downsides to using spreadsheets to manage cyber assets, yet organizations proceed to adopt this method with the support of other tools. However, <a href=\"https:\/\/www.runzero.com\/blog\/limits-risks-edr-asset-management\/\" target=\"_blank\" rel=\"noopener\">EDRs<\/a>, vulnerability scanners, CMDBs, NACs, and free asset management solutions all have asset management limitations. Not only do these tools lack comprehensive visibility into the asset landscape, but using spreadsheets to supplement or work around them only inherits the same limitations.<\/p><p>The manual process involved with spreadsheets introduces the risk of human error, especially as the number of assets and data sources increases. Managing access and enforcing the principle of least privilege, as well as restricting who can view, edit, or delete the inventory, becomes increasingly difficult. Without proper access controls, maintaining a secure environment and protecting sensitive information becomes a daunting task.<\/p><p>Correlating asset data from different sources poses challenges because each tool or data source uses its own format. It becomes arduous to accurately compare and analyze data when it is not normalized within the same time ranges. Without proper correlation and normalization, the ability to understand asset relationships, identify vulnerabilities or misconfigurations, and respond to security incidents in a timely manner is negatively impacted.<\/p><p>Although Google Sheets and Excel allow third-party plugins and extensions to enhance usability and functionality, granting this type of access is also high-risk. Third-parties gain access using an OAuth process. As part of this process applications can request specific scopes, gaining formidable privileges.<\/p><div style=\"text-align: center; margin: 2rem 0;\"><img decoding=\"async\" style=\"border: 5px solid #fafafa;\" src=\"\/img\/posts\/oauth-google.png\" alt=\"Example of an OAuth scope request\" width=\"60%\" \/><br \/><i>Example of an OAuth scope request from a third-party application for a Google product<\/i><\/div><p>The wrong plugin, developed with malicious intent, could wreak havoc by pilfering your sensitive information. Furthermore, once a third-party add-on has been granted access permissions, it will retain them until they are manually revoked. This means that forgotten add-ons, not used for several years, could still have access to your data. Managing this situation without a CASB or SSPM solution becomes a near-impossible task, adding yet another tool to your stack.<\/p><p>In contrast, a <a href=\"https:\/\/www.runzero.com\/solutions\/use-case\/cyber-asset-attack-surface-management\/\" target=\"_blank\" rel=\"noopener\">cyber asset attack surface management (CAASM) solution<\/a> addresses all of these limitations, offering security, automation, integration, scalability, reporting, collaboration, and compliance support. One major benefit of CAASM is the ability to bring in data from multiple sources, allowing for automated data collection, correlation, and normalization. The best CAASM solutions also include active scan data. With a comprehensive view of all assets, organizations can prioritize security efforts, identify potential security gaps, and make informed decisions to protect their network. Correlation among different sources is not only a desirable feature but also a table stakes requirement for an effective cyber asset management solution. It enables organizations to have a holistic view of their assets, streamline workflows, and implement proactive security measures to effectively mitigate risks.<\/p><p><strong>runZero is a cyber asset management solution that includes CAASM functionality<\/strong>, and can safely and securely integrate with other security tools and systems, such as vulnerability management platforms, Security Information and Event Management (SIEM) solutions, and Internet scanning services.<\/p><p>As a standalone solution, runZero performs unauthenticated active scans powered by high-fidelity fingerprinting to quickly and safely provide a complete and accurate asset inventory, even on fragile IoT and OT networks. As a whole, runZero is designed to effectively address the unique challenges and requirements of cybersecurity asset management, which a spreadsheet could never achieve.<\/p><section class=\"w-100 bg-white py-1 section-two-columns\" style=\"padding: 10px; border: 5px solid #fafafa; margin: 2rem 0 -1rem 0;\"><div class=\"container container--feature my-3\"><div class=\"row align-items-center\"><div class=\"col-lg-6\" style=\"padding: 50px;\"><a href=\"\/case-studies\/customers\/presidio\/\"><img decoding=\"async\" src=\"\/img\/case-studies\/presidio\/presidio-logo.png\" width=\"100%\" \/><\/a><\/div><div class=\"col-12 col-lg-6 plr-0 d-lg-block\" style=\"padding: 20px;\"><p><span style=\"margin-bottom: 20px; margin-top: 10px; font-size: 1.3rem; font-weight: 600;\">Learn how Presidio <u>eliminated spreadsheets<\/u> for greater visibility across their internal and client networks with runZero<\/span><\/p><p><a class=\"button button-outline-warning\" href=\"\/case-studies\/customers\/presidio\/\">Read the case study<\/a><\/p><\/div><\/div><\/div><\/section><h2 id=\"spreadsheets-vs-runzero\">Spreadsheets vs runZero <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h2><p>As a whole, runZero is designed to address the unique challenges and requirements of cybersecurity asset management effectively, which a spreadsheet comparatively could never do. Below are the notable ways runZero far surpasses spreadsheets for cyber asset management:<\/p><h3 id=\"automation\">Automation <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>Unlike spreadsheets, runZero automates the entire <a href=\"https:\/\/www.runzero.com\/solutions\/use-case\/cyber-asset-discovery\/\" target=\"_blank\" rel=\"noopener\">asset discovery<\/a>, inventory and tracking process; offering real-time updates, accurate data synchronization, and a holistic view of an organization\u2019s assets and network.<\/p><h3 id=\"scalability\">Scalability <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>Spreadsheets struggle to handle large-scale asset inventories, leading to performance issues and decreased efficiency. runZero is built to handle vast amounts of data, and millions of assets, providing a scalable solution to accommodate growing asset portfolios, from small business to large enterprise.<\/p><h3 id=\"advanced-security\">Advanced Security <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>Spreadsheets lack robust security features, making it easier for unauthorized individuals to access and manipulate them. runZero prioritizes security and provides robust features, offering advanced role-based access control (RBAC) and <a href=\"https:\/\/www.runzero.com\/blog\/organizational-hierarchies\/\" target=\"_blank\" rel=\"noopener\">organizational hierarchies<\/a> to ensure that only authorized individuals can access and modify the asset inventory. Our SSO and RBAC features are available in all editions. Our commitment to helping the world be more secure means we don\u2019t gate security features in the higher tiers.<\/p><h3 id=\"reporting-and-analytics\">Reporting and Analytics <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>runZero has robust reporting and analytics capabilities, allowing organizations to generate detailed reports on asset inventory, services running on the network, current vulnerabilities, and more. This is essential when needing to provide insights and metrics that can assist in decision-making, resource allocation, and risk mitigation strategies.<\/p><h3 id=\"collaboration-and-workflow\">Collaboration and Workflow <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>Spreadsheets make it difficult to collaborate and streamline workflows. runZero enables IT and security teams to work together more efficiently, share insights, and coordinate response efforts through asset ownership, alerts, third-party integrations, and canned queries for rapid zero-day response.<\/p><h3 id=\"compliance-and-audit-support\">Compliance and Audit Support <i class=\"fa fa-fw fa-link smallx95\"><\/i><\/h3><p>It is near impossible to maintain an up-to-date asset inventory with spreadsheets. runZero helps organizations maintain exemplary <a href=\"https:\/\/www.runzero.com\/solutions\/use-case\/cyber-hygiene-remediation\/\" target=\"_blank\" rel=\"noopener\">cyber hygiene<\/a> through automatic asset tracking, documenting information, changes, and security controls, making it easy to demonstrate compliance with industry regulations and standards.<\/p><section class=\"w-100 large-bg-v2 py-5\"><div class=\"container my-3\"><div class=\"row align-items-center\"><div class=\"col-xs-12 col-lg-7\"><h2>Try runZero free<\/h2><p class=\"mb-4 mt-3\"><strong>Upgrade your asset management.<\/strong><\/p><p>Find out what\u2019s connected to your network in less than 20 minutes with a <a href=\"https:\/\/www.runzero.com\/try\/signup\/\" target=\"_blank\" rel=\"noopener\">21-day trial<\/a>, after which, downgrade to our free tier for personal use or for organizations with fewer than 256 devices.<\/p><p><a class=\"btn btn-cta\" href=\"\/try\/signup\/\">Start trial<\/a><\/p><\/div><div class=\"col-xs-12 col-lg-4 offset-lg-1 pt-5\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/img\/icons\/teams.png\" alt=\"Join our team\" \/><\/div><\/div><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An accurate and comprehensive asset inventory is vital  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1075,61],"tags":[977,1076],"class_list":["post-68148","post","type-post","status-publish","format-standard","hentry","category-runzero","category-year2023","category-press-release","tag-runzero","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The risks of using spreadsheets for cyber asset management - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The risks of using spreadsheets for cyber asset management - Version 2\" \/>\n<meta property=\"og:description\" content=\"An accurate and comprehensive asset inventory is vital [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-12T03:52:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-12T03:54:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-risks-of-using-spreadsheets-for-cyber-asset-management\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The risks of using spreadsheets for cyber asset management\",\"datePublished\":\"2023-06-12T03:52:35+00:00\",\"dateModified\":\"2023-06-12T03:54:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-risks-of-using-spreadsheets-for-cyber-asset-management\\\/\"},\"wordCount\":1822,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/spreadsheet-asset-management-risks.jpeg\",\"keywords\":[\"runZero\",\"2023\"],\"articleSection\":[\"runZero\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/the-risks-of-using-spreadsheets-for-cyber-asset-management\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/\",\"name\":\"The risks of using spreadsheets for cyber asset management - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/spreadsheet-asset-management-risks.jpeg\",\"datePublished\":\"2023-06-12T03:52:35+00:00\",\"dateModified\":\"2023-06-12T03:54:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/spreadsheet-asset-management-risks.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/spreadsheet-asset-management-risks.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/limits-risks-spreadsheets-asset-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The risks of using spreadsheets for cyber asset management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The risks of using spreadsheets for cyber asset management - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/","og_locale":"zh_HK","og_type":"article","og_title":"The risks of using spreadsheets for cyber asset management - Version 2","og_description":"An accurate and comprehensive asset inventory is vital [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/","og_site_name":"Version 2","article_published_time":"2023-06-12T03:52:35+00:00","article_modified_time":"2023-06-12T03:54:23+00:00","og_image":[{"url":"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/06\/the-risks-of-using-spreadsheets-for-cyber-asset-management\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The risks of using spreadsheets for cyber asset management","datePublished":"2023-06-12T03:52:35+00:00","dateModified":"2023-06-12T03:54:23+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/06\/the-risks-of-using-spreadsheets-for-cyber-asset-management\/"},"wordCount":1822,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg","keywords":["runZero","2023"],"articleSection":["runZero","2023","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/06\/the-risks-of-using-spreadsheets-for-cyber-asset-management\/","url":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/","name":"The risks of using spreadsheets for cyber asset management - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#primaryimage"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg","datePublished":"2023-06-12T03:52:35+00:00","dateModified":"2023-06-12T03:54:23+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#primaryimage","url":"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg","contentUrl":"https:\/\/www.runzero.com\/img\/posts\/spreadsheet-asset-management-risks.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/limits-risks-spreadsheets-asset-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The risks of using spreadsheets for cyber asset management"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hJa","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=68148"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68148\/revisions"}],"predecessor-version":[{"id":68152,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68148\/revisions\/68152"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=68148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=68148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=68148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}