{"id":73948,"date":"2023-12-21T12:25:18","date_gmt":"2023-12-21T04:25:18","guid":{"rendered":"https:\/\/version-2.com\/?p=73948"},"modified":"2023-12-04T12:27:47","modified_gmt":"2023-12-04T04:27:47","slug":"understanding-defense-in-depth-a-comprehensive-guide","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/12\/understanding-defense-in-depth-a-comprehensive-guide\/","title":{"rendered":"Understanding defense in depth: A comprehensive guide"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"73948\" class=\"elementor elementor-73948\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg\" width=\"1062\" height=\"597\" \/><\/p><div><div><div class=\"my-3 PostContent_excerpt__wB2qU\"><p class=\"nord-text text-lead font-medium leading-normal text-black\"><span style=\"color: #000000;\">Navigating digital security threats can sometimes feel like crossing a minefield. With new dangers arising, it\u2019s not enough to rely on a single tool to keep all sensitive data in an organization secure. That\u2019s where defense in depth comes in \u2013 an approach that combines physical and digital security measures for an all-encompassing protection strategy.<\/span><\/p><p class=\"nord-text text-lead font-medium leading-normal text-black\"><span style=\"color: #000000;\">However, this approach doesn\u2019t mean using random tools \u2013 there\u2019s a system to how each defense layer is implemented. Let\u2019s see how setting up a defense in depth strategy benefits organizations.<\/span><\/p><\/div><div class=\"PostContent_content__eM_tn text-black break-words\" data-content-type-blog=\"true\"><section class=\"my-3\"><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">What is defense in depth?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Defense in depth (DiD) is the strategy of layering different physical and digital resources to reinforce the security measures in an organization. It\u2019s a preventative approach aiming to decrease the odds that sensitive data will be breached or stolen.<\/p><p class=\"nord-text text-base leading-normal text-black\">Defense in depth shares its name with a Roman military strategy. This tactic saw the Roman military taking a defensive approach rather than going after targets themselves. If the enemies reached the Roman Empire&#8217;s borders, the Romans would allow them to cross. Once on their native soil, the Roman military would attack the enemy from within the border provinces. This made it more difficult for enemy forces to reach cities and cause significant damage to land.<\/p><p class=\"nord-text text-base leading-normal text-black\">Centuries later, this layered strategy has become what we now know as defense in depth cybersecurity. The principle is simple \u2014 an organization sets up a range of digital and physical protective barriers that discourage attackers from striking in the first place. Even if a hacker manages to crack one of the layers, they still have to face the rest of the defensive system. With enough varied layers, an organization may establish an impenetrable line of defense.<\/p><p class=\"nord-text text-base leading-normal text-black\">You might be eager to cut into this defensive cake and see each of its layers. So let\u2019s take a closer look at how this approach works in practice.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">Defense in depth architecture<\/h2><p class=\"nord-text text-base leading-normal text-black\">To visualize the concept of defense in depth, you can think of concentric castles \u2013 medieval structures that were fortified with multiple inner and outer walls. Each wall added challenge to attacking forces and helped fend off threats longer. At its core, defense in depth works the same \u2013 each layer makes it more difficult to breach the system.<\/p><p class=\"nord-text text-base leading-normal text-black\">Defense in depth mechanisms are generally grouped into three categories:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">Administrative controls<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">Physical controls<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">Technical controls<\/p><\/li><\/ul><p class=\"nord-text text-base leading-normal text-black\">Each of the categories consists of different tools and strategies. The range of tools used in defense in depth varies based on the needs and resources available to an organization. Typically, technical controls make up half the architecture, with physical and administrative controls accounting for the rest.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Administrative controls<\/b> concern the procedures and policies that your company employs. This encompasses processes in practically all areas of the organizational structure. The processes of hiring and how much information is revealed to a candidate, onboarding and offboarding, and data processing regulations all contribute to administrative controls. You can also think of company-wide initiatives such as safety training or protocols that are set in place in case of a data-related incident.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Physical controls<\/b> refer to a hands-on approach to security. The security guards patrolling the building, cameras installed on the premises, and the locks protecting the entrances and exits all count as physical security measures in a defense in depth infrastructure. Remember that while many attacks occur exclusively online, it doesn\u2019t mean that someone won\u2019t try to break in or snoop around the headquarters. Protecting your physical data storage is as crucial as the digital side.<\/p><p class=\"nord-text text-base leading-normal text-black\">Finally, <b>technical controls<\/b> encompass a broad range of digital tools that help ensure the protection of your sensitive information. When we talk about technical controls, we typically discuss software, although hardware storage can also be used for data storage and protection. Antivirus and anti-spyware tools, cloud storage, virtual private networks, password managers \u2013 anything that can act as an extra layer of security works.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">Essential principles of the defense in depth security strategy<\/h2><p class=\"nord-text text-base leading-normal text-black\">There\u2019s a philosophy behind every strategy. At their core, the defense in depth principles are simple \u2013 layering different security measures to optimize the protection of a database. The more layers a system encompasses, the more discouraged malicious attackers are from striking it. If they manage to rip off one security layer, they encounter a new one deeper down.<\/p><p class=\"nord-text text-base leading-normal text-black\">The goal of defense in depth is to account for potential failures in all areas and minimize loss if a successful breach were to occur. While software breaches and corrupt hardware can be the culprits of a vulnerable system, the weakest link is often the employees themselves.<\/p><p class=\"nord-text text-base leading-normal text-black\">Negligent behavior, such as insecure file sharing, use of weak passwords, and reuse of the same login credentials for different accounts, can lead to easy targeting and subsequent damage. As such, combining the three types of defense in depth controls aims to protect the company from attackers as much as from human error.<\/p><h3 class=\"nord-text text-h3 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">The power of layered security in cyber defense<\/h3><p class=\"nord-text text-base leading-normal text-black\">Despite an overlap and the tendency to use both terms interchangeably, defense in depth and layered security aren\u2019t the same. While defense in depth is an all-encompassing structure that aims to protect the security of all crucial data in your organization, layered security is focused on using different measures to withhold a particular threat or protect one area of the organizational structure.<\/p><p class=\"nord-text text-base leading-normal text-black\">As you can imagine, setting up layered security or defense in depth layers is an intricate process. After all, you\u2019re essentially building defensive walls to protect sensitive data at your company&#8217;s core. It\u2019s about finding the right people and tools for your company, dedicating your resources to keeping things running smoothly, and blocking attackers before they even strike.<\/p><h3 class=\"nord-text text-h3 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">Defense in depth \u2013 in practice<\/h3><p class=\"nord-text text-base leading-normal text-black\">Hypothetically, here\u2019s what defense in depth cybersecurity infrastructure can look like in an organization:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">The physical headquarters of a company are patrolled by on-site security 24\/7.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">Each employee is issued a unique keycard to access the premises.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All employee accounts are protected by login credentials.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All passwords are changed at regular intervals according to company policy.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All employees must use a password manager and enable two-factor authentication.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">Remote employees connect to the company\u2019s virtual private network to avoid using insecure public Wi-Fi.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All computers are equipped with antivirus software.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All operating systems and software must be kept up to date.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All employees should complete digital safety training.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">The company should undergo regular auditing to ensure all security measures are in place.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">All sensitive company and client data must be stored in secure servers.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">A dedicated team should have an established action plan in case of a data breach.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\">A support team should be on call in case of an emergency.<\/p><\/li><\/ul><p class=\"nord-text text-base leading-normal text-black\">Notice which of these measures fall under technical, administrative, and physical controls. As you implement your own strategy, you\u2019ll see that, in some instances, the strategies and tools overlap and support each other, reinforcing the effectiveness of your layered defense mechanism.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">Best practices of defense in depth implementation<\/h2><p class=\"nord-text text-base leading-normal text-black\">The key tip for maintaining a successful defense in depth approach is keeping everything up to date. After all, cyber crooks are working on new strategies and tools to get past your defenses, and you want to ensure you stay ahead of the threats.<\/p><p class=\"nord-text text-base leading-normal text-black\">Ensure that all software you\u2019re using is regularly updated. Outdated software often contains security gaps that hackers can exploit, so make sure the patches are installed. This also goes for online platforms \u2013 if services you rely on are breached or become obsolete, you need to relocate your data securely.<\/p><p class=\"nord-text text-base leading-normal text-black\">Don\u2019t forget hardware \u2013 have an action plan if your devices are damaged or stolen. The same goes for in-house security and measures like setting up protocols in case an employee\u2019s or guest\u2019s entrance card is stolen or lost.<\/p><p class=\"nord-text text-base leading-normal text-black\">Of course, updating your own knowledge is essential. Hold regular training sessions, follow the latest data breach news, keep yourself informed about lurking threats, and learn the strategies that you can implement to fend off the attacks.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">How NordPass can help<\/h2><p class=\"nord-text text-base leading-normal text-black\">As we\u2019ve seen, the technical layer holds the most weight in a successfully resilient defense in depth structure. That means amping up your technical toolkit is priority number one for your organization. Improving the company\u2019s password protection is not something to overlook.<\/p><p class=\"nord-text text-base leading-normal text-black\">Human error is among the leading causes of data breaches. Whether it\u2019s negligence, bad password management, or malicious intent, humans are usually at fault. As such, organizations need to work on policies and tools to reduce the risk of incidents caused by employees. Despite the growing popularity of <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/blog\/what-is-a-passkey\/\" data-link=\"NordUIlink\">passkeys<\/a>, passwords are still the most common security tool that each member of the organization relies on, making them equally vulnerable and valuable.<\/p><p class=\"nord-text text-base leading-normal text-black\">Here\u2019s where NordPass comes in. As a business-optimized password manager, it helps you keep all of your organization\u2019s sensitive information secure, whether it\u2019s login credentials, company bank accounts, or client information. With NordPass, you can create, store, and manage strong passwords that are difficult to crack. Two-factor authentication ensures that you\u2019re the only one who can access your password vault.<\/p><p class=\"nord-text text-base leading-normal text-black\">Secure password sharing can often be a point of contention because people use the easy yet insecure option to pass along login credentials via email, non-encrypted messages, or Post-It notes. NordPass eliminates this risk, allowing you to share your saved items with your colleagues in-app securely. Additionally, administrators can set up company-wide password policies that require all employees to update their passwords at regular intervals, bringing the best practices of technical and administrative controls into one.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight font-bold\" style=\"line-height: 1.2;\">Bottom line<\/h2><p class=\"nord-text text-base leading-normal text-black\">Setting up defense in depth for your organization might take some time, but the rewards are long term \u2013 you can rest assured that your sensitive data is under lock and key and incredibly difficult for unwanted actors to access.<\/p><p class=\"nord-text text-base leading-normal text-black\">If you\u2019re unsure where to start, setting up <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/business-password-manager\/\" data-link=\"NordUIlink\">NordPass<\/a> for your organization is the perfect first step. Have your team follow secure password practices and keep their credentials updated. You won\u2019t have to worry about coming up with new, unique ideas for each reset \u2013 simply use our Password Generator and autofill the details whenever you log in to an account. There\u2019s no easier way to start building the defense walls around your data.<\/p><\/div><\/div><\/section><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7099e7 elementor-widget elementor-widget-video\" data-id=\"f7099e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=6Ssu7Klb0tc&amp;embeds_referring_euri=https%3A%2F%2Fnordpass.com%2F&amp;source_ve_path=MjM4NTE&amp;feature=emb_title&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-472b275 elementor-widget elementor-widget-text-editor\" data-id=\"472b275\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"Post__content\"><div><div><h2 id=\"new-to-nordpass\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">New to NordPass?<\/h2><p class=\"nord-text text-base leading-normal text-black\">You don\u2019t need to be a rocket scientist to start using NordPass on a desktop device. Just add the standalone extension and you\u2019re all set \u2014 no need to download or install the app!<\/p><p class=\"nord-text text-base leading-normal text-black\">Check out our <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/support.nordpass.com\/hc\/en-us\/articles\/360010298318\" target=\"_blank\" rel=\"noopener noreferrer\" data-link-full-refresh=\"false\">detailed support guide<\/a> for getting started with NordPass quickly and easily.<\/p><p class=\"nord-text text-base leading-normal text-black\">Once you have the new extension running on your browser, you can start using NordPass to its fullest extent.<\/p><p class=\"nord-text text-base leading-normal text-black\">If you have any further questions regarding the changes or NordPass in general, do not hesitate to contact our tech-minded support team at <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"mailto:support@nordpass.com\" data-link-full-refresh=\"false\">support@nordpass.com<\/a> \u2014 they\u2019re ready to take care of any issues you might have. Also, if you have any suggestions or feedback, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/nordpass.typeform.com\/to\/ttc6z6WQ\" target=\"_blank\" rel=\"noopener noreferrer\" data-link-full-refresh=\"false\">simply submit a request for our team<\/a> \u2014 we\u2019re all ears, all the time.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Navigating digital security threats can sometimes feel  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1129,61],"tags":[974,1076,1131],"class_list":["post-73948","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordpass","category-press-release","tag-nord-security","tag-1076","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding defense in depth: A comprehensive guide - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding defense in depth: A comprehensive guide - Version 2\" \/>\n<meta property=\"og:description\" content=\"Navigating digital security threats can sometimes feel [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-21T04:25:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/understanding-defense-in-depth-a-comprehensive-guide\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Understanding defense in depth: A comprehensive guide\",\"datePublished\":\"2023-12-21T04:25:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/understanding-defense-in-depth-a-comprehensive-guide\\\/\"},\"wordCount\":1883,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/d6f91aba75\\\/defense-in-depth-1062x597-01.svg\",\"keywords\":[\"Nord Security\",\"2023\",\"NordPass\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/12\\\/understanding-defense-in-depth-a-comprehensive-guide\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/\",\"name\":\"Understanding defense in depth: A comprehensive guide - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/d6f91aba75\\\/defense-in-depth-1062x597-01.svg\",\"datePublished\":\"2023-12-21T04:25:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/d6f91aba75\\\/defense-in-depth-1062x597-01.svg\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/d6f91aba75\\\/defense-in-depth-1062x597-01.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-defense-in-depth\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding defense in depth: A comprehensive guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding defense in depth: A comprehensive guide - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/","og_locale":"zh_HK","og_type":"article","og_title":"Understanding defense in depth: A comprehensive guide - Version 2","og_description":"Navigating digital security threats can sometimes feel [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/","og_site_name":"Version 2","article_published_time":"2023-12-21T04:25:18+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"10 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/12\/understanding-defense-in-depth-a-comprehensive-guide\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Understanding defense in depth: A comprehensive guide","datePublished":"2023-12-21T04:25:18+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/12\/understanding-defense-in-depth-a-comprehensive-guide\/"},"wordCount":1883,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg","keywords":["Nord Security","2023","NordPass"],"articleSection":["Nord Security","2023","NordPass","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/12\/understanding-defense-in-depth-a-comprehensive-guide\/","url":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/","name":"Understanding defense in depth: A comprehensive guide - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg","datePublished":"2023-12-21T04:25:18+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/d6f91aba75\/defense-in-depth-1062x597-01.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-is-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Understanding defense in depth: A comprehensive guide"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jeI","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/73948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=73948"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/73948\/revisions"}],"predecessor-version":[{"id":73956,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/73948\/revisions\/73956"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=73948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=73948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=73948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}