{"id":79623,"date":"2024-06-29T17:02:06","date_gmt":"2024-06-29T09:02:06","guid":{"rendered":"https:\/\/version-2.com\/?p=79623"},"modified":"2024-06-26T17:24:58","modified_gmt":"2024-06-26T09:24:58","slug":"threat-protection-pro-everyday-online-threats-in-numbers","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/06\/threat-protection-pro-everyday-online-threats-in-numbers\/","title":{"rendered":"Threat Protection Pro: Everyday online threats in numbers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79623\" class=\"elementor elementor-79623\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div class=\"my-32\">\u00a0<\/div><p class=\"text-base leading-normal\">According to new research by NordVPN, adult content, free video hosting sites, and sites that impersonate well-known and reputable brands have the most security and privacy threats, such as malware, intrusive ads, and trackers.<\/p><div class=\"my-64 text-center\"><p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\" width=\"1200\" height=\"800\" \/><\/p><\/div><div class=\"style_postContent__uJLGT text-black break-words\" data-content-type-blog=\"\"><div class=\"Article_wrapper__YyQ2_\"><p class=\"text-base leading-normal\"><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordvpn.com\/research-lab\/online-threats-statistic\/\"><u>According to new research by NordVPN<\/u><\/a>, a leading cybersecurity company, adult content, free video hosting sites, and sites that impersonate well-known and reputable brands have the most security and privacy threats, such as malware, intrusive ads, and trackers.<\/p><p class=\"text-base leading-normal\">In May alone, NordVPN\u2019s Threat Protection Pro feature blocked<b> more than 5B intrusive ads, almost 40B trackers, and 60M malware infection attempts<\/b>. With more than 50M malware-related incidents Americans are among the most affected among all Threat Protection Pro users globally. A thorough analysis of these suspended incidents revealed vital cybersecurity and privacy threats that users should be aware of and protect themselves.<\/p><blockquote class=\"pl-32 border-gray-300 border-l text-gray-600 my-64\"><p class=\"text-base leading-normal\">\u201cEvery day, we face cyber threats without even noticing them. Even if we do not see malware or trackers with the naked eye or can handle the irritation caused by intrusive ads, it does not save us from severe privacy and cybersecurity issues. We should improve our knowledge and use trusted technology tools to avoid these threats. Most anti-malware features integrated into popular VPNs are usually limited to simple DNS filtering. NordVPN\u2019s digital protection tool is now upgraded to Threat Protection Pro and helps users avoid hacking, tracking, phishing, scams, malware, and annoying ads and cookies,\u201d says Adrianus Warmenhoven, a cybersecurity advisor at <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordvpn.com\/\"><u>NordVPN<\/u><\/a>.<\/p><\/blockquote><h2 id=\"Malware hides in adult sites and deceptively misspelled Office365 links\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\"><b>Malware hides in adult sites and deceptively misspelled Office365 links<\/b><\/h2><p class=\"text-base leading-normal\">Malware is malicious software: viruses, trojans, ransomware, and spyware designed to harm a user\u2019s devices. It can steal sensitive data, encrypt important files, or even take over the devices, putting the criminal in complete control. The most common way users can get their devices infected with malware is by visiting malicious sites.<\/p><p class=\"text-base leading-normal\">NordVPN research shows that from January 1 to May 31, Threat Protection Pro blocked <b>more than 24M malicious links in adult content sites (or 8% from all blocked sites), as well as 16M links in uncategorized (5%), and 13M in web services (4%) sites.<\/b><\/p><p class=\"text-base leading-normal\">Moreover, cybercriminals more often use deceptive misspellings of popular brands to trick victims into clicking phishing links and downloading infected files. As much as 99% of all phishing attacks use just 300 brands for deception. The <b>most popular brands that users impersonated for spreading malware are Office365 (86K impersonated URLs discovered), Gazprom (60K), AT&amp;T (28K), Facebook (19K), and Bet365 (15K)*.<\/b><\/p><blockquote class=\"pl-32 border-gray-300 border-l text-gray-600 my-64\"><p class=\"text-base leading-normal\">\u201cThe brands themselves are not at fault \u2014 fakes like these also hurt their reputation, forcing companies to actively hunt them down. But high brand awareness can lull victims into a false sense of security and get them to lower their guard,\u201d Warmenhoven says.<\/p><\/blockquote><h2 id=\"One device in The United States faces 89 malware attacks a month\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\"><b>One device in The United States faces 89 malware attacks a month<\/b><\/h2><p class=\"text-base leading-normal\">The risk of getting infected with malware also varies by geographic region. These differences could be attributed to the varying levels of internet connectivity, economic development, and cybersecurity awareness in different countries.<\/p><p class=\"text-base leading-normal\">NordVPN research showed that Threat Protection Pro blocked <b>more than 50M attempts to infect American users\u2019 devices during the research period<\/b>. On average, <b>one device owned by an American user is exposed to 89 malware-related incidents every month<\/b>. In comparison, Ukraine is the most affected country, with 786 attempts to infect one device with malware per month.<\/p><h2 id=\"Privacy-invading trackers reign in free video hosting websites\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\"><b>Privacy-invading trackers reign in free video hosting websites<\/b><\/h2><p class=\"text-base leading-normal\">Web trackers are a broad category of privacy-invading tools that collect information on user activity. Trackers typically take the form of special scripts, browser cookies, or tracking pixels. Unfortunately, in the case of a data breach, the stored tracker data could end up falling into the hands of cybercriminals.<\/p><p class=\"text-base leading-normal\">With this in mind, users should be highly attentive when using free <b>video hosting (28% of all blocked trackers), online storage (13%), and search engines (13%), which, according to the research, are leaders in tracking user activities<\/b>. Since January 1, Threat Protection Pro has blocked 39B trackers from free video hosting sites alone, while the online storage category is accountable for 18B trackers.<\/p><blockquote class=\"pl-32 border-gray-300 border-l text-gray-600 my-64\"><p class=\"text-base leading-normal\">\u201cWebsites often share or sell data collected by trackers to third parties. But those who want to protect their privacy can use several tools to become less trackable. For example, VPN, which will change real IP address and virtual location, tracker blocker or privacy browsers\u201d, says Warmenhoven.<\/p><\/blockquote><h2 id=\"Intrusive ads are not just annoying\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\"><b>Intrusive ads are not just annoying<\/b><\/h2><p class=\"text-base leading-normal\">Invasive and irrelevant ads popping up unexpectedly, blocking the host page, and opening new pages and windows are also the most common for free video hosting, adult content, and advertisement sites. Since the beginning of the year, Threat Protection Pro has detected and blocked billions of them: <b>more than 2B, 1B, and 807M<\/b>, respectively.<\/p><p class=\"text-base leading-normal\">Moreover, intrusive ads are much more than just an annoying part of internet surfing; they are a matter of privacy and security. They can also infect users\u2019 devices by linking to malicious sites, violate privacy by collecting data from web activity, and impact website loading speed.<\/p><h2 id=\"How to stay safe from common cyber threats\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\"><b>How to stay safe from common cyber threats<\/b><\/h2><p class=\"text-base leading-normal\">To protect yourself from common cybersecurity threats like malware, trackers, and intrusive ads, Adrianus Warmenhoven advises to take these precautions:<\/p><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Develop good cybersecurity habits.<\/b> Cybercriminals prey on apathy, confusion, and ignorance, hoping that victims will forego due diligence. For example, most phishing attempts involve distorted names of popular brands.<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Verify, download, scan, install.<\/b> Malware executables may be disguised as or even hidden in legitimate files. Always verify the website you wish to download from, and always use anti-malware tools like Threat Protection Pro to inspect the files you download. This includes suspicious email attachments.<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Be careful of where you go online.<\/b> Certain web domain categories are much more likely to host malware that could compromise your device than others. If you visit websites that are likely to contain malware, pay attention to what you type, click, and download.<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Let Threat Protection Pro keep you safe.<\/b> Threat Protection Pro combines the best aspects of essential cybersecurity tools into one comprehensive security package. It will scan each file you download for malware, stop you from visiting malicious pages used for phishing, scams, and hosting malware, and block annoying ads.<\/p><\/div><\/li><\/ul><p class=\"text-base leading-normal\"><b>Methodology:<\/b> The statistics mentioned above were acquired by analyzing aggregated data gathered by NordVPN\u2019s Threat Protection Pro service from January 1 to May 31, 2024. NordVPN is not endorsed by, maintained, sponsored by, affiliated, or in any way associated with the owners of the mentioned brands. Brands are indicated solely for the purpose of accurately reporting information related to brands that were most likely to be impersonated for spreading malware*.<\/p><h3 class=\"text-h3 leading-tight text-left\"><b>ABOUT NORDVPN<\/b><\/h3><p class=\"text-base leading-normal\">NordVPN is the world\u2019s most advanced VPN service provider, used by millions of internet users worldwide. NordVPN provides double VPN encryption and Onion Over VPN and guarantees privacy with zero tracking. One of the key features of the product is Threat Protection, which blocks malicious websites, malware during downloads, trackers, and ads. The latest service by the Nord Security team is <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/saily.com\/\">Saily<\/a> \u2014 a new global eSIM. NordVPN is very user friendly, offers one of the best prices on the market, and has over 6,200 servers covering 111 countries worldwide. For more information: <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"http:\/\/nordvpn.com\"><u>https:\/\/nordvpn.com<\/u><\/a>.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"79628\" class=\"elementor elementor-79628\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Nord Security<br \/><\/strong>Nord Security is a cybersecurity company known for its flagship product, NordVPN. The company is dedicated to providing online security and privacy solutions to individuals and businesses globally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 According to new research by NordVPN, adult content,  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1273,61],"tags":[974,1272],"class_list":["post-79623","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-1273","category-press-release","tag-nord-security","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Protection Pro: Everyday online threats in numbers - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/nis-2-directive\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Protection Pro: Everyday online threats in numbers - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 According to new research by NordVPN, adult content, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/nis-2-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-29T09:02:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/threat-protection-pro-everyday-online-threats-in-numbers\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Threat Protection Pro: Everyday online threats in numbers\",\"datePublished\":\"2024-06-29T09:02:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/threat-protection-pro-everyday-online-threats-in-numbers\\\/\"},\"wordCount\":1184,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/press-area\\\/categories\\\/research\\\/2024\\\/06\\\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\",\"keywords\":[\"Nord Security\",\"2024\"],\"articleSection\":[\"Nord Security\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/threat-protection-pro-everyday-online-threats-in-numbers\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/\",\"name\":\"Threat Protection Pro: Everyday online threats in numbers - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/press-area\\\/categories\\\/research\\\/2024\\\/06\\\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\",\"datePublished\":\"2024-06-29T09:02:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/press-area\\\/categories\\\/research\\\/2024\\\/06\\\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/press-area\\\/categories\\\/research\\\/2024\\\/06\\\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/nis-2-directive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Protection Pro: Everyday online threats in numbers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Protection Pro: Everyday online threats in numbers - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/nis-2-directive\/","og_locale":"zh_HK","og_type":"article","og_title":"Threat Protection Pro: Everyday online threats in numbers - Version 2","og_description":"\u00a0 According to new research by NordVPN, adult content, [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/nis-2-directive\/","og_site_name":"Version 2","article_published_time":"2024-06-29T09:02:06+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/06\/threat-protection-pro-everyday-online-threats-in-numbers\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Threat Protection Pro: Everyday online threats in numbers","datePublished":"2024-06-29T09:02:06+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/06\/threat-protection-pro-everyday-online-threats-in-numbers\/"},"wordCount":1184,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg","keywords":["Nord Security","2024"],"articleSection":["Nord Security","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/06\/threat-protection-pro-everyday-online-threats-in-numbers\/","url":"https:\/\/nordpass.com\/blog\/nis-2-directive\/","name":"Threat Protection Pro: Everyday online threats in numbers - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg","datePublished":"2024-06-29T09:02:06+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/nis-2-directive\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#primaryimage","url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg","contentUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/press-area\/categories\/research\/2024\/06\/philipp-katzenberger-iIJrUoeRoCQ-unsplash.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/nis-2-directive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Threat Protection Pro: Everyday online threats in numbers"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kIf","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=79623"}],"version-history":[{"count":12,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79623\/revisions"}],"predecessor-version":[{"id":79650,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79623\/revisions\/79650"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=79623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=79623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=79623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}