{"id":93188,"date":"2024-11-06T15:59:49","date_gmt":"2024-11-06T07:59:49","guid":{"rendered":"https:\/\/version-2.com\/?p=93188"},"modified":"2024-11-20T17:01:01","modified_gmt":"2024-11-20T09:01:01","slug":"strengthen-your-security-this-cybersecurity-month-with-sc-platform","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/11\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\/","title":{"rendered":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93188\" class=\"elementor elementor-93188\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"redactor\"><p>October is <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,about%20the%20importance%20of%20cybersecurity.\" target=\"_blank\">National Cybersecurity Awareness Month<\/a>, and with cyber threats constantly evolving, it&#8217;s more important than ever to stay vigilant. At Scale Computing, security is at the core of everything we do. Our SC\/\/Platform is built with security-first principles, ensuring that your organization can remain protected without sacrificing simplicity or efficiency.<\/p> <p>As Craig Theriac, Scale Computing\u2019s VP of Product Management, recently discussed in his <a href=\"https:\/\/www.scalecomputing.com\/resources\/scale-computing-platform-and-security\">Scale Computing Platform and Security<\/a> session at our annual <a href=\"https:\/\/www.scalecomputing.com\/landing-pages\/platform-2024-highlights\">Platform 2024<\/a> event in Las Vegas, cyber threats aren\u2019t just theoretical risks, they\u2019re happening now \u2013 and they\u2019re more costly than ever. <\/p> <p>As Craig noted: &#8220;Verizon&#8217;s latest <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\">Data Breach Investigations Report<\/a> highlights the staggering costs of breaches. The average cost per incident is just under $4.5 million, and that\u2019s up 15% over the last three years. For organizations with fewer than 1,000 employees, the average cost per incident is $3.3 million. Beyond the economic impact, it\u2019s important that we not forget the personal aspect of this \u2013 there\u2019s an IT administrator sitting out there that has to deal with the impact of something like this.\u201d<\/p> <p>So, how does Scale Computing address the growing complexity of today\u2019s cybersecurity threats?<\/p> <h2>Secure by Design, Secure by Default<\/h2> <p>At Scale Computing, we believe first and foremost in the principle of \u2018<a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\">Security by Design<\/a>\u2019. The <a href=\"https:\/\/www.scalecomputing.com\/sc-platform\">SC\/\/Platform<\/a> was developed to seamlessly integrate security into every layer of your infrastructure. From the hypervisor to storage protocols, every component in our platform is architected to eliminate vulnerabilities at their source. &#8220;Unlike other disaggregated solutions, we own the entire stack,&#8221; says Craig. &#8220;This means our customers get comprehensive, fully tested updates that secure every layer of the system, reducing compatibility concerns and encouraging faster patch adoption.&#8221;<\/p> <p>Our focus on owning the entire stack ensures that any potential vulnerabilities are addressed holistically, avoiding the pitfalls that come with relying on multiple vendors for different parts of your system. By delivering full-stack updates, we\u2019re able to keep your infrastructure secure while minimizing operational disruption.<\/p> <p>Another key element of our security strategy is simplicity. Complex systems can lead to misconfigurations, which in turn can open the door to attackers. Craig emphasized this point: &#8220;If it\u2019s not intuitive to use, or worse, if it&#8217;s misconfigured, it creates vulnerabilities. That&#8217;s why every security feature we design is simple, intuitive, and effective.&#8221;<\/p> <p>Features like role-based access control, single sign-on integration, and <a href=\"https:\/\/www.scalecomputing.com\/resources\/ransomware-protection-5-top-ways-scale-computing-has-you-covered\">immutable snapshots<\/a> are all designed with ease of use in mind, allowing users to manage security without introducing additional complexity. Role-based access control ensures that employees only have access to the data and systems necessary for their role, reducing the potential attack surface. Immutable snapshots also enable users to recover quickly from ransomware or other cyber incidents by reverting to the latest good, clean version of their data.<\/p> <p>Finally, we believe in embedding security into our platform from the start. &#8220;Scale Computing products are secure by default. We don\u2019t leave security as an option; it\u2019s inextricably built into everything we do, from the moment you power on your system.&#8221;<\/p> <p>For example, we employ Zero Trust principles and remove unnecessary attack surfaces, like root access, to ensure that the system is as secure as possible out of the box. This proactive approach eliminates the guesswork from securing your environment and lets you focus on running your business. \u201cOur perspective is that if we can keep you secure out of the gate, if we can remove that attack surface from ever being surfaced out there to exploit, we&#8217;re going to eliminate the exposure risk of our customers and our partners.\u201d<\/p> <p>With the rise of ransomware, phishing, and other cyber threats, businesses need solutions that go beyond basic protection. As Craig reminds us, \u201c66% of IT professionals <a href=\"https:\/\/www.congress.gov\/118\/meeting\/house\/116406\/documents\/HHRG-118-GO12-20230927-SD003.pdf\" target=\"_blank\">surveyed by Sophos<\/a> reported that their organization was affected by ransomware in the last 12 months \u2013 this isn\u2019t something that can be ignored.\u201d Scale Computing is dedicated to transforming potential disasters into manageable incidents, helping you recover and resume operations with minimal downtime.<\/p> <p>It&#8217;s essential to reflect on how your organization is protecting its users, applications, and data. At Scale Computing, we\u2019re here to help you strengthen your defenses and simplify your security practices.<\/p> <p>To learn more about how Scale Computing can enhance your organization&#8217;s security posture, <a href=\"https:\/\/www.scalecomputing.com\/contact\">contact us today<\/a> or click here to download our latest <a href=\"https:\/\/www.scalecomputing.com\/resources\/information-security-with-sc-platform\">white paper on information security<\/a>.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241e357 elementor-widget elementor-widget-shortcode\" data-id=\"241e357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18138\" class=\"elementor elementor-18138\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8a0bac7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"8a0bac7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d58d223\" data-id=\"d58d223\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f68ec75 elementor-widget elementor-widget-text-editor\" data-id=\"f68ec75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Scale Computing\u00a0<br \/><\/strong>Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore\u2122 technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>October is National Cybersecurity Awareness Month, and  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,421,61],"tags":[446,1272,422],"class_list":["post-93188","post","type-post","status-publish","format-standard","hentry","category-1273","category-scale-computing","category-press-release","tag-scale-computing-news","tag-1272","tag-scale-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strengthen Your Security this Cybersecurity Month with SC\/\/Platform - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform - Version 2\" \/>\n<meta property=\"og:description\" content=\"October is National Cybersecurity Awareness Month, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-06T07:59:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T09:01:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Strengthen Your Security this Cybersecurity Month with SC\\\/\\\/Platform\",\"datePublished\":\"2024-11-06T07:59:49+00:00\",\"dateModified\":\"2024-11-20T09:01:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\\\/\"},\"wordCount\":742,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"Scale Computing News\",\"2024\",\"Scale Computing\"],\"articleSection\":[\"2024\",\"Scale Computing\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/11\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\\\/\",\"url\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\",\"name\":\"Strengthen Your Security this Cybersecurity Month with SC\\\/\\\/Platform - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-11-06T07:59:49+00:00\",\"dateModified\":\"2024-11-20T09:01:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthen Your Security this Cybersecurity Month with SC\\\/\\\/Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform","og_locale":"zh_HK","og_type":"article","og_title":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform - Version 2","og_description":"October is National Cybersecurity Awareness Month, and [&hellip;]","og_url":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform","og_site_name":"Version 2","article_published_time":"2024-11-06T07:59:49+00:00","article_modified_time":"2024-11-20T09:01:01+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/11\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform","datePublished":"2024-11-06T07:59:49+00:00","dateModified":"2024-11-20T09:01:01+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/11\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\/"},"wordCount":742,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["Scale Computing News","2024","Scale Computing"],"articleSection":["2024","Scale Computing","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/11\/strengthen-your-security-this-cybersecurity-month-with-sc-platform\/","url":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform","name":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-11-06T07:59:49+00:00","dateModified":"2024-11-20T09:01:01+00:00","breadcrumb":{"@id":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.scalecomputing.com\/blog\/strengthen-your-security-this-cybersecurity-month-with-sc-platform#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Strengthen Your Security this Cybersecurity Month with SC\/\/Platform"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-of2","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93188"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93188\/revisions"}],"predecessor-version":[{"id":97792,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93188\/revisions\/97792"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}