[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-5-best-practices-to-protect-your-business-data":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":166,"categories":235},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":72,"text":74,"slug":75,"created_at":76,"publish_at":77,"formatted_created_at":78,"category_id":69,"links":79,"view_type":84,"video_url":85,"views":86,"likes":87,"lang":88,"comments_count":89,"category":90},"5 Best Practices to Protect Your Business Data","Today, companies hold a large amount of information and business data within their systems when remote work has gained popularity.","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"160\" src=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-1.jpeg\" width=\"300\" / alt=\"5 Best Practices to Protect Your Business Data\" loading=\"lazy\">\u003C/picture>Today, companies hold a large amount of information and business data within their systems when remote work has gained popularity. This amount is quite large and its security is also highly important for a business in any sector. If the right precautions are not taken before or during any data loss and breach, very serious consequences can be encountered. These consequences can sometimes be a huge amount of fine, and sometimes a loss of reputation.\u003C/p>\n\n\u003Cp>As an example of this, according to research in 2022, between March 2021 and March 2022, the average cost of a data breach in the healthcare industry increased from $9.23 to over $10 million between May 2020 and March 2021. The financial sector ranked second with an average of $5.97 per breach. The global average cost of a data breach during the measured period was $4.35 million. Data breaches in the public sector ranked last, costing an average of $2.07 million over the measured time period.\u003C/p>\n\n\u003Cp>As it is understood from this research, since the security of business data is quite important, it is necessary to know the answers to some questions such as&nbsp;how does smart remote work&nbsp;affect your business. In addition, there are some practices you need to implement in order for your business to get the best effect from the remote work system. Here are the 5 best practices to protect your business.\u003C/p>\n\n\u003Ch3>Get Smart Remote Access For A Reachable And Secure Service\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-2.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"197\" src=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-2.jpeg\" width=\"256\" / alt=\"5 Best Practices to Protect Your Business Data\" loading=\"lazy\">\u003C/picture>Smart Remote Access is an excellent feature for users to create a virtual LAN (Local Area Network) in order to access devices on the internal network. TIt is also an advantage that it is not limited to a physical space. Smart Remote Access uses the internet to create the same secure connection between devices without any physical limitations. Users can stay connected from anywhere, as long as both devices that want to connect are connected to a private gateway with Smart Remote Access enabled.\u003C/p>\n\n\u003Cp>It has many unique features such as server and system access, Access/Control to another device (Point to Point), file sharing, access to shared files (FTP), and RDP (Remote Desktop Protocol) Solutions. Smart Remote Access is by far the easiest way for businesses to create an accessible and secure service for remote users.\u003C/p>\n\n\u003Ch3>Use Cloud Systems To Centralize Your Data Storage\u003C/h3>\n\n\u003Cp>Cloud storage systems&nbsp;are a very efficient solution to prevent business data loss for businesses to lock confidential data and police powers with maximum efficiency. This is done through centralized storage systems with open access procedures for all employees using server-based storage. By minimizing local data storage, you improve personnel security protocols.\u003C/p>\n\n\u003Cp>Cloud storage solutions are essential in protecting confidential documents and data. It also ensures that it is kept confidential, allowing it to remain secure at all times. It is the right investment to create a secure environment with cloud storage providers with a strong level of security and a commitment to transparency.\u003C/p>\n\n\u003Ch3>Adopt a Zero Trust Network Access\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-3.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"194\" src=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-3.jpeg\" width=\"259\" / alt=\"5 Best Practices to Protect Your Business Data\" loading=\"lazy\">\u003C/picture>Alternative security approaches are required by businesses in order to authenticate logins and access requests to a corporate network. Zero Trust is a zero-trust model-based solution applied through authentication to access business devices and resources, segment the network, and manage access controls. It adopts the principle of &ldquo;trust none, verify all&rdquo;.\u003C/p>\n\n\u003Cp>Unified and clear user approaches with Zero Trust make the software easy to use in practice and also ensure users comply with company security and data protection regulations.\u003C/p>\n\n\u003Ch3>State Clearly Your Strong Password Protocols\u003C/h3>\n\n\u003Cp>Weak passwords make it easier for&nbsp;\u003Ca href=\"https://quasa.io/media/lost-wages-from-a-cyber-attack-maybe-you-need-a-lawyer\">cyber attackers\u003C/a>. When your teams work or access remotely, having solid credentials is essential.\u003C/p>\n\n\u003Cp>It is necessary to inform employees and entire teams about strong passwords, how regularly passwords should be changed, which password managers to use, and the implications of loose password security. It is also important to choose a secure and unique WiFi password and a network ID that does not reveal who you are to attackers.\u003C/p>\n\n\u003Ch3>Provide Network-wide Tools To Every Employee\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-5.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"99\" src=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-5.jpeg\" width=\"300\" / alt=\"5 Best Practices to Protect Your Business Data\" loading=\"lazy\">\u003C/picture>Although many businesses use security solutions like encryption, virus scanners, and VPNs, these services might not be available to remote workers. Do not limit useful software to your head office or to specific staff members. If possible, it is advisable to check licenses and expand accesses.\u003C/p>\n\n\u003Cp>In cases where you need to add extra users, you should not leave it to individuals to purchase vital tools for themselves. It is usually more reasonable to do this among a large number of employees. It&rsquo;s wise to have a comprehensive approach and ensure that everyone is taken care of.\u003C/p>\n\n\u003Ch3>Conclusion\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-6.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-19/uuuuuuuuuuuuuuuuuuuuu-6.jpeg\" width=\"300\" / alt=\"5 Best Practices to Protect Your Business Data\" loading=\"lazy\">\u003C/picture>In today&rsquo;s world, remote working has become very popular nowadays. Companies and organizations have adapted not only remote working but also remote access systems to their working styles. However, the biggest concern when doing these is how reliable and confidential these systems are. This is because business owners may have to deal with very serious problems if they do not ensure security and privacy.\u003C/p>\n\n\u003Cp>As the best solution for all these, it is recommended to obtain some security solutions and implement the practices we mentioned above to protect business data and systems. \u003Ca href=\"https://quasa.io/media/the-top-cybersecurity-threats-for-small-businesses\">Security\u003C/a> solutions are a great remedy, creating a secure space for users to access devices, systems, and data on the network. In light of all these, we strongly recommend you obtain the right security solutions in order to keep the remote access security at a high level.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","5-best-practices-to-protect-your-business-data","2023-11-01T19:02:47.000000Z","2023-11-01T08:30:00.000000Z","01.11.2023",{"image":80,"image_webp":81,"thumb":82,"thumb_webp":83},"https://cdn.quasa.io/images/news/b3VqOefYEG2a4l6By28UbG8na65HPkCTo5PCtNso.jpg","https://cdn.quasa.io/images/news/b3VqOefYEG2a4l6By28UbG8na65HPkCTo5PCtNso.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/b3VqOefYEG2a4l6By28UbG8na65HPkCTo5PCtNso.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/b3VqOefYEG2a4l6By28UbG8na65HPkCTo5PCtNso.webp","large",null,1462,1,"en",0,{"id":69,"title":65,"slug":66,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":85,"created_at":94,"updated_at":95,"lang":88},"Quasa Media - Growth Hacking in Business","Business is a battlefield. In QUASA MEDIA you will find all the most useful articles on how to do business and not screw up.","Business, earn money, business strategy, business process","2021-08-03T10:59:17.000000Z","2024-08-25T15:45:11.000000Z",[97,113,127,140,153],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":85,"views":111,"likes":89,"lang":88,"comments_count":89,"is_pinned":112},"Huawei’s Moon Mode Scandal: The Forgotten 2019 AI Fake That Suddenly Feels Nostalgic — As Huawei Prepares to Power DeepSeek V4","In early April 2026, a quiet but seismic piece of news dropped: DeepSeek’s upcoming V4 model — the next major leap from one of China’s strongest open-weight AI labs — will run entirely on Huawei chips, not Nvidia.","huawei-s-moon-mode-scandal-the-forgotten-2019-ai-fake-that-suddenly-feels-nostalgic-as-huawei-prepares-to-power-deepseek-v4","2026-04-11T13:33:59.000000Z","2026-04-16T03:25:00.000000Z","16.04.2026",{"title":65,"slug":66},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp","small",8,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":119,"category":120,"links":121,"view_type":110,"video_url":85,"views":126,"likes":89,"lang":88,"comments_count":89,"is_pinned":112},"Meta’s Muse Spark: A Respectable Step Up That Finally Puts Them Back in the Game","On April 8, 2026, Meta Superintelligence Labs quietly dropped Muse Spark — the first model in their new “Muse” family. It’s not the flashy, headline-grabbing monster that instantly claims the #1 spot on every leaderboard. But here’s the thing: it doesn’t have to be.","meta-s-muse-spark-a-respectable-step-up-that-finally-puts-them-back-in-the-game","2026-04-11T13:12:57.000000Z","2026-04-15T11:06:00.000000Z","15.04.2026",{"title":58,"slug":63},{"image":122,"image_webp":123,"thumb":124,"thumb_webp":125},"https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp",97,{"title":128,"description":129,"slug":130,"created_at":131,"publish_at":132,"formatted_created_at":119,"category":133,"links":134,"view_type":110,"video_url":85,"views":139,"likes":89,"lang":88,"comments_count":89,"is_pinned":112},"Services: The New Software – Why the Next $1 Trillion Company Will Look Like a Services Firm","In March 2026, Sequoia Capital published a provocative essay titled \"Services: The New Software\". The core idea is as bold as it is timely: the next trillion-dollar company won't sell software tools. It will sell the actual work itself — powered by AI, delivered as a seamless service, and disguised as a traditional services business.","services-the-new-software-why-the-next-1-trillion-company-will-look-like-a-services-firm","2026-04-11T13:03:12.000000Z","2026-04-15T09:50:00.000000Z",{"title":47,"slug":48},{"image":135,"image_webp":136,"thumb":137,"thumb_webp":138},"https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp",105,{"title":141,"description":142,"slug":143,"created_at":144,"publish_at":145,"formatted_created_at":119,"category":146,"links":147,"view_type":110,"video_url":85,"views":152,"likes":89,"lang":88,"comments_count":89,"is_pinned":112},"When Cursor Wiped a User's PC: A Cautionary Tale of AI Overreach","We recently received a sobering story from a subscriber, a stark reminder of the potential pitfalls when granting AI agents unfettered access to your system. It's a scenario that sounds deceptively simple, but the consequences were almost catastrophic.","when-cursor-wiped-a-user-s-pc-a-cautionary-tale-of-ai-overreach","2026-04-10T18:43:40.000000Z","2026-04-15T06:26:00.000000Z",{"title":19,"slug":20},{"image":148,"image_webp":149,"thumb":150,"thumb_webp":151},"https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp",119,{"title":154,"description":155,"slug":156,"created_at":157,"publish_at":158,"formatted_created_at":119,"category":159,"links":160,"view_type":110,"video_url":85,"views":165,"likes":89,"lang":88,"comments_count":89,"is_pinned":112},"The Great AI Talent Paradox: Why Everyone is Hiring \"AI Engineers\" but Nobody Can Find Them","I see this pattern repeating across dozens of companies. The founder or CTO has a mature engineering team. Everyone knows how to code; most use Cursor or Claude Code. Formally, they are all \"working with AI.\" But when you look under the hood at the actual processes, you realize the AI is just a thin layer smeared over an obsolete architectural workflow.","the-great-ai-talent-paradox-why-everyone-is-hiring-ai-engineers-but-nobody-can-find-them","2026-04-10T18:01:04.000000Z","2026-04-15T03:46:00.000000Z",{"title":19,"slug":20},{"image":161,"image_webp":162,"thumb":163,"thumb_webp":164},"https://cdn.quasa.io/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.jpg","https://cdn.quasa.io/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.webp",132,[167,180,195,207,221],{"title":168,"description":169,"slug":170,"created_at":171,"publish_at":172,"formatted_created_at":173,"category":174,"links":175,"view_type":110,"video_url":85,"views":178,"likes":179,"lang":88,"comments_count":89,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":176,"image_webp":85,"thumb":177,"thumb_webp":177},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70360,2,{"title":181,"description":182,"slug":183,"created_at":184,"publish_at":185,"formatted_created_at":186,"category":187,"links":188,"view_type":84,"video_url":85,"views":193,"likes":194,"lang":88,"comments_count":89,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":189,"image_webp":190,"thumb":191,"thumb_webp":192},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70111,4,{"title":196,"description":197,"slug":198,"created_at":199,"publish_at":200,"formatted_created_at":201,"category":202,"links":203,"view_type":110,"video_url":85,"views":206,"likes":194,"lang":88,"comments_count":89,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":204,"image_webp":85,"thumb":205,"thumb_webp":205},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",67765,{"title":208,"description":209,"slug":210,"created_at":211,"publish_at":212,"formatted_created_at":213,"category":214,"links":215,"view_type":110,"video_url":85,"views":220,"likes":179,"lang":88,"comments_count":87,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":216,"image_webp":217,"thumb":218,"thumb_webp":219},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",41787,{"title":222,"description":223,"slug":224,"created_at":225,"publish_at":226,"formatted_created_at":227,"category":228,"links":229,"view_type":84,"video_url":85,"views":234,"likes":179,"lang":88,"comments_count":89,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":230,"image_webp":231,"thumb":232,"thumb_webp":233},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",40916,[236,237,238,239,240,241,242,243,244,245,246,247,248],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]