[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-data-leaks-causes-and-prevention":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":162,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Data Leaks: Causes and Prevention","Data leaks are a serious threat to businesses and individuals. When confidential or private information is unintentionally released or stolen, a data leak can occur.","Data Leaks: Causes and Prevention, security, Cybersecurity","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>Data leaks are a serious threat to businesses and individuals. When confidential or private information is unintentionally released or stolen, a data leak can occur. This can include everything from customer data to trade secrets, financial information, and intellectual property.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/24-3.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/24-3.jpeg\" width=\"300\" />\u003C/picture>Protecting your data from leaks is a top priority for businesses in all industries. It is critical to prevent costly criminal activities, loss of trust among customers, or damage to corporate reputations.\u003C/p>\n\n\u003Cp>To prevent data leaks, it is vital to understand what causes them in the first place. Some common causes of data leaks include:\u003C/p>\n\n\u003Ch4>Human Error\u003C/h4>\n\n\u003Cp>What&rsquo;s a data leak&nbsp;usually look like? It&rsquo;s usually caused when an employee accidentally sends an email to the wrong person, prints documents on unsecured printers, or leaves a laptop or smartphone unlocked and unsecured.\u003C/p>\n\n\u003Ch4>Malicious Insiders\u003C/h4>\n\n\u003Cp>In some cases, employees deliberately steal or release confidential information, and employees cause data leaks. This can be more difficult to detect, as the individual may have legitimate access to the data and appear trustworthy.\u003C/p>\n\n\u003Ch4>Hacking or Other Cyberattacks\u003C/h4>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/how-hackers-are-using-malware-to-steal-fingerprints-and-sensitive-data\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-6.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"192\" src=\"https://cdn.quasa.io/photos/foto-15/997-6.jpeg\" width=\"262\" />\u003C/picture>Hackers\u003C/a> and criminals can target businesses through various methods, including phishing scams, malware, and more sophisticated techniques like social engineering.\u003C/p>\n\n\u003Ch4>Unsecured Systems\u003C/h4>\n\n\u003Cp>Inadequate security protocols can leave businesses vulnerable to data leaks. This can include using weak passwords, not encrypting data, or failing to secure devices and networks properly.\u003C/p>\n\n\u003Ch4>Physical Theft\u003C/h4>\n\n\u003Cp>Laptops, smartphones, USB drives, and other physical devices can all be stolen. This is a common cause of data leaks in the healthcare industry, where patients&rsquo; medical records are often stored on portable devices.\u003C/p>\n\n\u003Ch4>Poor Data Management Practices\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/996-10.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-15/996-10.png\" width=\"300\" />\u003C/picture>Many data leaks occur because organizations fail to manage and secure their data properly. This can include failing to conduct proper backups, losing a device that contains sensitive information, or allowing unqualified personnel to have access to critical data.\u003C/p>\n\n\u003Ch4>Lack of Employee Training\u003C/h4>\n\n\u003Cp>Data leaks can also occur when employees are unaware of the dangers and best practices for protecting confidential information.&nbsp;Organizations should invest&nbsp;in regular employee training to help prevent data leaks and keep their information secure.\u003C/p>\n\n\u003Ch4>Third-Party Providers\u003C/h4>\n\n\u003Cp>In some cases, data leaks occur because of the actions of a third-party provider. This can include an outside contractor, cloud service provider, or another vendor. It is essential to carefully vet these providers and ensure that they have adequate security measures in place to protect your data.\u003C/p>\n\n\u003Ch4>How to Prevent Data Leaks\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/996-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"158\" src=\"https://cdn.quasa.io/photos/foto-15/996-1.jpeg\" width=\"300\" />\u003C/picture>Preventing data leaks requires a multi-layered approach that includes technical and non-technical measures. Some standard security measures that can help prevent data leaks include:\u003C/p>\n\n\u003Ch4>Data Encryption\u003C/h4>\n\n\u003Cp>This is transforming readable data into an unreadable format. This makes it difficult for unauthorized individuals to access the information, even if they can steal it.\u003C/p>\n\n\u003Ch3>Access Control\u003C/h3>\n\n\u003Cp>This refers to limiting who has access to sensitive data. This can be done through physical security measures like locked doors and&nbsp;security guards&nbsp;and technical measures like user authentication and permissions.\u003C/p>\n\n\u003Ch4>Employee Training\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/999-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"208\" src=\"https://cdn.quasa.io/photos/foto-15/999-7.jpeg\" width=\"243\" />\u003C/picture>\u003Ca href=\"https://quasa.io/media/how-to-educate-employees-about-cybersecurity\">Educating employees on data security \u003C/a>best practices is an integral part of preventing data leaks. This should include information on common threats, such as phishing scams and social engineering, and guidelines for handling sensitive data.\u003C/p>\n\n\u003Ch4>Data Loss Prevention Tools\u003C/h4>\n\n\u003Cp>Various software tools&nbsp;can help prevent sensitive data&rsquo;s accidental or unauthorized release. These tools monitor networks and devices to detect potential threats and prevent leaks.\u003C/p>\n\n\u003Ch4>Physical Security\u003C/h4>\n\n\u003Cp>This refers to measures like locked doors, security cameras, and alarms, which can help deter criminals and prevent the physical theft of sensitive data devices.\u003C/p>\n\n\u003Ch4>Adopting A Data Governance Framework\u003C/h4>\n\n\u003Cp>A comprehensive data governance framework can help businesses implement stronger security and management practices, making them less likely to leak or compromise sensitive information.\u003C/p>\n\n\u003Ch4>Regular Backups\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/996-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Data Leaks: Causes and Prevention\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-15/996-7.jpeg\" width=\"300\" />\u003C/picture>Backing up data regularly can help ensure that businesses can recover from a data leak. This includes backing up data to an offsite location in case of a physical disaster and maintaining multiple copies of critical data to minimize the impact of a leak.\u003C/p>\n\n\u003Cp>Also read:&nbsp;\u003Ca href=\"https://quasa.io/media/your-instagram-posts-will-soon-rank-higher-in-google-search\">Your Instagram Posts Will Soon Rank Higher in Google Search\u003C/a>\u003C/p>\n\n\u003Ch4>Third-Party Risk Management\u003C/h4>\n\n\u003Cp>Organizations should carefully monitor and vet the security practices of their third-party providers. This can include requiring regular audits or certifications and performing background checks on employees to minimize the risk of a data leak caused by an outside vendor.\u003C/p>\n\n\u003Cp>While no&nbsp;data security method&nbsp;is entirely foolproof, taking steps to prevent data leaks can reduce the risk of sensitive information being compromised. By implementing strong security measures, educating employees on best practices, and regularly reviewing and updating protocols, businesses can help ensure that their data remains secure.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","data-leaks-causes-and-prevention","2022-06-08T07:57:27.000000Z","2025-09-01T06:30:00.000000Z","01.09.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/AHluH2kL8cHY3Jjaa8NZAoPyedHqqnfH419YxX9t.jpg","https://cdn.quasa.io/images/news/AHluH2kL8cHY3Jjaa8NZAoPyedHqqnfH419YxX9t.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/AHluH2kL8cHY3Jjaa8NZAoPyedHqqnfH419YxX9t.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/AHluH2kL8cHY3Jjaa8NZAoPyedHqqnfH419YxX9t.webp","large",null,2733,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,112,124,136,149],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",27,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":86,"views":123,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",43,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":128,"formatted_created_at":102,"category":129,"links":130,"view_type":109,"video_url":86,"views":135,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",45,{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":102,"category":142,"links":143,"view_type":109,"video_url":86,"views":148,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",65,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":154,"formatted_created_at":102,"category":155,"links":156,"view_type":109,"video_url":86,"views":161,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",77,[163,176,191,203,218],{"title":164,"description":165,"slug":166,"created_at":167,"publish_at":168,"formatted_created_at":169,"category":170,"links":171,"view_type":109,"video_url":86,"views":174,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":172,"image_webp":86,"thumb":173,"thumb_webp":173},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70841,2,{"title":177,"description":178,"slug":179,"created_at":180,"publish_at":181,"formatted_created_at":182,"category":183,"links":184,"view_type":85,"video_url":86,"views":189,"likes":190,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":185,"image_webp":186,"thumb":187,"thumb_webp":188},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70606,4,{"title":192,"description":193,"slug":194,"created_at":195,"publish_at":196,"formatted_created_at":197,"category":198,"links":199,"view_type":109,"video_url":86,"views":202,"likes":190,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":200,"image_webp":86,"thumb":201,"thumb_webp":201},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68238,{"title":204,"description":205,"slug":206,"created_at":207,"publish_at":208,"formatted_created_at":209,"category":210,"links":211,"view_type":109,"video_url":86,"views":216,"likes":175,"lang":89,"comments_count":217,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":212,"image_webp":213,"thumb":214,"thumb_webp":215},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42214,1,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":85,"video_url":86,"views":231,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41309,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]