[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-how-to-educate-employees-about-cybersecurity":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":164,"categories":234},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"How to educate Employees about Cybersecurity","A recent set survey quotes that millions of employees have switched to operate from home versions throughout the pandemic.","Educate Employees about Cybersecurity, business","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>A recent set survey quotes that millions of employees have switched to operate from home versions throughout the pandemic. Certainly, making it difficult for organizations to secure their information and software.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aak-11.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"165\" src=\"https://cdn.quasa.io/photos/foto-14/aak-11.jpeg\" width=\"300\" / alt=\"How to educate Employees about Cybersecurity\" loading=\"lazy\">\u003C/picture>Once it offers a great deal of flexibility, remote work blurs the line between work and leisure time, as workers juggle between work-related programs and private things, such as social media and internet shopping platforms, raising the possibility for cyberattacks.\u003C/p>\n\n\u003Cp>Nevertheless, human resource and coaching teams must concentrate on helping workers prevent cyberattacks since they get emails or societal networking platforms, particularly when utilizing company-provided technology. Though system firewalls can&nbsp;stop hackers&nbsp;from accessing business information, programs utilized by employees may render them vulnerable. Use these ideas to facilitate employee instruction.\u003C/p>\n\n\u003Ch3>1. Convey Potential Impact of Cybersecurity Incident\u003C/h3>\n\n\u003Cp>The most ideal approach to catch your workers&rsquo; consideration is by clarifying the outcomes of a cybersecurity occurrence on your organization. This incorporates monetary misfortunes, fines, and disintegrated client trust.\u003C/p>\n\n\u003Cp>Walk them through what can occur if a representative leaves his/her PC on the transport, access business related records over open&nbsp;WIFI, or utilize a work gadget to get to individual messages. Shockingly, most workers don&rsquo;t know about the perils of exposing your business to these regular practices.\u003C/p>\n\n\u003Ch3>2. Improve Your Cybersecurity Messaging\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aan-4.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"199\" src=\"https://cdn.quasa.io/photos/foto-14/aan-4.jpeg\" width=\"300\" / alt=\"How to educate Employees about Cybersecurity\" loading=\"lazy\">\u003C/picture>The principal tip in giving powerful cybersecurity training to your workers is utilizing the right messaging. As a rule, IT groups utilize immense terms that standard workers battle to comprehend. For the most part, your messaging ought to be effectively justifiable, broadened, and relatable.\u003C/p>\n\n\u003Cp>A justifiable messaging ought to stay away from intense tech language that can bring disarray and cloud the message. On the off chance that conceivable, utilize basic terms that non-tech or layman laborers can undoubtedly comprehend.\u003C/p>\n\n\u003Cp>Your preparation ought to likewise be relatable. For example, while examining outer threats, make it more about PCs and not the focal organization. Representatives can without much of a stretch relate if the risks are outlined to their telephones or PCs and not some comprehensible worker.\u003C/p>\n\n\u003Cp>In conclusion, your preparation ought to be expanded. One email that traces everything probably won&rsquo;t be adequate. Thinking about the quantity of messages from outreach groups, customers, and possibilities that workers get day by day, they can without much of a stretch read the email and excuse it&rsquo;s anything but an ordinary inner reminder.\u003C/p>\n\n\u003Ch3>3. Teach Them about Various Types of Cybersecurity Threats\u003C/h3>\n\n\u003Cp>For your workers to spot and forestall a cybersecurity break, they ought to have some fundamental information about the normal types of cybersecurity issues and how they present. For this, teach them about spam, malware and ransomware, phishing, and social designing.\u003C/p>\n\n\u003Cp>Start with spam, which is the most fundamental and normal cybersecurity danger. Teach them on how they can recognize spam content on messages and web-based media messages. You ought to likewise give preparing on phishing utilizing genuine instances of phishing tricks to help them note the distinction among genuine and misrepresented messages. Feature various pointers of a&nbsp;\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">phishing email\u003C/a>&nbsp;that make them effectively recognizable\u003C/p>\n\n\u003Cp>Cybersecurity tips&nbsp;for forestalling malware, ransomware, and social designing ought to likewise be featured during the preparation. That to the side, give experiences on the best way to spot malignant exercises on their gadgets.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aan-6.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-right\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-14/aan-6.jpeg\" width=\"300\" / alt=\"How to educate Employees about Cybersecurity\" loading=\"lazy\">\u003C/picture>\u003Cstrong>For example, they ought to be dubious if:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>New projects or applications out of nowhere show up on their gadgets\u003C/li>\n\t\u003Cli>Surprising pop-ups when beginning, utilizing, or closing down their gadgets\u003C/li>\n\t\u003Cli>On the off chance that the gadget eases back down altogether\u003C/li>\n\t\u003Cli>Presence of new tabs or augmentations in the program\u003C/li>\n\t\u003Cli>On the off chance that they let completely go over the mouse or console\u003C/li>\n\u003C/ul>\n\n\u003Cp>Demand that they should report quickly on the off chance that they notice any of these dubious signs. Regardless of whether the report is a bogus alert, it is useful as it helps clear mistakes in their gadgets that can influence efficiency.\u003C/p>\n\n\u003Ch3>4. Make Cybersecurity Training Part of Onboarding and an Ongoing Conversation\u003C/h3>\n\n\u003Cp>Initial feelings often decide a great deal during enrollment, and cybersecurity shouldn&rsquo;t be an exemption. In the event that you have excluded association information security in your onboarding cycle previously, you should fuse it into the preparation interaction. Clarify various authoritative guidelines and best practices that representatives ought to see to keep up information trustworthiness.\u003Cbr />\nThat to the side, give keeping preparing to representatives on cybersecurity.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aan-12.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-right\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/aan-12.jpeg\" width=\"300\" / alt=\"How to educate Employees about Cybersecurity\" loading=\"lazy\">\u003C/picture>\u003Cstrong>You can accomplish this utilizing the accompanying tips:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Utilize various methodologies, for example, bulletin updates and declarations.\u003C/li>\n\t\u003Cli>Make all updates observing the KISS rule, which signifies &ldquo;keep it short and straightforward.&rdquo; This makes it simple for workers to gather and hold the updates even following a long, chaotic day.\u003C/li>\n\t\u003Cli>Give reports on current cybersecurity patterns. Contact your representatives each time there is another malware or phishing trick.\u003C/li>\n\t\u003Cli>Make the updates eye-getting. For example, decide on brilliant infographics rather than do&rsquo;s and don&rsquo;ts or posting measurements.\u003C/li>\n\t\u003Cli>Attempt cybersecurity tests sometimes if workers will assess their insight. For this, counsel a business legal counselor if there are likely repercussions of doing this.\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Bottom Line\u003C/h4>\n\n\u003Cp>Powerful cybersecurity training ought to permit representatives to see the value in the significance of proceeding securely on the web, particularly under work organizations or organization gadgets. Great information in \u003Ca href=\"https://quasa.io/media/how-to-develop-a-cybersecurity-strategy-for-your-online-business\">cybersecurity\u003C/a> is the main line of guard against outside threats.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","how-to-educate-employees-about-cybersecurity","2022-05-21T16:50:43.000000Z","2022-05-22T10:15:00.000000Z","22.05.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/9F4BChMaR47Ezk2caYSQN9PIlQTrZfsztD8vNqr0.jpg","https://cdn.quasa.io/images/news/9F4BChMaR47Ezk2caYSQN9PIlQTrZfsztD8vNqr0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/9F4BChMaR47Ezk2caYSQN9PIlQTrZfsztD8vNqr0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/9F4BChMaR47Ezk2caYSQN9PIlQTrZfsztD8vNqr0.webp","large",null,2229,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Cyber Security & Threats: AI Privacy, Hacks & Protection | QUASA","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2026-04-22T18:21:32.000000Z",[97,113,125,138,151],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Talkie-1930: The Largest “Vintage” LLM Ever Built, Trained Exclusively on a World That Ended in 1930","The roadmap is ambitious. The team aims to release a GPT-3-class vintage model by summer 2026. If they can grow the pre-1931 corpus beyond one trillion tokens, they believe they can reach the capability level of the original ChatGPT.","talkie-1930-the-largest-vintage-llm-ever-built-trained-exclusively-on-a-world-that-ended-in-1930","2026-05-04T18:48:16.000000Z","2026-05-09T11:40:00.000000Z","09.05.2026",{"title":47,"slug":48},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.jpg","https://cdn.quasa.io/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.webp","small",86,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":117,"formatted_created_at":103,"category":118,"links":119,"view_type":110,"video_url":86,"views":124,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"SpAItial AI Echo-2: The Free “World Generator” That Turns One Image Into an Interactive 3D Reality","If you tried the original Echo on the waitlist and thought “cool, but not quite there,” Echo-2 is the version that crosses the threshold from demo to daily tool.","spaitial-ai-echo-2-the-free-world-generator-that-turns-one-image-into-an-interactive-3d-reality","2026-05-09T10:37:48.000000Z",{"title":43,"slug":44},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.jpg","https://cdn.quasa.io/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.webp",89,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Trump’s AI Push Collides with Rural America: Data Centers Become a Political Headache Ahead of the Midterms","The Trump administration’s aggressive drive to build America’s AI future is running straight into a wall of resistance from the very voters who put him back in the White House.","trump-s-ai-push-collides-with-rural-america-data-centers-become-a-political-headache-ahead-of-the-midterms","2026-05-04T18:38:11.000000Z","2026-05-09T09:29:00.000000Z",{"title":43,"slug":44},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.jpg","https://cdn.quasa.io/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.webp",97,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Flipbook: The AI-Powered “Visual Browser” That Turns the Entire Internet into Generated Images","Flipbook is still a prototype, explicitly labeled as experimental. The team openly acknowledges current limitations: occasional hallucinations, imperfect text rendering, and the fact that it’s not yet ready for complex actions like filling forms or persistent data storage.","flipbook-the-ai-powered-visual-browser-that-turns-the-entire-internet-into-generated-images","2026-05-04T18:26:01.000000Z","2026-05-09T06:21:00.000000Z",{"title":43,"slug":44},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.jpg","https://cdn.quasa.io/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.webp",114,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":156,"formatted_created_at":103,"category":157,"links":158,"view_type":110,"video_url":86,"views":163,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Switzerland Signals Shift from Microsoft: A Long-Term Push for Open-Source Independence Amid Lingering Dependencies","The Federal Chancellery of Switzerland has announced plans to gradually reduce the federal administration’s heavy reliance on Microsoft products and explore a transition to open-source alternatives.","switzerland-signals-shift-from-microsoft-a-long-term-push-for-open-source-independence-amid-lingering-dependencies","2026-05-04T18:15:35.000000Z","2026-05-09T03:06:00.000000Z",{"title":58,"slug":63},{"image":159,"image_webp":160,"thumb":161,"thumb_webp":162},"https://cdn.quasa.io/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.jpg","https://cdn.quasa.io/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.webp",131,[165,178,193,205,220],{"title":166,"description":167,"slug":168,"created_at":169,"publish_at":170,"formatted_created_at":171,"category":172,"links":173,"view_type":110,"video_url":86,"views":176,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":174,"image_webp":86,"thumb":175,"thumb_webp":175},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",73488,2,{"title":179,"description":180,"slug":181,"created_at":182,"publish_at":183,"formatted_created_at":184,"category":185,"links":186,"view_type":85,"video_url":86,"views":191,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":187,"image_webp":188,"thumb":189,"thumb_webp":190},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",73292,4,{"title":194,"description":195,"slug":196,"created_at":197,"publish_at":198,"formatted_created_at":199,"category":200,"links":201,"view_type":110,"video_url":86,"views":204,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":202,"image_webp":86,"thumb":203,"thumb_webp":203},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",70822,{"title":206,"description":207,"slug":208,"created_at":209,"publish_at":210,"formatted_created_at":211,"category":212,"links":213,"view_type":110,"video_url":86,"views":218,"likes":177,"lang":89,"comments_count":219,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":214,"image_webp":215,"thumb":216,"thumb_webp":217},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",44617,1,{"title":221,"description":222,"slug":223,"created_at":224,"publish_at":225,"formatted_created_at":226,"category":227,"links":228,"view_type":85,"video_url":86,"views":233,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":229,"image_webp":230,"thumb":231,"thumb_webp":232},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",43560,[235,236,237,238,239,240,241,242,243,244,245,246,247],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]