[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-how-to-identify-and-protect-against-cyber-attacks":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":97,"popular_news":163,"categories":233},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":90,"category":91},"How to Identify and Protect Against Cyber Attacks","With an increasing number of businesses moving data online, a steady rise in cybercrime has occurred over the last few years.","Identify and Protect Against Cyber Attacks, cyber","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"227\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-10.jpeg\" width=\"300\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>With an increasing number of businesses moving data online, a steady rise in cybercrime has occurred over the last few years.\u003C/p>\n\n\u003Cp>Most evident during the transition to remote work that happened during the Covid-19 pandemic, a stunning&nbsp;150% surge in cyber attacks&nbsp;has caused many businesses to implement new security policies.\u003C/p>\n\n\u003Cp>Learning how to protect yourself, whether as an individual or as an organization, against cybercrime can help prevent the loss of sensitive information.\u003C/p>\n\n\u003Ch3>What is a Cyber Attack?\u003C/h3>\n\n\u003Cp>First and foremost, a cyber attack is any type of cyber assault launched by hackers against one or more computers with the intent to steal, damage, release, or access data. There is a multitude of different types of cyber attacks, with each type ranging in how it impacts the software or hardware that&rsquo;s being targeted.\u003C/p>\n\n\u003Cp>The most commonly known example of a cyber attack is malware being installed on a computer by accidentally clicking a link from a&nbsp;suspicious email. While this type of cyber attack can be squashed with simple anti-virus software, there are far more dangerous types of cyber assaults.\u003C/p>\n\n\u003Ch3>Why is a Cyber Attack Dangerous?\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-12.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-12.jpeg\" width=\"275\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>In most cases, a cyber attack won&rsquo;t involve harmless malware being installed on a computer or a network. Hackers conduct real cyber attacks with malicious intent. These types of cyber-attacks are dangerous because they target key items such as financial information, sensitive data, medical information, and more.\u003C/p>\n\n\u003Cp>Sometimes this information will be held by the attacker with the threat that they will release it to the public unless they are paid.\u003C/p>\n\n\u003Cp>Other times the data may be sold or used for identity theft. Whether you are a company or an individual, hackers getting a hold of confidential private information can damage you from both a monetary and reputational standpoint.\u003C/p>\n\n\u003Ch3>Different Types of Cyber Attacks\u003C/h3>\n\n\u003Cp>The first step to identifying a cyber attack is understanding the most common types to watch for. Below are three commonly seen cyber attacks that you may find yourself faced with:\u003C/p>\n\n\u003Ch3>SQL Injection Attacks\u003C/h3>\n\n\u003Cp>A relatively sophisticated cyber attack, SQL injection attacks target the backend code of a network itself. Attackers will inject SQL queries into SQL code that exposes hidden information within the code. Anything, including sensitive customer or personal information, stored within SQL databases could be stolen.\u003C/p>\n\n\u003Cp>Learning&nbsp;how to protect against SQL injection&nbsp;is possible, but requires preemptive action when building out \u003Ca href=\"https://quasa.io/media/top-7-reasons-to-choose-mysql-for-organizing-your-web-database\">SQL\u003C/a> databases. That&rsquo;s why understanding this type of cyber attack first is so important.\u003C/p>\n\n\u003Ch3>Phishing attacks\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-14.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-14.jpeg\" width=\"300\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>Phishing attacks come in many shapes and forms, but the most common are: email phishing, spear phishing, whaling, and vishing. Email phishing is when a hacker sends an email, typically claiming they are a company, yet they are registered under a fake domain.\u003C/p>\n\n\u003Cp>Spear \u003Ca href=\"https://quasa.io/media/phishing-as-a-way-to-check-email-deliverability1\">phishing\u003C/a> is emails intended for a specific target that typically include some level of personal information about the person.\u003C/p>\n\n\u003Cp>They use this information to pretend they are a friend, or family member, or have some personal relationship with you in order to get you to release information. Whaling is spear phishing targeted at high net worth or important individuals.\u003C/p>\n\n\u003Cp>Finally, vishing is spear phishing but over the phone.\u003C/p>\n\n\u003Ch3>DOS and DDoS attacks\u003C/h3>\n\n\u003Cp>Another common type of cyber attack seen, particularly affecting businesses, is a DOS or DDoS attack. This attack essentially involves overloading traffic entering a server to shut it down. Hackers then demand a ransom of some form in order to stop the attack.\u003C/p>\n\n\u003Ch3>Common Signs of a Cyber Attack\u003C/h3>\n\n\u003Cp>Learning how to protect yourself against a cyber attack starts with&nbsp;identifying the common signs&nbsp;that an attack is already underway.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-15.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-right\" height=\"174\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttttttttttttttttttttttttttttttttt-15.jpeg\" width=\"289\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>\u003Cstrong>Here are some of the most common signs that a hacker is attempting to steal information:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Cem>Your computer speed inexplicably slows down\u003C/em>\u003C/li>\n\t\u003Cli>\u003Cem>Your security software has seemingly been disabled&nbsp;\u003C/em>\u003C/li>\n\t\u003Cli>\u003Cem>The system and computer continuously shutdown and restart\u003C/em>\u003C/li>\n\t\u003Cli>\u003Cem>Accounts have been locked or passwords have been changed&nbsp;\u003C/em>\u003C/li>\n\t\u003Cli>\u003Cem>You&rsquo;ve lost all control over your computer\u003C/em>\u003C/li>\n\t\u003Cli>\u003Cem>Files have been deleted, corrupted, moved, sent, or otherwise tampered with\u003C/em>\u003C/li>\n\u003C/ul>\n\n\u003Cp>The above signs are just the tip of the iceberg. While identifying a cyber attack in the process can help any person or company initiate procedures to stop the attack, it&rsquo;s not as secure as preventing the attack in the first place.\u003C/p>\n\n\u003Ch3>How to Protect Against a Cyber Attack\u003C/h3>\n\n\u003Cp>There are four main strategies any organization can use to protect against a cyber attack. Data shows that a cyber attack occurs roughly every&nbsp;44 seconds of the day, meaning that you should waste no time in implementing the following tips:\u003C/p>\n\n\u003Ch3>Implement multi-factor authentication\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto/0-fi-1211-min.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto/0-fi-1211-min.jpeg\" width=\"300\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>A simple yet effective way to prevent a cyber attack is to use multifactor authentication. Using this strategy, even if a password is leaked, the second form of authentication is still secure and data cannot be accessed.\u003C/p>\n\n\u003Cp>Common examples of multi-factor authentication include a rotating token, a secondary password message to a specific email or number, and more.\u003C/p>\n\n\u003Ch3>Train your workforce on how to spot cyber attacks\u003C/h3>\n\n\u003Cp>Protecting against hackers starts with educating your&nbsp;workforce. Train employees on how to spot phishing attempts and instruct them on what fake emails look like. Conduct mandatory training and test your employees periodically throughout the year with cyber attack drills.\u003C/p>\n\n\u003Ch3>Force your workforce to reset their passwords often\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bi-17.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"163\" src=\"https://cdn.quasa.io/photos/foto-1/00bi-17.jpeg\" width=\"300\" / alt=\"How to Identify and Protect Against Cyber Attacks\" loading=\"lazy\">\u003C/picture>While making your workforce create a new password often may receive backlash, it&rsquo;s undoubtedly one of the best ways to secure data.\u003C/p>\n\n\u003Cp>Most security experts agree that a password&nbsp;should be changed every three months&nbsp;to guarantee the most effective level of protection.\u003C/p>\n\n\u003Ch3>Keep all systems and software fully up to date\u003C/h3>\n\n\u003Cp>Legacy systems are easier for hackers to get into as they often don&rsquo;t have updates or support for their security. Always keep your systems, and anti-virus software, up to date to ensure it&rsquo;s as difficult as possible for a hacker to access.\u003C/p>\n\n\u003Ch3>Keep your organization protected\u003C/h3>\n\n\u003Cp>In an ideal world, you or your company will never suffer a cyber attack. However, the rising rates of cybercrime mean that it&rsquo;s important to be prepared for anything. Keep an eye out for the common signs, and types, of cyber attacks while taking preventative action to secure any and all sensitive data.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","how-to-identify-and-protect-against-cyber-attacks","2023-12-17T19:14:34.000000Z","2023-12-18T10:30:00.000000Z","18.12.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/v6JUU0u4xOYGriw98hylQAdUkhSP2nLUCP8CJt9H.jpg","https://cdn.quasa.io/images/news/v6JUU0u4xOYGriw98hylQAdUkhSP2nLUCP8CJt9H.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/v6JUU0u4xOYGriw98hylQAdUkhSP2nLUCP8CJt9H.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/v6JUU0u4xOYGriw98hylQAdUkhSP2nLUCP8CJt9H.webp","large",null,2330,3,"en",0,{"id":50,"title":51,"slug":52,"meta_title":92,"meta_description":93,"meta_keywords":94,"deleted_at":86,"created_at":95,"updated_at":96,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[98,113,125,138,151],{"title":99,"description":100,"slug":101,"created_at":102,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z","19.04.2026",{"title":58,"slug":63},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","small",13,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":117,"formatted_created_at":103,"category":118,"links":119,"view_type":110,"video_url":86,"views":124,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",15,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",36,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",47,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":155,"formatted_created_at":103,"category":156,"links":157,"view_type":110,"video_url":86,"views":162,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Google March 2026 Core Update: Massive Volatility, Traffic Winners & Losers Explained","The latest major Google algorithm change — the March 2026 Core Update — began rolling out on March 27, 2026, and was fully completed on April 8, 2026.","google-march-2026-core-update-massive-volatility-traffic-winners-losers-explained","2026-04-19T07:51:48.000000Z",{"title":58,"slug":63},{"image":158,"image_webp":159,"thumb":160,"thumb_webp":161},"https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp",55,[164,177,192,204,219],{"title":165,"description":166,"slug":167,"created_at":168,"publish_at":169,"formatted_created_at":170,"category":171,"links":172,"view_type":110,"video_url":86,"views":175,"likes":176,"lang":89,"comments_count":90,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":173,"image_webp":86,"thumb":174,"thumb_webp":174},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70812,2,{"title":178,"description":179,"slug":180,"created_at":181,"publish_at":182,"formatted_created_at":183,"category":184,"links":185,"view_type":85,"video_url":86,"views":190,"likes":191,"lang":89,"comments_count":90,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":186,"image_webp":187,"thumb":188,"thumb_webp":189},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70576,4,{"title":193,"description":194,"slug":195,"created_at":196,"publish_at":197,"formatted_created_at":198,"category":199,"links":200,"view_type":110,"video_url":86,"views":203,"likes":191,"lang":89,"comments_count":90,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":201,"image_webp":86,"thumb":202,"thumb_webp":202},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68210,{"title":205,"description":206,"slug":207,"created_at":208,"publish_at":209,"formatted_created_at":210,"category":211,"links":212,"view_type":110,"video_url":86,"views":217,"likes":176,"lang":89,"comments_count":218,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":213,"image_webp":214,"thumb":215,"thumb_webp":216},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42188,1,{"title":220,"description":221,"slug":222,"created_at":223,"publish_at":224,"formatted_created_at":225,"category":226,"links":227,"view_type":85,"video_url":86,"views":232,"likes":176,"lang":89,"comments_count":90,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":228,"image_webp":229,"thumb":230,"thumb_webp":231},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41285,[234,235,236,237,238,239,240,241,242,243,244,245,246],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]