[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-how-to-perfectly-protect-your-corporate-data-from-hacking":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":97,"popular_news":161,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":90,"category":91},"How to Perfectly Protect Your Corporate Data from Hacking?","If you’re running a company, you know how many threats you need to face daily.","Protect Your Corporate Data from Hacking, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/llllllll-1.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Perfectly Protect Your Corporate Data from Hacking?\" class=\"image-align-left\" height=\"185\" src=\"https://cdn.quasa.io/photos/17/llllllll-1.png\" width=\"272\" />\u003C/picture>If you&rsquo;re running a company, you know how many threats you need to face daily. One of the things you must pay extra attention to is the cybersecurity issue. With around 30,000 websites hacked daily, the threat is more than serious.\u003C/p>\n\n\u003Cp>Not all of these hacks are disastrous, but when it comes to companies making huge revenue and employing dozens of people, a breach inside their systems may mean a total collapse and closing of the company&rsquo;s doors. Hacker protection is essential, and everyone must develop an anti-hacking strategy.\u003C/p>\n\n\u003Cp>There are many ways for hackers to attack you, but also many ways to protect yourself. Most companies will opt for the pros, like&nbsp;InsightIT support services, which among many other things, will provide an anti-hacking solution.\u003C/p>\n\n\u003Cp>If you&rsquo;re planning to do things independently, be sure that it will be more complex than you think. Even if you hire a skilled person, they can&rsquo;t handle everything alone. That&rsquo;s why most hire IT companies. Here&rsquo;s what must be done to perfectly protect yourself from hacking attacks.\u003C/p>\n\n\u003Ch3>1. Use Multi-Factor Authentication on All Systems\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/llllllll-10.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Perfectly Protect Your Corporate Data from Hacking?\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/17/llllllll-10.jpeg\" width=\"275\" />\u003C/picture>It&rsquo;s easy to get to the admin login page for hackers. It&rsquo;s nearly public, so getting it is easy. What isn&rsquo;t easy is getting through the security code or the password. Skilled and capable hackers will often know how to break the password, which is why multi-factor authentication is needed.\u003C/p>\n\n\u003Cp>Multi-factor authentication or two-step verification is a process that allows users perfect control. After the password, the user must approve the login, usually on their smartphone. This way, no one can get in without your knowledge.\u003C/p>\n\n\u003Ch3>2. Don&rsquo;t Open Just Any Link That Comes Through The Mail\u003C/h3>\n\n\u003Cp>As a CEO, you get tons of emails daily. Some of these are not from your employees, partners, or clients. They might look that way, but they are not. This is called phishing and is&nbsp;the largest part of the \u003Ca href=\"https://quasa.io/media/how-hackers-are-using-malware-to-steal-fingerprints-and-sensitive-data\">hacking\u003C/a> business.\u003C/p>\n\n\u003Cp>Hackers will disguise themselves as someone you know and send you an email that asks you to click a link. If you do it, a worm instantly gets installed on your computer, providing access to the hackers. That&rsquo;s why you must stay alert and mind what you open.\u003C/p>\n\n\u003Ch3>3. Train Your Employees to Recognize Threats\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/llllllll-11.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Perfectly Protect Your Corporate Data from Hacking?\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/17/llllllll-11.jpeg\" width=\"300\" />\u003C/picture>The same stands for your employees. When your employees open their email addresses at the office, they do it through the shared network. Hackers who use their email to break into their computers are instantly inside the joint network.\u003C/p>\n\n\u003Cp>Train your employees not to open just anything on their computers. Ask them to look carefully into any email and double-check when they are unsure that an email is coming from someone they know.\u003C/p>\n\n\u003Ch3>4. Do Backup Regularly\u003C/h3>\n\n\u003Cp>When hackers intrude, they do it for several reasons. One is for pure fun, and this usually ends without damage. This is rare, though. Most hackers will look for ransom, try to transfer money from your bank accounts, or do it as corporate espionage.\u003C/p>\n\n\u003Cp>Estimates say that hackers will make over 10 trillion in damages by 2025, so doing backup and not allowing hackers to steal it is essential. Use cloud services as the best protection there is today. The only more secure way is to transfer vital data on an off-the-grid disk and store it in a safe.\u003C/p>\n\n\u003Ch3>5. Install Essential Cyber-Security Systems\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/llllllll-12.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Perfectly Protect Your Corporate Data from Hacking?\" class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/17/llllllll-12.jpeg\" width=\"300\" />\u003C/picture>Antivirus and anti-hacker software are not useful in many cases, but your systems will be significantly more harmful without them. Installing these means having&nbsp;\u003Ca href=\"https://quasa.io/media/6-ideas-businesses-can-enhance-their-cybersecurity-measures\">a basic level of security\u003C/a>, without which no one should do business.\u003C/p>\n\n\u003Cp>Develop a strong firewall that intercepts and prevents minor issues from destroying your network.\u003C/p>\n\n\u003Cp>A professional antivirus program can also capture viruses coming through the mail, so having this basic protection is crucial in the battle against hackers.\u003C/p>\n\n\u003Ch3>6. Limit Access to Most Sensitive Data\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/llllllll-13.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Perfectly Protect Your Corporate Data from Hacking?\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/17/llllllll-13.jpg\" width=\"300\" />\u003C/picture>One thing that many CEOs and managers do is limit access to the most sensitive data of their company.\u003C/p>\n\n\u003Cp>Suppose you&rsquo;re working on a new project and you&rsquo;re afraid of your competition getting their hands on sensitive documents. Limiting access to them means not allowing just everyone to access and see what there is.\u003C/p>\n\n\u003Cp>Various teams may have access to what they require for work, but only you can have everything available to see. This way, it will be harder for hackers to collect all the necessary data and hand it over to the competition. It is a shame when you work on a product for years and see someone race you through the finish line just before launch.\u003C/p>\n\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/innovative-technologies-that-will-shape-the-industry-in-2025\">Innovative Technologies That Will Shape The Industry In 2025\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/what-s-up-with-those-sloppy-ai-generated-tattoo-posters-in-new-york-city\">What&#39;s Up With Those Sloppy AI-Generated Tattoo Posters in New York City?\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/branding-and-content-6-ways-these-strategies-complement-each-other-in-marketing\">Branding and Content: 6 Ways These Strategies Complement Each Other In Marketing\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>Conclusion\u003C/h3>\n\n\u003Cp>These few points show you the six essential moves you must make to&nbsp;provide ultimate security. If you&rsquo;re running a company, practice all these we mentioned or dedicate the task to a professional IT-managed service company that will know what is crucial before you even tell them.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","how-to-perfectly-protect-your-corporate-data-from-hacking","2023-01-27T11:49:21.000000Z","2023-01-27T08:30:00.000000Z","27.01.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/nw4haqfcqUIgnbs4IFZlvxGF3EB3X6tA6uW7fu0R.jpg","https://cdn.quasa.io/images/news/nw4haqfcqUIgnbs4IFZlvxGF3EB3X6tA6uW7fu0R.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/nw4haqfcqUIgnbs4IFZlvxGF3EB3X6tA6uW7fu0R.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/nw4haqfcqUIgnbs4IFZlvxGF3EB3X6tA6uW7fu0R.webp","large",null,1970,1,"en",0,{"id":50,"title":51,"slug":52,"meta_title":92,"meta_description":93,"meta_keywords":94,"deleted_at":86,"created_at":95,"updated_at":96,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[98,113,124,135,148],{"title":99,"description":100,"slug":101,"created_at":102,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",8,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":117,"formatted_created_at":103,"category":118,"links":119,"view_type":110,"video_url":86,"views":30,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":128,"formatted_created_at":103,"category":129,"links":130,"view_type":110,"video_url":86,"views":50,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":136,"description":137,"slug":138,"created_at":139,"publish_at":140,"formatted_created_at":103,"category":141,"links":142,"view_type":110,"video_url":86,"views":147,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":143,"image_webp":144,"thumb":145,"thumb_webp":146},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",47,{"title":149,"description":150,"slug":151,"created_at":152,"publish_at":153,"formatted_created_at":103,"category":154,"links":155,"view_type":110,"video_url":86,"views":160,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":156,"image_webp":157,"thumb":158,"thumb_webp":159},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",58,[162,175,190,202,216],{"title":163,"description":164,"slug":165,"created_at":166,"publish_at":167,"formatted_created_at":168,"category":169,"links":170,"view_type":110,"video_url":86,"views":173,"likes":174,"lang":89,"comments_count":90,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":171,"image_webp":86,"thumb":172,"thumb_webp":172},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70823,2,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":85,"video_url":86,"views":188,"likes":189,"lang":89,"comments_count":90,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70587,4,{"title":191,"description":192,"slug":193,"created_at":194,"publish_at":195,"formatted_created_at":196,"category":197,"links":198,"view_type":110,"video_url":86,"views":201,"likes":189,"lang":89,"comments_count":90,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":199,"image_webp":86,"thumb":200,"thumb_webp":200},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68220,{"title":203,"description":204,"slug":205,"created_at":206,"publish_at":207,"formatted_created_at":208,"category":209,"links":210,"view_type":110,"video_url":86,"views":215,"likes":174,"lang":89,"comments_count":88,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":211,"image_webp":212,"thumb":213,"thumb_webp":214},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42198,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":85,"video_url":86,"views":229,"likes":174,"lang":89,"comments_count":90,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41293,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]