[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-how-to-protect-backups-from-ransomware":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":160,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":42,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"How to Protect Backups From Ransomware","With so many threats lurking around every corner of the web, keeping your data safe can seem like an impossible feat these days.","Protect Backups From Ransomware, technology, business","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/gggggg-2-6880bb.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/17/gggggg-2-6880bb.jpeg\" width=\"275\" />\u003C/picture>With so many threats lurking around every corner of the web, keeping your data safe can seem like an impossible feat these days. This is especially true when you consider how even some of the largest corporations and government organizations have fallen victim to cyber threats within the last several years. If a company with access to some of the most sophisticated security technology in the world can&rsquo;t prevent online attacks, how do you stand a chance?\u003C/p>\n\n\u003Cp>One of the most widespread types of web attacks these days is ransomware, which can quite literally take your data for ransom. And unfortunately, even data&nbsp;\u003Cem>backups\u003C/em>&nbsp;can fall victim to this threat.\u003C/p>\n\n\u003Cp>The good news? By having a better understanding of how ransomware attacks work and the steps you can take to protect your backups, you can drastically reduce your chances of falling victim.\u003C/p>\n\n\u003Ch3>How Ransomware Attacks Work\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/eeeeeee-2.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" src=\"https://cdn.quasa.io/photos/17/eeeeeee-2.jpg\" width=\"300\" />\u003C/picture>So, how do ransomware attacks happen in the first place? Specifically, ransomware is a type of malware that is designed to &ldquo;lock down&rdquo; the files and data on your device by encrypting them. This prevents you from being able to access the data without actually destroying it. From there, the entity controlling the ransomware itself can request a &ldquo;ransom&rdquo; to be paid in exchange for the decryption code that will restore access to your files.\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/how-to-protect-your-business-against-ransomware-attacks\">Ransomware\u003C/a> can come from a wide range of sources, but it is most often sent through email, text messages, or social media messages.\u003C/p>\n\n\u003Cp>When the victim clicks on a file/download thinking that it is a legitimate file, the malware can infect the device&rsquo;s hard drive(s) and hold those files hostage until the attack is complete.\u003C/p>\n\n\u003Ch3>The Dangers of Ransomware Attacks\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/gggggg-1-1373f0.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/17/gggggg-1-1373f0.jpeg\" width=\"275\" />\u003C/picture>Unfortunately, instances of ransomware attacks have been increasing for years &mdash; and they don&rsquo;t show any signs of stopping anytime soon. In fact, the size and scope of ransomware attacks have increased significantly, and ransom&nbsp;\u003Cem>amounts\u003C/em>&nbsp;(the amount victims payout to regain access to their data) have also&nbsp;increased by a whopping 171% since 2019 alone.\u003C/p>\n\n\u003Cp>Combine this with the fact that ransomware attackers are going after not just individuals, but companies of all sizes, and it&rsquo;s easy to see why this is a threat that&nbsp;\u003Cem>nobody\u003C/em>&nbsp;can afford to ignore.\u003C/p>\n\n\u003Cp>In addition to the financial havoc that a ransomware attack can wreak, there&rsquo;s also the simple fact that paying a ransom never&nbsp;\u003Cem>guarantees\u003C/em>&nbsp;that the attackers will keep their word and provide a victim with a legitimate decryption code. Even if the code/key works, there is always the possibility that the attacker will leak sensitive data or go after the same victims again. With this in mind, recovering from a ransomware attack can be very difficult.\u003C/p>\n\n\u003Ch3>How to Protect Your Backups From Ransomware\u003C/h3>\n\n\u003Cp>The good news is that there&nbsp;\u003Cem>are\u003C/em>&nbsp;steps you can take to protect your data backups from ransomware attacks. This all begins with choosing the right security solutions for your specific needs. Consider, for example, hiring a cybersecurity professional to run a security audit on your infrastructure. This can be a great way to reveal potential shortcomings in your security measures that can be easily rectified to improve protection. Recommended measures could range anywhere from installing a virus protection program and implementing a firewall to setting up additional data backups or other cybersecurity measures.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/17/gggggg-3.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/17/gggggg-3.jpeg\" width=\"299\" />\u003C/picture>From there, don&rsquo;t overlook the importance of common sense when it comes to cybersecurity best practices. This is true not just for you personally, but for anybody else who may have shared access to your data.\u003C/p>\n\n\u003Cp>For larger corporations, this may mean providing in-depth cybersecurity training to employees often.\u003C/p>\n\n\u003Cp>Even though&nbsp;\u003Cem>you\u003C/em>&nbsp;might know that you should never open a link from an email address you don&rsquo;t recognize, you should never assume that others within your organization share this same knowledge.\u003C/p>\n\n\u003Cp>Take the time to train your employees on how to detect common ransomware threats and how to report them. This can go a long way in protecting your information from these attacks.\u003C/p>\n\n\u003Cp>Likewise, remember the rule of three when it comes to storing your important data. Every file should be stored in at least three locations: one on your system, one on a different type of reliable media (such as an external hard drive or flash drive), and one completely off-site (such as on a third-party&nbsp;dedicated server with DDoS protection). This way, even if one of your drives is infected with malware, you will still have access to the compromised files on other backups so they aren&rsquo;t entirely lost.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00-au-11.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-1/00-au-11.jpeg\" width=\"300\" />\u003C/picture>Of course, simply having data backups in place may not be enough if you&rsquo;re not taking the time to back up your data regularly. The frequency with which your files should be backed up will ultimately depend on many factors, ranging from the size of your organization to how often your files change/update.\u003C/p>\n\n\u003Cp>Regardless, it&rsquo;s important to have a backup schedule in place that you can easily follow. If you think you&rsquo;ll have a hard time remembering to back up your data when needed, you might want to set up automatic backups instead.\u003C/p>\n\n\u003Cp>Last but not least, be sure to have a game plan in place for how you (or your organization as a whole) would handle a ransomware event.\u003C/p>\n\n\u003Cp>It&rsquo;s not a fun thing to think about or plan for, but you need to know whether you will plan on paying the ransom (or how much you are willing to pay before exploring alternate options).\u003C/p>\n\n\u003Cp>While many people choose to pay the ransom when they fall victim to this type of attack, it may not&nbsp;\u003Cem>always\u003C/em>&nbsp;be the best choice. Make sure everybody within your organization knows the protocol for a ransomware attack and how to follow it. This should include a protocol on how to report an attack (or suspected attack) as soon as it occurs.\u003C/p>\n\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/system-security-and-error-management-in-2025\">System Security and Error Management in 2025\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/top-7-habits-you-must-practice-if-you-want-to-be-highly-effective\">Top 7 Habits You must Practice if you want to Be Highly Effective\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/are-your-instagram-filters-helping-or-hurting-engagement\">Are Your Instagram Filters Helping or Hurting Engagement?\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>The Bottom Line on Ransomware and Backups\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-12.webp\" type=\"image/webp\">\u003Cimg alt=\"How to Protect Backups From Ransomware\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-12.jpeg\" width=\"300\" />\u003C/picture>Nobody wants to plan for ransomware attacks. Unfortunately, this type of malware has become so widespread that it&rsquo;s something every web user should be thinking about. By understanding how these attacks work and the measures you can take to protect your data backups from ransomware, you can avoid becoming a victim. Likewise, if you&nbsp;\u003Cem>do\u003C/em>&nbsp;fall victim to a ransomware attack, having a plan in place will expedite the process of restoring your data and getting back to business &ldquo;as usual.&rdquo;\u003C/p>\n\n\u003Cp>Through the use of antivirus software and firewalls, extensive cybersecurity training, and the &ldquo;rule of threes&rdquo; for \u003Ca href=\"https://quasa.io/media/best-5-data-backup-cases\">data backups\u003C/a>, you can keep your most sensitive information safe.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","how-to-protect-backups-from-ransomware","2023-03-30T10:00:21.000000Z","2026-01-16T08:30:00.000000Z","16.01.2026",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/ixJetDDzEkUE7B0HKFWwZfAyibPzRFmJlQa5qV6i.png","https://cdn.quasa.io/images/news/ixJetDDzEkUE7B0HKFWwZfAyibPzRFmJlQa5qV6i.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/ixJetDDzEkUE7B0HKFWwZfAyibPzRFmJlQa5qV6i.png","https://cdn.quasa.io/thumbs/news-thumb/images/news/ixJetDDzEkUE7B0HKFWwZfAyibPzRFmJlQa5qV6i.webp","small",null,1490,0,"en",{"id":42,"title":43,"slug":44,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog about growth hacking in Tech","All the most interesting and useful about technologies. Exclusive articles from technologies you won't find anywhere else.","Technology, tech, business, ai, gadget, gadgets, life hacks","2023-03-23T08:15:32.000000Z","2024-08-25T15:37:57.000000Z",[97,111,122,134,147],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":85,"video_url":86,"views":109,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp",4,false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":85,"video_url":86,"views":26,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":102,"category":127,"links":128,"view_type":85,"video_url":86,"views":133,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",23,{"title":135,"description":136,"slug":137,"created_at":138,"publish_at":139,"formatted_created_at":102,"category":140,"links":141,"view_type":85,"video_url":86,"views":146,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":142,"image_webp":143,"thumb":144,"thumb_webp":145},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",43,{"title":148,"description":149,"slug":150,"created_at":151,"publish_at":152,"formatted_created_at":102,"category":153,"links":154,"view_type":85,"video_url":86,"views":159,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",54,[161,174,189,201,216],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":85,"video_url":86,"views":172,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":86,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70819,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":187,"video_url":86,"views":188,"likes":109,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","large",70583,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":85,"video_url":86,"views":200,"likes":109,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":86,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68217,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":85,"video_url":86,"views":214,"likes":173,"lang":89,"comments_count":215,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42195,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":187,"video_url":86,"views":229,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41291,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]