[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-the-top-cybersecurity-threats-for-small-businesses":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":164,"categories":235},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"The Top Cybersecurity Threats for Small Businesses","Small businesses may not have to worry much about large-scale cyber terrorism efforts, but they are vulnerable to breaches.","Cybersecurity Threats for Small Businesses, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vv-27.webp\" type=\"image/webp\">\u003Cimg alt=\"The Top Cybersecurity Threats for Small Businesses\" class=\"image-align-left\" height=\"166\" src=\"https://cdn.quasa.io/photos/foto-19/vv-27.jpeg\" width=\"300\" />\u003C/picture>Small businesses may not have to worry much about&nbsp;large-scale cyber terrorism efforts,&nbsp;but they are vulnerable to breaches. Hacks can cost a fortune in repairs and fines. They also scare customers away.\u003C/p>\n\n\u003Cp>With the right precautions, you can avoid them. In this article, we take a look at how you can protect your small business against cyber threats.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Outdated Systems\u003C/strong>\u003C/h3>\n\n\u003Cp>Regularly updating your technology is key to keeping your system secure. For one thing, outdated firewalls may simply not perform to the standards that they used to. They need to be maintained to guarantee even the same level of functionality they had when they were first downloaded.\u003C/p>\n\n\u003Cp>Cyber threats are also constantly evolving. A&nbsp;\u003Ca href=\"https://quasa.io/media/research-methods-in-cyber-security-and-data-governance\">cyber security\u003C/a>&nbsp;strategy that was developed ten years ago might not be relevant today. Hacker methods change. This means that security methods have to change as well to keep systems safe.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Bad Password Hygiene\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vv-26.webp\" type=\"image/webp\">\u003Cimg alt=\"The Top Cybersecurity Threats for Small Businesses\" class=\"image-align-left\" height=\"164\" src=\"https://cdn.quasa.io/photos/foto-19/vv-26.jpeg\" width=\"300\" />\u003C/picture>Passwords are a tricky thing. Everyone has a few dozen of them. It&rsquo;s impossible to keep track of every password, leaving many to rely on autofill, or simply writing them down somewhere.\u003C/p>\n\n\u003Cp>While these strategies might work for protecting accounts that don&rsquo;t contain particularly sensitive information, they should not be used at your business.\u003C/p>\n\n\u003Cp>Good&nbsp;password protection&nbsp;strategies involve multiple verification steps, automated sign-outs to ensure that accounts aren&rsquo;t left open indefinitely, and password strength requisites that ensure the information can&rsquo;t be easily accessed by an outside party.\u003C/p>\n\n\u003Cp>Inconvenient? Perhaps. But a similar level of security is typically applied to keeping physical business locations secure. You lock your doors. You make keys that only authorized personnel are allowed to access. You might even have a security system and cameras to prevent break-ins.\u003C/p>\n\n\u003Cp>This same presence of mind should be applied to password protection.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Phishing\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vv-29.webp\" type=\"image/webp\">\u003Cimg alt=\"The Top Cybersecurity Threats for Small Businesses\" class=\"image-align-left\" height=\"230\" src=\"https://cdn.quasa.io/photos/foto-19/vv-29.jpeg\" width=\"300\" />\u003C/picture>Everyone gets phishing emails.\u003C/p>\n\n\u003Cp>If you take a look at your spam folder, you will probably find that you are getting many every day. Most people know not to open them, but every once in a while, one gets past the goalie.\u003C/p>\n\n\u003Cp>While it may seem like an innocuous threat, phishing emails have been the cause of many significant breaches over the years, most notably the large Marriott breach that saw hundreds of millions of people experience compromises to their personal information.\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/phishing-as-a-way-to-check-email-deliverability1\">Phishing\u003C/a> emails can be avoided through proper training and constant vigilance.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Malware\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/everything-you-need-to-know-about-malware\">Malware\u003C/a>, like phishing emails, is a constant threat that your system probably interacts with routinely, all without you even realizing it. You know not to go to suspicious sites, or open strange links, and yet every once and a while, mistakes get made anyway.\u003C/p>\n\n\u003Cp>As with phishing emails, awareness and best practices are the easiest way to protect against malware. You also need to keep your cyber security systems updated. Anti-malware software not only protects against threats, but it also usually allows you to avoid them entirely by identifying fishy sites and troublesome links.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Poor Staff Training\u003C/strong>\u003C/h3>\n\n\u003Cp>Poor staff training can undermind even the best intentions. If you follow all cyber security practices closely but your staff does not, the damage will be as just as bad. You can address this concern with regular training, and by emphasizing the importance of cyber security within your business.\u003C/p>\n\n\u003Cp>Make sure the members of your staff understand why you make certain decisions, what the threats are, and how they can help your business avoid them. The vast majority of team members will be happy to comply, especially when they understand the reason behind your rules.\u003C/p>\n\n\u003Ch4>\u003Cstrong>Mobile Technology\u003C/strong>\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bo-12.webp\" type=\"image/webp\">\u003Cimg alt=\"The Top Cybersecurity Threats for Small Businesses\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-1/00bo-12.jpeg\" width=\"300\" />\u003C/picture>Mobile technology&nbsp;includes anything from wearables to tablets and phones. You probably have a security system in place for your work computer, but are you applying the same caution to your mobile devices?\u003C/p>\n\n\u003Cp>If you put business information on your phone or tablet, you need to make sure that it is just as secure as your work computer. This means applying the same security measures described above to your devices.\u003C/p>\n\n\u003Cp>Protect them with good passwords, avoid mysterious emails and unsafe sites, and stay away from insecure wifi connection points.\u003C/p>\n\n\u003Cp>Keep in mind that a bad actor can easily infiltrate your entire system by way of your phone or tablet.\u003C/p>\n\n\u003Ch3>\u003Cstrong>IoT\u003C/strong>\u003C/h3>\n\n\u003Cp>Finally, IoT. The&nbsp;\u003Ca href=\"https://quasa.io/media/10-examples-of-internet-of-things-in-healthcare\">Internet of Things\u003C/a>&nbsp;is at once popular and largely misunderstood. Smart devices of any kind fall into this category. Your smart thermostat, smart toaster, smart anything. IoT can be a convenient way to automate certain tasks around your home or business.\u003C/p>\n\n\u003Cp>However, this new and rapidly growing technology remains vulnerable to system compromises. Hackers can use IoT as a point of entry into larger systems. Does this mean you should forgo smart devices entirely?\u003Cbr />\nNot necessarily. If IoT is an important element of your business or lifestyle, you can make it compatible with cyber security by implementing best practices and by making sure your entire staff is aware of best practices.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Getting Extra Help\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vv-31.webp\" type=\"image/webp\">\u003Cimg alt=\"The Top Cybersecurity Threats for Small Businesses\" class=\"image-align-left\" height=\"159\" src=\"https://cdn.quasa.io/photos/foto-19/vv-31.jpeg\" width=\"300\" />\u003C/picture>Cyber security professionals&nbsp;can help you with all of the concerns listed above.\u003C/p>\n\n\u003Cp>An analyst will come in, test your system, identify points where you are vulnerable, and make updates and recommendations. They often do this by testing your system the same way that hackers do, attempting to get in, and telling you how they did it.\u003C/p>\n\n\u003Cp>Cyber security analysts are expensive to hire, but they are cost-effective in the long run. Security breaches can set businesses back many months, costing a fortune to repair, and resulting in a loss of business from customers who worry their information might not be safe.\u003C/p>\n\n\u003Cp>With the right steps, you can avoid threats and keep your and your customer&rsquo;s data secure.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","the-top-cybersecurity-threats-for-small-businesses","2023-10-15T06:41:48.000000Z","2023-10-20T10:30:00.000000Z","20.10.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/80uVLEbfdOZRIo4jubriCuw8qECLPJqVn2DRmU6A.jpg","https://cdn.quasa.io/images/news/80uVLEbfdOZRIo4jubriCuw8qECLPJqVn2DRmU6A.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/80uVLEbfdOZRIo4jubriCuw8qECLPJqVn2DRmU6A.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/80uVLEbfdOZRIo4jubriCuw8qECLPJqVn2DRmU6A.webp","small",null,1759,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,111,125,138,151],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":85,"video_url":86,"views":62,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Huawei’s Moon Mode Scandal: The Forgotten 2019 AI Fake That Suddenly Feels Nostalgic — As Huawei Prepares to Power DeepSeek V4","In early April 2026, a quiet but seismic piece of news dropped: DeepSeek’s upcoming V4 model — the next major leap from one of China’s strongest open-weight AI labs — will run entirely on Huawei chips, not Nvidia.","huawei-s-moon-mode-scandal-the-forgotten-2019-ai-fake-that-suddenly-feels-nostalgic-as-huawei-prepares-to-power-deepseek-v4","2026-04-11T13:33:59.000000Z","2026-04-16T03:25:00.000000Z","16.04.2026",{"title":65,"slug":66},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":116,"formatted_created_at":117,"category":118,"links":119,"view_type":85,"video_url":86,"views":124,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Meta’s Muse Spark: A Respectable Step Up That Finally Puts Them Back in the Game","On April 8, 2026, Meta Superintelligence Labs quietly dropped Muse Spark — the first model in their new “Muse” family. It’s not the flashy, headline-grabbing monster that instantly claims the #1 spot on every leaderboard. But here’s the thing: it doesn’t have to be.","meta-s-muse-spark-a-respectable-step-up-that-finally-puts-them-back-in-the-game","2026-04-11T13:12:57.000000Z","2026-04-15T11:06:00.000000Z","15.04.2026",{"title":58,"slug":63},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp",106,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":117,"category":131,"links":132,"view_type":85,"video_url":86,"views":137,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Services: The New Software – Why the Next $1 Trillion Company Will Look Like a Services Firm","In March 2026, Sequoia Capital published a provocative essay titled \"Services: The New Software\". The core idea is as bold as it is timely: the next trillion-dollar company won't sell software tools. It will sell the actual work itself — powered by AI, delivered as a seamless service, and disguised as a traditional services business.","services-the-new-software-why-the-next-1-trillion-company-will-look-like-a-services-firm","2026-04-11T13:03:12.000000Z","2026-04-15T09:50:00.000000Z",{"title":47,"slug":48},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp",114,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":117,"category":144,"links":145,"view_type":85,"video_url":86,"views":150,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"When Cursor Wiped a User's PC: A Cautionary Tale of AI Overreach","We recently received a sobering story from a subscriber, a stark reminder of the potential pitfalls when granting AI agents unfettered access to your system. It's a scenario that sounds deceptively simple, but the consequences were almost catastrophic.","when-cursor-wiped-a-user-s-pc-a-cautionary-tale-of-ai-overreach","2026-04-10T18:43:40.000000Z","2026-04-15T06:26:00.000000Z",{"title":19,"slug":20},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp",128,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":156,"formatted_created_at":117,"category":157,"links":158,"view_type":85,"video_url":86,"views":163,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"The Great AI Talent Paradox: Why Everyone is Hiring \"AI Engineers\" but Nobody Can Find Them","I see this pattern repeating across dozens of companies. The founder or CTO has a mature engineering team. Everyone knows how to code; most use Cursor or Claude Code. Formally, they are all \"working with AI.\" But when you look under the hood at the actual processes, you realize the AI is just a thin layer smeared over an obsolete architectural workflow.","the-great-ai-talent-paradox-why-everyone-is-hiring-ai-engineers-but-nobody-can-find-them","2026-04-10T18:01:04.000000Z","2026-04-15T03:46:00.000000Z",{"title":19,"slug":20},{"image":159,"image_webp":160,"thumb":161,"thumb_webp":162},"https://cdn.quasa.io/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.jpg","https://cdn.quasa.io/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/RFS0sj442hsQE2CPWuqYIzC1ajFQV96M6Bz7axJF.webp",140,[165,178,194,206,221],{"title":166,"description":167,"slug":168,"created_at":169,"publish_at":170,"formatted_created_at":171,"category":172,"links":173,"view_type":85,"video_url":86,"views":176,"likes":177,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":174,"image_webp":86,"thumb":175,"thumb_webp":175},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70370,2,{"title":179,"description":180,"slug":181,"created_at":182,"publish_at":183,"formatted_created_at":184,"category":185,"links":186,"view_type":191,"video_url":86,"views":192,"likes":193,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":187,"image_webp":188,"thumb":189,"thumb_webp":190},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","large",70120,4,{"title":195,"description":196,"slug":197,"created_at":198,"publish_at":199,"formatted_created_at":200,"category":201,"links":202,"view_type":85,"video_url":86,"views":205,"likes":193,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":203,"image_webp":86,"thumb":204,"thumb_webp":204},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",67774,{"title":207,"description":208,"slug":209,"created_at":210,"publish_at":211,"formatted_created_at":212,"category":213,"links":214,"view_type":85,"video_url":86,"views":219,"likes":177,"lang":89,"comments_count":220,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":215,"image_webp":216,"thumb":217,"thumb_webp":218},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",41794,1,{"title":222,"description":223,"slug":224,"created_at":225,"publish_at":226,"formatted_created_at":227,"category":228,"links":229,"view_type":191,"video_url":86,"views":234,"likes":177,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":230,"image_webp":231,"thumb":232,"thumb_webp":233},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",40924,[236,237,238,239,240,241,242,243,244,245,246,247,248],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]