[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-top-5-cybersecurity-threats-your-business-faces-in-2022":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":161,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Top 5 Cybersecurity Threats Your Business Faces in 2022","In 2020, the COVID-19 pandemic made a brand new playground for hackers.","Top 5 Cybersecurity Threats","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ade-4.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/ade-4.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>In 2020, the COVID-19 pandemic made a brand new playground for hackers. Because of lockdowns and social networking requirements throughout the planet, many scheduled jobs and initiatives needed to be placed on hold to ensure IT staff and companies could concentrate on allowing&nbsp;remote access.\u003C/p>\n\n\u003Cp>Cyberattacks have grown in volume in 2020 and the increase in cybercrime has been estimated at 400 percent due to the coronavirus. Microsoft reports that pandemic-related phishing and social engineering attacks have skyrocketed to 30,000 a day in the U.S. alone. Threat researchers say ransomware attacks have risen 800 percent during the pandemic.\u003C/p>\n\n\u003Cp>Everybody has been targeted at cyberattacks, but tendencies show&nbsp;small business or companies&nbsp;are among the most frequent targets. In reality, roughly 43 percent of cyberattacks target small companies!\u003C/p>\n\n\u003Ch4>What is Cybersecurity?\u003C/h4>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/how-to-learn-about-cybersecurity\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/adf-7.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/adf-7.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>Cybersecurity is the security of computer programs\u003C/a>&nbsp;from damage or theft for their own applications, hardware, some other electronic information in addition to in the disruption or misdirection of their solutions they supply.\u003C/p>\n\n\u003Cp>In the current world, cyber protection is generally connected with the net since a lot people have simple and immediate access to the community. But cyber security was a hazard since the very first computers began storing information.\u003C/p>\n\n\u003Cp>Cybercriminals have taken good advantage of this fear and doubt in their own cyber attacks. It&rsquo;s not unusual to see tales of banks, credit card companies, online retailers, telephone companies, and other businesses using their systems violated and client&rsquo;s information stolen.\u003C/p>\n\n\u003Cp>What should we expect in 2023? Cybersecurity experts say that these 5 cybersecurity dangers in 2022&nbsp;will probably have the largest impact on companies in the coming season:\u003C/p>\n\n\u003Ch3>1. Hacking the home\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/adc-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"178\" src=\"https://cdn.quasa.io/photos/foto-14/adc-10.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>With more people working and living from home, the amount of devices on the web has increased. The evolving universe of the connected lifestyle provides hackers potential entry points to houses and customers advice through devices, programs and services. These cyber offenders seem to exploit our vulnerability because we operate remotely and seek out online amusement.\u003C/p>\n\n\u003Cp>Individuals working from home regularly use private devices while still working and log into home networks which aren&rsquo;t completely secured. Over the duration of 2020, fiscal insecurity concerns climbed into an all-time large.\u003C/p>\n\n\u003Cp>With tens of thousands of Americans unemployed or experiencing decreased hours or wages, more families than were living paycheck to paycheck. While many users haven&rsquo;t changed their default passwords or settings, it becomes easier for criminals to access their own networks if they use it for leisure or work.\u003C/p>\n\n\u003Ch3>2. Beware of the &lsquo;wares&rsquo;\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/acz-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"188\" src=\"https://cdn.quasa.io/photos/foto-14/acz-1.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>Cyber Security analysts think that dangers from all of the products like ransomware malware, spyware, scareware and adware may stay among the greatest issues for safety groups in 2022.\u003C/p>\n\n\u003Cp>For instance a scam email simplifies individuals their webcams are compromised and particular pictures are captured. It takes one to make payment on Bitcoin to ruin these images.\u003C/p>\n\n\u003Cp>Ransomware, estimated to have cost $20 billion worldwide in 2020, is becoming even more creative and more damaging to inspire payment. It&rsquo;s been called by cybersecurity ventures a company will fall prey to a ransomware assault every 11 minutes in 2022. That is down from every 14 minutes in 2019.\u003C/p>\n\n\u003Ch3>3. Cloud-based threats\u003C/h3>\n\n\u003Cp>Cloud computing has quickened since the early 2020 because of the pandemic. A number of businesses have chosen in altering and leveraging their resources on the internet. This past year, we heard that companies will continue to work online through the cloud and it&rsquo;s predicted to do in 2022&nbsp;and beyond.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/acz-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"131\" src=\"https://cdn.quasa.io/photos/foto-14/acz-10.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>But this rapid migration into the cloud exposes companies to a ton of safety challenges and dangers. Cloud program vulnerabilities, imperfect information deletion, misconfigurations in cloud storage, and diminished visibility and control are a few of the frequent cloud solutions problems that increase cybersecurity dangers.\u003C/p>\n\n\u003Ch3>4. QR code abuse\u003C/h3>\n\n\u003Cp>Scammers and cybercriminals are quick to exploit&nbsp;new technologies&nbsp;because of their vindictive tricks. Hackers find chances in harnessing social engineering to obtain access to some customer&rsquo;s personal data in one scan.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/acz-2.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"136\" src=\"https://cdn.quasa.io/photos/foto-14/acz-2.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>Many companies like restaurant owners frequently make QR codes to provide us access to downloading their own program or menus in relation to the security standards set for the pandemic.\u003C/p>\n\n\u003Cp>But scammers use similar strategies to lure customers into downloading malicious programs that feign to do exactly the same. Rather than creating a code, the program will steal the customers information. After a hacker gains access to a specific company&rsquo;s customer database, then they could utilize this info to launch phishing scams under the guise of the provider.\u003C/p>\n\n\u003Ch3>5. Phishing\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">Phishing is one of the most frequent cyberattacks\u003C/a>&nbsp;as a result of high amount of interaction individuals have online. Phishing scams generally occur through social technology in conventional email and cloud solutions strikes.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/acz-4.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"130\" src=\"https://cdn.quasa.io/photos/foto-14/acz-4.jpeg\" width=\"300\" / alt=\"Top 5 Cybersecurity Threats Your Business Faces in 2022\" loading=\"lazy\">\u003C/picture>Phishing can lead to Account Takeover (ATO), Company Email Compromise (BEC), ransomware, credential theft and other security breaches.\u003C/p>\n\n\u003Cp>Many emails are disguised as messages from reputable individuals such as a supervisor, coworker, or business partner to fool your employees to tripping the enclosed malware or even granting unauthorized access. Their purpose is to become unsuspecting victims to click a malicious link or attachment or give up sensitive information.\u003C/p>\n\n\u003Cp>Organizations should make the most of email cybersecurity applications and worker training to decrease the risk related to these attacks.\u003C/p>\n\n\u003Cp>In a world in which the web links everything, cybersecurity hasn&rsquo;t been more crucial. While using IT services and updated hardware and software is vital, it&rsquo;s still essential to comprehend the current hackers to the security of your company.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","top-5-cybersecurity-threats-your-business-faces-in-2022","2022-05-09T18:05:41.000000Z","2022-05-09T06:30:00.000000Z","09.05.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/BdfOM3qjsgQw1r7zRYPWEEx1ynGZoTMT1zHAAtsC.jpg","https://cdn.quasa.io/images/news/BdfOM3qjsgQw1r7zRYPWEEx1ynGZoTMT1zHAAtsC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BdfOM3qjsgQw1r7zRYPWEEx1ynGZoTMT1zHAAtsC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BdfOM3qjsgQw1r7zRYPWEEx1ynGZoTMT1zHAAtsC.webp","large",null,2953,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,112,123,135,148],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",4,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":86,"views":26,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":124,"description":125,"slug":126,"created_at":127,"publish_at":127,"formatted_created_at":102,"category":128,"links":129,"view_type":109,"video_url":86,"views":134,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":130,"image_webp":131,"thumb":132,"thumb_webp":133},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",23,{"title":136,"description":137,"slug":138,"created_at":139,"publish_at":140,"formatted_created_at":102,"category":141,"links":142,"view_type":109,"video_url":86,"views":147,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":143,"image_webp":144,"thumb":145,"thumb_webp":146},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",44,{"title":149,"description":150,"slug":151,"created_at":152,"publish_at":153,"formatted_created_at":102,"category":154,"links":155,"view_type":109,"video_url":86,"views":160,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":156,"image_webp":157,"thumb":158,"thumb_webp":159},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",55,[162,175,189,201,216],{"title":163,"description":164,"slug":165,"created_at":166,"publish_at":167,"formatted_created_at":168,"category":169,"links":170,"view_type":109,"video_url":86,"views":173,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":171,"image_webp":86,"thumb":172,"thumb_webp":172},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70820,2,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":85,"video_url":86,"views":188,"likes":110,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70584,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":109,"video_url":86,"views":200,"likes":110,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":86,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68217,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":109,"video_url":86,"views":214,"likes":174,"lang":89,"comments_count":215,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42195,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":85,"video_url":86,"views":229,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41291,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]