[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-what-are-some-ways-to-protect-identities-on-the-internet":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":97,"popular_news":163,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":90,"category":91},"What Are Some Ways To Protect Identities On The Internet?","We live in a time where obtaining information about someone may be as simple as pressing a few buttons.","Protect Identities On The Internet, tech, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/y-11.webp\" type=\"image/webp\">\u003Cimg alt=\"What Are Some Ways To Protect Identities On The Internet?\" class=\"image-align-left\" height=\"97\" src=\"https://cdn.quasa.io/photos/foto-19/y-11.jpeg\" width=\"300\" />\u003C/picture>We live in a time where obtaining information about someone may be as simple as pressing a few buttons. \u003Ca href=\"https://quasa.io/media/blockchain-based-data-security-taking-over-key-industries\">Data security\u003C/a> has always been a priority. It&rsquo;s why individuals secure their filing cabinets with locks and rent safe deposit boxes at their institutions.\u003C/p>\n\n\u003Cp>People are now sharing more information about themselves than they ever have; thanks to social media platforms and the internet. Some things, especially your online persona, are worth keeping hidden.\u003C/p>\n\n\u003Cp>Every day, we expose ourselves to cybercrime in a variety of ways, from online shopping to mobile banking. Data&nbsp;is becoming more important as more of our data is digital and we share more information online.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/y-12.webp\" type=\"image/webp\">\u003Cimg alt=\"What Are Some Ways To Protect Identities On The Internet?\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-19/y-12.jpeg\" width=\"275\" />\u003C/picture>The more the internet has become a commodity in our lives, the more important it has and is linked to us in every aspect, making it safe is only becoming to make it safer and more secure crucial.\u003C/p>\n\n\u003Cp>Just like our homes, we need to protect our internet online presence as well. This is why it is important to choose secure internet plans.\u003C/p>\n\n\u003Cp>However, to protect your identity on the internet, below there are some more ways you must include in your daily networking could implement for stay safe online.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Strong Passwords\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/y-13.webp\" type=\"image/webp\">\u003Cimg alt=\"What Are Some Ways To Protect Identities On The Internet?\" class=\"image-align-left\" height=\"213\" src=\"https://cdn.quasa.io/photos/foto-19/y-13.jpeg\" width=\"237\" />\u003C/picture>Creating strong passwords&nbsp;is the most initial step that you can take to protect your identity. Whenever you are creating passwords, make sure that they are not very personal that any cybercriminal can figure out easily, for instance, passwords like your pet&rsquo;s name, or birthday.\u003C/p>\n\n\u003Cp>You might think that keeping your great-aunt&rsquo;s name as a password with some digits added in the end is a great escape, -well it&rsquo;s not. You must choose a combination of upper and lower cases, special symbols, and numbers.\u003C/p>\n\n\u003Cp>You must keep changing your passwords quarterly preferably. It is also ideal to create a different and unique password across multiple sites instead of using the same one all across.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Avoid Using Free Wi-Fi\u003C/strong>\u003C/h3>\n\n\u003Cp>Due to an all-time need for an&nbsp;internet connection, public spaces now offer free Wi-Fi services. These \u003Ca href=\"https://quasa.io/media/7-important-tips-for-using-public-wi-fi-networks-without-worry\">Wi-Fi \u003C/a>networks have little to no security protections set in place, others on the same network can readily see what you are up to. As they are less secure they are easy for cybercriminals to access.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Do Not Over-share On Social Media\u003C/strong>\u003C/h3>\n\n\u003Cp>Avoid sharing too much on social media. Giving too much information on social media sites like Facebook, Instagram, and Twitter will make it simpler for hackers to get identifying information, allowing them to steal it to access your financial information as well.\u003C/p>\n\n\u003Cp>Check your privacy settings to see who has access to your posts, and be cautious about disclosing sensitive information like your location, birthplace, birthday, or other personal details. It is suggested that you ignore the &lsquo;About Me&rsquo; section in the social media profiles to protect your online anonymity.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Avoid Links and Attachments\u003C/strong>\u003C/h3>\n\n\u003Cp>Cybercriminals are astute, and their phishing scams are frequently disguised as legitimate messages from a bank, utility company, or other organization. Spam can be identified by certain characteristics, such as misspellings or a different email address than the regular sender.\u003C/p>\n\n\u003Cp>Don&rsquo;t be taken in by these ruses. If you click on a phishing link, you may be led to a faked website that looks like a bank or financial institution&rsquo;s homepage. When you submit your account information, however, you will be sending it to phishing scammers.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Avoid Enabling Cookies\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/y-15.webp\" type=\"image/webp\">\u003Cimg alt=\"What Are Some Ways To Protect Identities On The Internet?\" class=\"image-align-left\" height=\"175\" src=\"https://cdn.quasa.io/photos/foto-19/y-15.jpeg\" width=\"287\" />\u003C/picture>You must at all costs avoid enabling cookies unless required by the website. Cookies are small pieces of information that websites save on your computers, such as which websites you visit and how you consume them.\u003C/p>\n\n\u003Cp>Although a majority of them keep those details confidential for the cybercriminals, this is another way to obtain your personal information. You can enable the cookies but only if it is very necessary for your goal.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Encrypted Websites\u003C/strong>\u003C/h3>\n\n\u003Cp>Before performing any type of online financial transaction, search for indicators that the website is encrypted. To do so, look for two items in the URL or web address bar. When you&rsquo;re on a secure site, the &ldquo;HTTP&rdquo; turns to &ldquo;HTTPS&rdquo; when you&rsquo;re on a page that asks for your credit card information.\u003C/p>\n\n\u003Cp>A lock symbol will show on the right side of the address bar or at the bottom left of your browser window at the same moment. These two signals indicate that the website is encrypted, implying that no one would be able to read data as it is transferred to the website owner.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Install Security Programs\u003C/strong>\u003C/h3>\n\n\u003Cp>Always keep anti-virus software installed on all your devices. These security suites protect your devices from being attacked by hackers, trying to steal personal information, or even tracking your information. It blocks harmful viruses, spyware, etc. Manufacturers keep their virus protection software up-to-date as a shield against the latest malware. You must make sure that you either have these purchased or installed for security.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Use VPNs\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/y-17.webp\" type=\"image/webp\">\u003Cimg alt=\"What Are Some Ways To Protect Identities On The Internet?\" class=\"image-align-left\" height=\"201\" src=\"https://cdn.quasa.io/photos/foto-19/y-17.jpeg\" width=\"300\" />\u003C/picture>\u003Ca href=\"https://quasa.io/media/how-to-access-your-favorite-shows-with-a-vpn\">VPN\u003C/a>&nbsp;(a virtual private network) gives you anonymity by transferring your public connection to a private network. VPNs conceal the Internet Protocol (IP) address which makes all your online actions untraceable.\u003C/p>\n\n\u003Cp>Whenever you use public Wi-Fi at any public place, VPN is very important. Cybercriminals have a harder time breaching online&nbsp;privacy en bescherming&nbsp;and obtaining access to your private information when you use a VPN.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Password Protection&nbsp;\u003C/strong>\u003C/h3>\n\n\u003Cp>All your devices; from mobile phones to a Wi-Fi router must be password protected. If you do not put any password on your routers, your connection becomes accessible to anyone in the range. Hackers can easily steal all the information. Your mobile phone must be secure with a passcode as well. It should be complex and must not be informed to anyone.\u003C/p>\n\n\u003Cp>Also read:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/brand-marketing-vs-performance-marketing\">Brand Marketing vs Performance Marketing\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-recognize-a-legitimate-crypto-recovery-company\">How to Recognize a Legitimate Crypto Recovery Company\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/quasa-pitch-session-for-michelin-accelerator\">QUASA pitch session for Michelin Accelerator\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>\u003Cstrong>Conclusion\u003C/strong>\u003C/h3>\n\n\u003Cp>Nothing is more vital today than remaining secure online. While technology is constantly improving and becoming more secure, fraudsters will always be one step ahead. So you must take all the aforementioned precautionary measures to keep your identity safe.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","what-are-some-ways-to-protect-identities-on-the-internet","2023-08-15T12:07:27.000000Z","2023-08-15T06:30:00.000000Z","15.08.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/elvP2N3TdL6CuaCx3QngIEfz7nk20cveLpEZF0ZB.jpg","https://cdn.quasa.io/images/news/elvP2N3TdL6CuaCx3QngIEfz7nk20cveLpEZF0ZB.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/elvP2N3TdL6CuaCx3QngIEfz7nk20cveLpEZF0ZB.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/elvP2N3TdL6CuaCx3QngIEfz7nk20cveLpEZF0ZB.webp","large",null,1827,1,"en",0,{"id":50,"title":51,"slug":52,"meta_title":92,"meta_description":93,"meta_keywords":94,"deleted_at":86,"created_at":95,"updated_at":96,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[98,113,125,138,151],{"title":99,"description":100,"slug":101,"created_at":102,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z","19.04.2026",{"title":58,"slug":63},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","small",7,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":117,"formatted_created_at":103,"category":118,"links":119,"view_type":110,"video_url":86,"views":124,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",9,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",30,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",41,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":155,"formatted_created_at":103,"category":156,"links":157,"view_type":110,"video_url":86,"views":162,"likes":90,"lang":89,"comments_count":90,"is_pinned":112},"Google March 2026 Core Update: Massive Volatility, Traffic Winners & Losers Explained","The latest major Google algorithm change — the March 2026 Core Update — began rolling out on March 27, 2026, and was fully completed on April 8, 2026.","google-march-2026-core-update-massive-volatility-traffic-winners-losers-explained","2026-04-19T07:51:48.000000Z",{"title":58,"slug":63},{"image":158,"image_webp":159,"thumb":160,"thumb_webp":161},"https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp",49,[164,177,192,204,218],{"title":165,"description":166,"slug":167,"created_at":168,"publish_at":169,"formatted_created_at":170,"category":171,"links":172,"view_type":110,"video_url":86,"views":175,"likes":176,"lang":89,"comments_count":90,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":173,"image_webp":86,"thumb":174,"thumb_webp":174},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70806,2,{"title":178,"description":179,"slug":180,"created_at":181,"publish_at":182,"formatted_created_at":183,"category":184,"links":185,"view_type":85,"video_url":86,"views":190,"likes":191,"lang":89,"comments_count":90,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":186,"image_webp":187,"thumb":188,"thumb_webp":189},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70570,4,{"title":193,"description":194,"slug":195,"created_at":196,"publish_at":197,"formatted_created_at":198,"category":199,"links":200,"view_type":110,"video_url":86,"views":203,"likes":191,"lang":89,"comments_count":90,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":201,"image_webp":86,"thumb":202,"thumb_webp":202},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68204,{"title":205,"description":206,"slug":207,"created_at":208,"publish_at":209,"formatted_created_at":210,"category":211,"links":212,"view_type":110,"video_url":86,"views":217,"likes":176,"lang":89,"comments_count":88,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":213,"image_webp":214,"thumb":215,"thumb_webp":216},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42183,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":85,"video_url":86,"views":231,"likes":176,"lang":89,"comments_count":90,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41280,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]