[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-what-s-the-difference-between-cyber-security-and-information-security":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":161,"categories":231},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"What’s the Difference between Cyber Security and Information Security?","In today’s highly volatile business environment, it is extremely important to safeguard your data as well as IT infrastructure from any kind of unauthorized usage as well as access.","Difference between Cyber Security and Information Security, protection","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-11.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/afj-11.jpeg\" width=\"300\" />\u003C/picture>In today&rsquo;s highly volatile business environment, it is extremely important to safeguard your data as well as&nbsp;IT infrastructure&nbsp;from any kind of unauthorized usage as well as access.\u003C/p>\n\n\u003Cp>If you fail to resort to the right measures for safeguarding your data or system, you can fall prey to cybercriminals and this can jeopardize your entire business set-up.\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">Cyber attacks\u003C/a>&nbsp;are quite common these days. People launch attacks to steal vital information, misuse or alter it. This is one of the biggest reasons why cybersecurity is the prime concern of every business concern.\u003C/p>\n\n\u003Cp>The terms Information Security and&nbsp;Cyber Security&nbsp;are generally used interchangeably. &nbsp;This is because their essence is the same. Both these terms relate to maintaining the confidentiality and integrity of information.\u003C/p>\n\n\u003Ch4>\u003Cstrong>What Is Information Security?\u003C/strong>\u003C/h4>\n\n\u003Cp>Information is the base of any organization regardless of its size.&nbsp; So, whether it is a huge multinational organization or a small business concern, it really does not matter.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-9.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"190\" src=\"https://cdn.quasa.io/photos/foto-14/afj-9.jpeg\" width=\"300\" />\u003C/picture>Information can be in the form of business records, intellectual property, or personal data. Most of the people access information via their laptops, phones, desktops, and host of other devices.\u003C/p>\n\n\u003Cp>The crux is the information needs to be kept safe at all times and the process of keeping the information safe is referred to as Information security\u003C/p>\n\n\u003Cp>Information Security is all about protecting your information from any kind of malicious usage and threats. This is done to avoid any kind of data modification, removal and misuse. There are two categories of information security.\u003C/p>\n\n\u003Cul>\n\t\u003Cli>One is the physical protection of the environment where information is stored. This is done by making sure that the premises are safe.\u003C/li>\n\t\u003Cli>The second category of securing the information is making sure that nobody is able to access it electronically. This is what cybersecurity is all about.\u003C/li>\n\u003C/ul>\n\n\u003Ch4>\u003Cstrong>Understanding Cyber Security\u003C/strong>\u003C/h4>\n\n\u003Cp>Cybersecurity is safeguarding data, which is available on the internet and the devices, which are connected from any kind of cyber attack.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aaaaass-15.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"158\" src=\"https://cdn.quasa.io/photos/foto-14/aaaaass-15.jpeg\" width=\"300\" />\u003C/picture>Information security pertains to all kinds of information regardless of where the information is present. On the other hand, cybersecurity pertains to protecting and safeguarding the information that just belongs to the world of the internet.\u003C/p>\n\n\u003Cp>Below we will point out some key differences between cybersecurity and information security.\u003C/p>\n\n\u003Cp>\u003Cstrong>Definition\u003C/strong>\u003C/p>\n\n\u003Cp>Cybersecurity is the practice of protecting the data and its allied technologies. It also includes the protection of storage sources of data from any threats.\u003C/p>\n\n\u003Cp>Information security is a wider term. It means protecting all sorts of information from unauthorized access as this could lead to uncalled for data modification and even removal.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-5.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/afj-5.jpeg\" width=\"300\" />\u003C/picture>The integrity of data also falls under the ambit of information security.\u003C/p>\n\n\u003Cp>Cybersecurity is only concerned about the cyber realm. Information security on the other hand not only encompasses cyber realm but also goes beyond it.\u003C/p>\n\n\u003Cp>\u003Cstrong>Domain\u003C/strong>\u003C/p>\n\n\u003Cp>Cybersecurity is all about protecting anything and everything in the cyber realm. This encompasses data, information, technology and even devices which fall under the scope of the internet.\u003C/p>\n\n\u003Cp>Information security deals with protecting all types of information, &mdash; analogue and digital without any consideration of the realm.\u003C/p>\n\n\u003Cp>So, the social media profiles, personal information across different online platforms all come under the scope of cybersecurity. Information security deals particularly with information assets, their availability, and maintenance of their integrity.\u003C/p>\n\n\u003Cp>\u003Cstrong>Process\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-6.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"157\" src=\"https://cdn.quasa.io/photos/foto-14/afj-6.jpg\" width=\"300\" />\u003C/picture>While cybersecurity mainly deals with safeguarding the use of cyberspace and averting any cyber-attacks, information security just protects any kind of information from any type of threat. Now, this could be even a threatening scenario.\u003C/p>\n\n\u003Cp>\u003Cstrong>Protection\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/the-top-cybersecurity-trends-in-2022\">Cybersecurity\u003C/a>&nbsp;only deals with dangers that are present in the cyberspace. Information security, on the contrary, deals with all categories of threats that can be directed towards information.\u003C/p>\n\n\u003Cp>Cybersecurity handles cybercrimes, cyber frauds, etc. Unauthorized access and information disruption irrespective of the domain are the two vital issues that fall under the scope of information security.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-13.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"130\" src=\"https://cdn.quasa.io/photos/foto-14/afj-13.jpeg\" width=\"300\" />\u003C/picture>Every organization should take steps to safeguard all its important records and information so that it cannot be accessed due to any vulnerability in the system or network.\u003C/p>\n\n\u003Cp>Many people try to implant malware to conduct cyberattacks or send malicious emails to enter into your system. If proper security measures are not installed they will enter your system without you even knowing and leave no evidence of any kind.\u003C/p>\n\n\u003Cp>So, in short, cybersecurity is just a part of information security. But, it is an extremely important part of information security.\u003C/p>\n\n\u003Ch3>\u003Cstrong>What Is The Need To Hire IT Security Services?\u003C/strong>\u003C/h3>\n\n\u003Cp>Security disasters can run havoc in any kind of business. From losing vital data to your competitors, to even complete wipeout, the outcomes can be seriously huge.\u003C/p>\n\n\u003Cp>Loss of important data, as well as confidential customer information, can adversely affect a company&rsquo;s reputation and standing.\u003C/p>\n\n\u003Cp>This irreparable damage can be avoided with superb IT infrastructure security services. These security services not only safeguard your assets but also lend complete peace of mind.\u003C/p>\n\n\u003Cp>Also read:&nbsp;\u003Ca href=\"https://quasa.io/media/tutorai-the-ultimate-ai-powered-tutor-that-simplifies-learning-and-personalizes-homework\">TutorAI: The Ultimate AI-Powered Tutor That Simplifies Learning and Personalizes Homework\u003C/a>\u003C/p>\n\n\u003Ch3>\u003Cstrong>Role of Security Professionals\u003C/strong>\u003C/h3>\n\n\u003Cp>Security professionals need to be one step ahead of those who are trying to use technology in the wrong way.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/agp-2.webp\" type=\"image/webp\">\u003Cimg alt=\"What’s the Difference between Cyber Security and Information Security?\" class=\"image-align-left\" height=\"300\" src=\"https://cdn.quasa.io/photos/foto-14/agp-2.jpeg\" width=\"300\" />\u003C/picture>They know how the security threats and information misuse happens, so they are aware of the way how these threats can be averted, minimized or avoided totally.\u003C/p>\n\n\u003Cp>Due to the fast development of technology,&nbsp;IT infrastructure security services&nbsp;have become extremely effective. The professionals are aware of all the latest techniques so they are able to tackle any unforeseen security threat without much problem.\u003C/p>\n\n\u003Cp>It is vital to get in touch with the best IT infrastructure security service providers so that business receives no harm of any kind with respect to the information and cybersecurity.\u003C/p>\n\n\u003Cp>Fostering cybersecurity&nbsp;is extremely vital. Browse the web for well-known and highly reliable service providers. Read their testimonials or get in touch with people who have already hired them.\u003C/p>\n\n\u003Cp>It is better to be careful than to be sorry later on. These superb security providers know all about evolving threats and come with a solution so that the business interest is never in danger.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","what-s-the-difference-between-cyber-security-and-information-security","2022-04-25T16:50:33.000000Z","2025-08-23T03:30:00.000000Z","23.08.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/6cgRX6N0BLuAc5WwjAJWFnJkMJAj03rrm0CHRUmA.jpg","https://cdn.quasa.io/images/news/6cgRX6N0BLuAc5WwjAJWFnJkMJAj03rrm0CHRUmA.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/6cgRX6N0BLuAc5WwjAJWFnJkMJAj03rrm0CHRUmA.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/6cgRX6N0BLuAc5WwjAJWFnJkMJAj03rrm0CHRUmA.webp","large",null,2801,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,112,123,136,149],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z","19.04.2026",{"title":58,"slug":63},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","small",15,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":86,"views":69,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":124,"description":125,"slug":126,"created_at":127,"publish_at":128,"formatted_created_at":102,"category":129,"links":130,"view_type":109,"video_url":86,"views":135,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",37,{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":102,"category":142,"links":143,"view_type":109,"video_url":86,"views":148,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",48,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":153,"formatted_created_at":102,"category":154,"links":155,"view_type":109,"video_url":86,"views":160,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Google March 2026 Core Update: Massive Volatility, Traffic Winners & Losers Explained","The latest major Google algorithm change — the March 2026 Core Update — began rolling out on March 27, 2026, and was fully completed on April 8, 2026.","google-march-2026-core-update-massive-volatility-traffic-winners-losers-explained","2026-04-19T07:51:48.000000Z",{"title":58,"slug":63},{"image":156,"image_webp":157,"thumb":158,"thumb_webp":159},"https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp",57,[162,175,190,202,217],{"title":163,"description":164,"slug":165,"created_at":166,"publish_at":167,"formatted_created_at":168,"category":169,"links":170,"view_type":109,"video_url":86,"views":173,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":171,"image_webp":86,"thumb":172,"thumb_webp":172},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70813,2,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":85,"video_url":86,"views":188,"likes":189,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70577,4,{"title":191,"description":192,"slug":193,"created_at":194,"publish_at":195,"formatted_created_at":196,"category":197,"links":198,"view_type":109,"video_url":86,"views":201,"likes":189,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":199,"image_webp":86,"thumb":200,"thumb_webp":200},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68211,{"title":203,"description":204,"slug":205,"created_at":206,"publish_at":207,"formatted_created_at":208,"category":209,"links":210,"view_type":109,"video_url":86,"views":215,"likes":174,"lang":89,"comments_count":216,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":211,"image_webp":212,"thumb":213,"thumb_webp":214},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42189,1,{"title":218,"description":219,"slug":220,"created_at":221,"publish_at":222,"formatted_created_at":223,"category":224,"links":225,"view_type":85,"video_url":86,"views":230,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":226,"image_webp":227,"thumb":228,"thumb_webp":229},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41286,[232,233,234,235,236,237,238,239,240,241,242,243,244],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]