[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-what-to-know-about-nist-compliance":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":160,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"What to Know About NIST Compliance","Below is an explanation of NIST compliance and its implications.","NIST Compliance, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>The NIST Cybersecurity Framework is a collection of guidelines for reducing cybersecurity risks, which is published by the U.S. National Institute of Standards and Technology.\u003C/p>\n\n\u003Cp>For businesses that have to be compliant, the best way to do so is the use of a&nbsp;proven technology stack of hardware and software tools. Before an organization can get to that point, though, they need to understand the Framework, why it&rsquo;s used, and how to generally be compliant.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-2.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"300\" src=\"https://cdn.quasa.io/photos/foto-15/997-2.png\" width=\"300\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>Below is an explanation of NIST compliance and its implications.\u003C/p>\n\n\u003Ch4>The Basics\u003C/h4>\n\n\u003Cp>NIST compliance broadly refers to complying with one, or more than one, of the NIST publications. NIST is the National Institute of Standards and Technology, a division of the Department of Commerce. The goal of the NIST is to set technology-related standards and, in particular, controls for cybersecurity.\u003C/p>\n\n\u003Cp>The standards are meant as a way to&nbsp;ensure uniform cybersecurity protocols&nbsp;and efforts across all government agencies and also businesses that work with the federal government.\u003C/p>\n\n\u003Cp>What&rsquo;s meant by compliance differs based on the particular NIST publication.\u003C/p>\n\n\u003Cp>Any company that works with the federal supply chain must be NIST compliant. This includes prime contractors, subcontractors, and subcontractors who are working for another subcontractor.\u003C/p>\n\n\u003Cp>Some companies opt to comply with the standards even when they&rsquo;re outside&nbsp;the federal supply chain&nbsp;because it puts in place best practices for protecting their business data.\u003C/p>\n\n\u003Cp>When an organization is NIST compliant, they have a framework to protect data and information, keeping it secure and safe while also protecting critical infrastructure from internal and external threats. The guidelines apply to all data from businesses that provide services to the federal government.\u003C/p>\n\n\u003Cp>If an organization works with&nbsp;the federal government&nbsp;and they&rsquo;re not compliant, it could lose its ability to do business with these agencies.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-3.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"213\" src=\"https://cdn.quasa.io/photos/foto-15/997-3.jpeg\" width=\"300\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>When compliant with NIST, an organization is also better able to be compliant with other regulations in their industry or governmental regulations.\u003C/p>\n\n\u003Cp>Also read:&nbsp;\u003Ca href=\"https://quasa.io/media/how-to-start-an-e-commerce-business-from-scratch-in-2022\">How to Start An E-commerce Business From Scratch\u003C/a>\u003C/p>\n\n\u003Ch4>Small Business NIST Compliance\u003C/h4>\n\n\u003Cp>Although it&rsquo;s often associated exclusively with federal agencies and manufacturers, small and medium-sized businesses also benefit from NIST compliance.\u003C/p>\n\n\u003Cp>According to the NIST&nbsp;\u003Ca href=\"https://quasa.io/media/4-ideas-for-small-business-owners-can-improve-on-their-cybersecurity\">Small Business Cybersecurity\u003C/a>&nbsp;Act, the NIST is required to publish resources that can help small businesses voluntarily identify, assess and manage their cybersecurity risks.\u003C/p>\n\n\u003Cp>The resources have to be technology-neutral and as much as possible based on international standards. They also have to be able to vary depending on the size and industry of the small business and how sensitive collected data is. They should be consistent with national cybersecurity programs under the Cybersecurity Enhancement Act of 2014.\u003C/p>\n\n\u003Cp>Due to this Act, NIST created the Small Business Cybersecurity Corner with resources, including a guide to the fundamentals based on&nbsp;the Cybersecurity Framework.\u003C/p>\n\n\u003Ch4>What is the NIST Cybersecurity Framework?\u003C/h4>\n\n\u003Cp>The NIST Cybersecurity Framework or CSF is a risk management framework that&rsquo;s the most widely adopted of the NIST publications. The Framework was initially made for U.S.&nbsp;critical infrastructure sectors, but now organizations often rely on it to reduce cybersecurity risks broadly.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-4.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"194\" src=\"https://cdn.quasa.io/photos/foto-15/997-4.jpeg\" width=\"259\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>The CSF doesn&rsquo;t recommend standards or concepts, nor does it recommend technologies. Rather, it collects the best practices related to cybersecurity from standards bodies, including not only the NIST but also the International Standards Organization (ISO).\u003C/p>\n\n\u003Cp>Five key areas are used to evaluate cybersecurity controls according to the Framework.\u003C/p>\n\n\u003Cp>These are identified, protect, detect, respond to, and recover.\u003C/p>\n\n\u003Cp>These areas are meant to be inclusive of&nbsp;the entire lifecycle of cybersecurity risk. Every area has categories that associate with particular activities and needs, and the categories are broken into subcategories as well as standards, guidelines, and the practices needed to achieve category-specific outcomes.\u003C/p>\n\n\u003Cp>Gartner reports as many as 50% of American companies and organizations use the NIST cybersecurity framework, and it&rsquo;s also growing in popularity outside the U.S.\u003C/p>\n\n\u003Cp>More details about&nbsp;the Framework are detailed&nbsp;below.\u003C/p>\n\n\u003Ch4>Identify\u003C/h4>\n\n\u003Cp>The goal of this function is to help organizations develop an understanding that allows them to appropriately assess their risks to assets, data, capabilities, and systems.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-5.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-right\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-15/997-5.jpeg\" width=\"300\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>\u003Cstrong>This includes:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Asset management encompasses&nbsp;everything that allows an organization to achieve its business purposes.\u003C/li>\n\t\u003Cli>Business environment including stakeholders and activities. This is the information that an organization uses to inform its cybersecurity roles and responsibilities as well as decisions related to risk management.\u003C/li>\n\t\u003Cli>Governance includes the processes and procedures that are used for the management and monitoring of the regulatory, legal, and operational environments.\u003C/li>\n\t\u003Cli>Risk assessment ensures an organization understands the risk that it faces in terms of organizational operations and assets as well as individuals.\u003C/li>\n\t\u003Cli>Risk management strategies encompass priorities, assumptions, and constraints that are used in support of risk-related decisions.\u003C/li>\n\t\u003Cli>Supply chain risk management&nbsp;includes all the decision-making associated with the management of risk related to the supply chain.\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Protect\u003C/h4>\n\n\u003Cp>The Framework includes&nbsp;the development and implementation&nbsp;of particular safeguards to make sure that there&rsquo;s a delivery of critical services.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-6.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-right\" height=\"192\" src=\"https://cdn.quasa.io/photos/foto-15/997-6.jpeg\" width=\"262\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>\u003Cstrong>This includes:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Access control, making sure access to assets is available only to authorized devices, processes, and users.\u003C/li>\n\t\u003Cli>Awareness and training are how not only employees and staff are trained, but also partners. Everyone involved needs cybersecurity awareness training, and they need to receive specific training that allows them to carry out their duties and responsibilities that comply with cybersecurity policies.\u003C/li>\n\t\u003Cli>Data security includes how information and data are maintained.\u003C/li>\n\t\u003Cli>Information protection processes and procedures&nbsp;include how security policies, processes, and procedures are maintained.\u003C/li>\n\t\u003Cli>Maintenance is what&rsquo;s required to make sure that everything is performed consistently.\u003C/li>\n\t\u003Cli>Protective technology is the solution that is used to make sure there&rsquo;s compliance.\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Detect\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-15/997-7.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-15/997-7.jpeg\" width=\"275\" / alt=\"What to Know About NIST Compliance\" loading=\"lazy\">\u003C/picture>According to the NIST Framework, organizations need to&nbsp;develop and accordingly implement&nbsp;activities to identify a potential cybersecurity event. This can include detecting anomalous activity in a timely manner and security continuous monitoring.\u003C/p>\n\n\u003Cp>Finally,&nbsp;other elements of the Framework&nbsp;are Response, meaning the development and implementation of the needed activities to take action following the detection of an event and Recover.\u003C/p>\n\n\u003Cp>Recover is the development and implementation of activities to stay resilient and restore capabilities and continuity after a cybersecurity event.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","what-to-know-about-nist-compliance","2022-06-08T07:50:23.000000Z","2022-06-08T06:30:00.000000Z","08.06.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/UqEVj91iv8GIsSNRJhr6aeeiCaCBI6lEJcosMAhw.jpg","https://cdn.quasa.io/images/news/UqEVj91iv8GIsSNRJhr6aeeiCaCBI6lEJcosMAhw.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/UqEVj91iv8GIsSNRJhr6aeeiCaCBI6lEJcosMAhw.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/UqEVj91iv8GIsSNRJhr6aeeiCaCBI6lEJcosMAhw.webp","large",null,1510,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,111,122,135,148],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":69,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z","19.04.2026",{"title":58,"slug":63},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":109,"video_url":86,"views":62,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":127,"formatted_created_at":102,"category":128,"links":129,"view_type":109,"video_url":86,"views":134,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":130,"image_webp":131,"thumb":132,"thumb_webp":133},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",39,{"title":136,"description":137,"slug":138,"created_at":139,"publish_at":140,"formatted_created_at":102,"category":141,"links":142,"view_type":109,"video_url":86,"views":147,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":143,"image_webp":144,"thumb":145,"thumb_webp":146},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",50,{"title":149,"description":150,"slug":151,"created_at":152,"publish_at":152,"formatted_created_at":102,"category":153,"links":154,"view_type":109,"video_url":86,"views":159,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Google March 2026 Core Update: Massive Volatility, Traffic Winners & Losers Explained","The latest major Google algorithm change — the March 2026 Core Update — began rolling out on March 27, 2026, and was fully completed on April 8, 2026.","google-march-2026-core-update-massive-volatility-traffic-winners-losers-explained","2026-04-19T07:51:48.000000Z",{"title":58,"slug":63},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/H2tMWtqU3QHdp9bM8v1t8lyHVpsyXCjwnoSRDqau.webp",58,[161,174,189,201,216],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":109,"video_url":86,"views":172,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":86,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70815,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":85,"video_url":86,"views":187,"likes":188,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70579,4,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":109,"video_url":86,"views":200,"likes":188,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":86,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68213,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":109,"video_url":86,"views":214,"likes":173,"lang":89,"comments_count":215,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42191,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":85,"video_url":86,"views":229,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41287,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]