{"id":1496,"date":"2023-12-18T05:44:47","date_gmt":"2023-12-18T05:44:47","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1496"},"modified":"2023-12-18T05:47:04","modified_gmt":"2023-12-18T05:47:04","slug":"veterinary-cyber-security-protecting-your-practice-in-the-digital-era","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/veterinary-cyber-security-protecting-your-practice-in-the-digital-era\/","title":{"rendered":"\u7378\u91ab\u7db2\u8def\u5b89\u5168\uff1a\u5728\u6578\u4f4d\u6642\u4ee3\u4fdd\u8b77\u60a8\u7684\u5be6\u8e10"},"content":{"rendered":"<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"\u7378\u91ab\u7db2\u8def\u5b89\u5168 101\uff1a\u78ba\u4fdd\u60a8\u7684\u57f7\u696d\u5b89\u5168\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/joGzD4yrf-c?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">\u7db2\u8def\u5b89\u5168\u5728\u7378\u91ab\u5be6\u8e10\u4e2d\u7684\u91cd\u8981\u6027<\/h2>\n\n\n\n<p>\u5728\u7576\u4eca\u4e92\u806f\u7684\u4e16\u754c\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u5728\u4fdd\u8b77\u96fb\u5b50\u8a2d\u5099\u548c\u7db2\u8def\u514d\u53d7\u60e1\u610f\u653b\u64ca\u65b9\u9762\u767c\u63ee\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\u3002\u5c0d\u65bc\u7378\u91ab\u5be6\u52d9\u4f86\u8aaa\uff0c\u5f37\u800c\u6709\u529b\u7684\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u7684\u9700\u6c42\u66f4\u70ba\u91cd\u8981\u3002\u70ba\u4ec0\u9ebc\uff1f\u56e0\u70ba\u5b83\u6d89\u53ca\u654f\u611f\u60a3\u8005\u8cc7\u6599\u7684\u5b89\u5168\u3001\u5be6\u8e10\u8ca1\u52d9\u7b49\u7b49\u3002\u60f3\u50cf\u4e00\u4e0b\uff0c\u4e00\u5bb6\u7378\u91ab\u8a3a\u6240\u906d\u53d7\u4e86\u6bc0\u6ec5\u6027\u7684\u52d2\u7d22\u8edf\u9ad4\u653b\u64ca\uff0c\u6574\u500b\u96fb\u8166\u7cfb\u7d71\u7a81\u7136\u505c\u6b62\u904b\u884c\uff0c\u5bf6\u8cb4\u7684\u6578\u64da\u88ab\u52ab\u6301\u3002\u4ed6\u5011\u88ab\u8feb\u652f\u4ed8\u5de8\u984d\u8cbb\u7528\u624d\u80fd\u91cd\u65b0\u7372\u5f97\u8a2a\u554f\u6b0a\u9650\u3002\u53e6\u4e00\u7a2e\u505a\u6cd5\u53ef\u80fd\u662f\u72e1\u733e\u7684\u99ed\u5ba2\u900f\u904e\u6b3a\u9a19\u6027\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7aca\u53d6\u654f\u611f\u7684\u75c5\u60a3\u8cc7\u8a0a\u3002\u4e0d\u5e78\u7684\u662f\uff0c\u8a31\u591a\u7378\u91ab\u8a3a\u6240\u90fd\u9762\u81e8\u8cc7\u6599\u6d29\u9732\uff0c\u8072\u8b7d\u53d7\u640d\u4e26\u640d\u5931\u6158\u91cd\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u6211\u5011\u7684\u7378\u91ab\u7db2\u8def\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u7684\u512a\u52e2<\/h2>\n\n\n\n<p>\u5728\u6211\u5011\u5c16\u7aef\u7684\u7db2\u8def\u5b89\u5168\u670d\u52d9\u4e2d\uff0c\u6211\u5011\u4e86\u89e3\u7378\u91ab\u5be6\u8e10\u9762\u81e8\u7684\u98a8\u96aa\uff0c\u4e26\u81f4\u529b\u65bc\u5fb9\u5e95\u6539\u8b8a\u60a8\u4fdd\u8b77\u60a3\u8005\u548c\u5be6\u8e10\u7684\u65b9\u5f0f\u3002\u6211\u5011\u7684\u89e3\u6c7a\u65b9\u6848\u65e8\u5728\u78ba\u4fdd\u60a8\u7684\u5be6\u8e10\u514d\u53d7\u6240\u6709\u7db2\u8def\u5b89\u5168\u5a01\u8105\uff0c\u5f9e\u5077\u5077\u6478\u6478\u7684\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u5230\u5371\u96aa\u7684\u60e1\u610f\u8edf\u9ad4\u548c\u52d2\u7d22\u8edf\u9ad4\u3002\u4ee5\u4e0b\u662f\u6211\u5011\u7684\u89e3\u6c7a\u65b9\u6848\u5e36\u4f86\u7684\u4e00\u4e9b\u95dc\u9375\u529f\u80fd\uff1a<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u5bc6\u78bc\u5b89\u5168<\/h3>\n\n\n\n<p>\u6211\u5011\u5e6b\u52a9\u60a8\u5275\u5efa\u548c\u7ba1\u7406\u5f37\u5927\u3001\u7368\u7279\u7684\u5bc6\u78bc\uff0c\u8b93\u90a3\u4e9b\u8a0e\u53ad\u7684\u99ed\u5ba2\u9060\u96e2\u60a8\u3002\u5bc6\u78bc\u5b89\u5168\u5c0d\u65bc\u9632\u6b62\u672a\u7d93\u6388\u6b0a\u5b58\u53d6\u60a8\u7684\u7cfb\u7d71\u548c\u654f\u611f\u8cc7\u6599\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u8edf\u9ad4\u66f4\u65b0\u548c\u88dc\u4e01<\/h3>\n\n\n\n<p>\u4fdd\u6301\u8edf\u9ad4\u6700\u65b0\u5c0d\u65bc\u907f\u514d\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u559c\u6b61\u5229\u7528\u7684\u6f0f\u6d1e\u81f3\u95dc\u91cd\u8981\u3002\u501f\u52a9\u6211\u5011\u7684\u89e3\u6c7a\u65b9\u6848\uff0c\u60a8\u5c07\u59cb\u7d42\u64c1\u6709\u6700\u65b0\u7684\u4fee\u88dc\u7a0b\u5f0f\u548c\u66f4\u65b0\uff0c\u5f9e\u800c\u6700\u5927\u9650\u5ea6\u5730\u964d\u4f4e\u5b89\u5168\u6f0f\u6d1e\u7684\u98a8\u96aa\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u8cc7\u6599\u5099\u4efd\u8207\u5fa9\u539f<\/h3>\n\n\n\n<p>\u8cc7\u6599\u907a\u5931\u5c0d\u65bc\u7378\u91ab\u5be6\u8e10\u4f86\u8aaa\u53ef\u80fd\u662f\u707d\u96e3\u6027\u7684\u3002\u6211\u5011\u6307\u5c0e\u60a8\u5be6\u65bd\u5b9a\u671f\u8cc7\u6599\u5099\u4efd\uff0c\u78ba\u4fdd\u60a8\u7684\u5bf6\u8cb4\u8cc7\u8a0a\u6c38\u9060\u4e0d\u6703\u907a\u5931\u3002\u5982\u679c\u4e0d\u5e78\u767c\u751f\u8cc7\u6599\u5916\u6d29\u6216\u7db2\u8def\u653b\u64ca\uff0c\u6211\u5011\u5c07\u70ba\u60a8\u63d0\u4f9b\u53ef\u9760\u7684\u5fa9\u539f\u89e3\u6c7a\u65b9\u6848\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u96fb\u5b50\u90f5\u4ef6\u548c\u7db2\u8def\u5b89\u5168<\/h3>\n\n\n\n<p>\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u548c\u4e0d\u5b89\u5168\u7684\u700f\u89bd\u7fd2\u6163\u53ef\u80fd\u6703\u4f7f\u60a8\u7684\u5be6\u8e10\u9762\u81e8\u7db2\u8def\u5a01\u8105\u3002\u6211\u5011\u70ba\u60a8\u63d0\u4f9b\u8b58\u5225\u548c\u907f\u514d\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7684\u77e5\u8b58\uff0c\u4e26\u6307\u5c0e\u60a8\u990a\u6210\u5b89\u5168\u7684\u700f\u89bd\u7fd2\u6163\uff0c\u4ee5\u78ba\u4fdd\u60a8\u7684\u7dda\u4e0a\u6d3b\u52d5\u5b89\u5168\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u96b1\u79c1\u5408\u898f\u548c\u4fdd\u5bc6<\/h3>\n\n\n\n<p>\u4f5c\u70ba\u4e00\u540d\u7378\u91ab\uff0c\u60a8\u6709\u6cd5\u5f8b\u548c\u9053\u5fb7\u7fa9\u52d9\u4f86\u4fdd\u8b77\u60a8\u7684\u5ba2\u6236\u548c\u60a3\u8005\u7684\u8cc7\u6599\u3002\u6211\u5011\u7684\u89e3\u6c7a\u65b9\u6848\u4e0d\u50c5\u53ef\u4ee5\u5e6b\u52a9\u60a8\u9075\u5b88\u96b1\u79c1\u6cd5\u898f\uff0c\u9084\u53ef\u4ee5\u78ba\u4fdd\u60a8\u7684\u79c1\u4eba\u8cc7\u6599\u4fdd\u5bc6\u3002\u6211\u5011\u512a\u5148\u8003\u616e\u52a0\u5bc6\u548c\u5b89\u5168\u7684\u901a\u8a0a\u7ba1\u9053\uff0c\u56e0\u6b64\u60a8\u53ef\u4ee5\u653e\u5fc3\uff0c\u60a8\u7684\u8cc7\u6599\u59cb\u7d42\u4e0d\u6703\u88ab\u7aba\u63a2\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u54e1\u5de5\u610f\u8b58\u548c\u57f9\u8a13<\/h3>\n\n\n\n<p>\u5373\u4f7f\u63a1\u53d6\u4e86\u6700\u4f73\u7684\u7db2\u8def\u5b89\u5168\u5be6\u8e10\uff0c\u4eba\u70ba\u932f\u8aa4\u4ecd\u7136\u53ef\u80fd\u9020\u6210\u6f0f\u6d1e\u3002\u9019\u5c31\u662f\u70ba\u4ec0\u9ebc\u6211\u5011\u975e\u5e38\u91cd\u8996\u54e1\u5de5\u610f\u8b58\u548c\u57f9\u8a13\u3002\u6211\u5011\u63d0\u4f9b\u5168\u9762\u7684\u57f9\u8a13\u8a08\u5283\u548c\u5b9a\u671f\u66f4\u65b0\uff0c\u70ba\u60a8\u7684\u54e1\u5de5\u63d0\u4f9b\u78ba\u4fdd\u60a8\u7684\u8a3a\u6240\u548c\u75c5\u4eba\u5b89\u5168\u6240\u9700\u7684\u77e5\u8b58\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u6301\u7e8c\u652f\u63f4\u548c\u9644\u52a0\u5de5\u5177<\/h3>\n\n\n\n<p>\u6211\u5011\u4e0d\u50c5\u50c5\u662f\u70ba\u60a8\u63d0\u4f9b\u670d\u52d9\uff1b\u66f4\u662f\u70ba\u60a8\u63d0\u4f9b\u670d\u52d9\u3002\u6211\u5011\u662f\u60a8\u7684\u5408\u4f5c\u5925\u4f34\uff0c\u4fdd\u8b77\u60a8\u7684\u5be6\u8e10\u3002\u4f9d\u9760\u6211\u5011\u7684\u6301\u7e8c\u652f\u6301\uff0c\u6211\u5011\u751a\u81f3\u6703\u63a8\u85a6\u5176\u4ed6\u5de5\u5177\u548c\u8edf\u9ad4\u4f86\u589e\u5f37\u60a8\u7684\u5be6\u8e10\u5b89\u5168\u6027\u3002\u6211\u5011\u64c1\u6709\u8c50\u5bcc\u7684\u7db2\u8def\u5b89\u5168\u8cc7\u6e90\uff0c\u4e26\u8207\u5c08\u9580\u4fdd\u8b77\u50cf\u60a8\u9019\u6a23\u7684\u7378\u91ab\u5be6\u8e10\u7684\u7d44\u7e54\u5efa\u7acb\u4e86\u5408\u4f5c\u5925\u4f34\u95dc\u4fc2\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u6295\u8cc7\u60a8\u7684\u5be6\u8e10\u7684\u5b89\u5168\u548c\u798f\u7949<\/h2>\n\n\n\n<p>\u70ba\u60a8\u7684\u7378\u91ab\u8a3a\u6240\u6295\u8cc7\u7db2\u8def\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u662f\u5c0d\u60a3\u8005\u3001\u54e1\u5de5\u548c\u8ca1\u52d9\u7684\u5b89\u5168\u548c\u798f\u7949\u7684\u6295\u8cc7\u3002\u4e0d\u8981\u7b49\u5230\u7db2\u8def\u653b\u64ca\u4f86\u8972\u624d\u63a1\u53d6\u884c\u52d5\u3002\u7acb\u5373\u63a1\u53d6\u884c\u52d5\uff0c\u5229\u7528\u6211\u5011\u91cd\u8981\u7684\u7db2\u8def\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u4fdd\u8b77\u60a8\u7684\u5be6\u8e10\u3002\u6211\u5011\u5c07\u5171\u540c\u5275\u9020\u4e00\u500b\u5b89\u5168\u7684\u74b0\u5883\uff0c\u8b93\u60a8\u53ef\u4ee5\u5c08\u6ce8\u65bc\u81ea\u5df1\u6700\u64c5\u9577\u7684\u4e8b\u60c5 - \u70ba\u60a8\u7684\u6bdb\u8338\u8338\u7684\u670b\u53cb\u63d0\u4f9b\u975e\u51e1\u7684\u7167\u9867\u3002<\/p>","protected":false},"excerpt":{"rendered":"<p>\u7db2\u8def\u5b89\u5168\u5728\u7378\u91ab\u5be6\u8e10\u4e2d\u7684\u91cd\u8981\u6027\u5728\u7576\u4eca\u4e92\u806f\u7684\u4e16\u754c\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u5728\u4fdd\u8b77\u96fb\u5b50\u8a2d\u5099\u548c\u7db2\u8def\u514d\u53d7\u60e1\u610f\u653b\u64ca\u65b9\u9762\u767c\u63ee\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\u3002\u5c0d\u65bc\u7378\u91ab\u5be6\u52d9\u4f86\u8aaa\uff0c\u5f37\u800c\u6709\u529b\u7684\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u7684\u9700\u6c42\u66f4\u70ba\u91cd\u8981\u3002\u70ba\u4ec0\u9ebc\uff1f\u56e0\u70ba\u5b83\u6d89\u53ca\u654f\u611f\u60a3\u8005\u8cc7\u6599\u7684\u5b89\u5168\u3001\u5be6\u8e10\u8ca1\u52d9\u7b49\u7b49[...]<\/p>","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1502,"url":"https:\/\/first-unity.com.hk\/zh\/mastering-the-art-of-seo-a-guide-for-veterinary-practices\/","url_meta":{"origin":1496,"position":0},"title":"Mastering the Art of SEO: A Guide for Veterinary Practices","author":"Thomas","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/t3JBwz9AofQ?si=sO0nGu9Tu_lgeMas Introduction In this captivating journey into the world of SEO, we will explore how mastering the art of search engine optimization can guide pet owners straight to your Veterinary excellence. Imagine a pet owner frantically searching for the best veterinary care for their furry friend. With the power of\u2026","rel":"","context":"\u5728\u300cSEO\u300d\u4e2d","block_context":{"text":"SEO","link":"https:\/\/first-unity.com.hk\/zh\/category\/seo\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/t3JBwz9AofQ\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1496,"position":1},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1500,"url":"https:\/\/first-unity.com.hk\/zh\/the-zero-trust-model-revolutionizing-cyber-security\/","url_meta":{"origin":1496,"position":2},"title":"The Zero Trust Model: Revolutionizing Cyber Security","author":"Lewis Lok","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/ZdjfDFbpzRs?si=BzuRI6Nv52DNW0mr Introduction In today's digital world, where cyber threats are constantly evolving, organizations need to adopt robust security measures to protect their sensitive data and networks. One such approach gaining significant attention is the Zero Trust Model. In this blog, we will delve deep into the concept of Zero Trust,\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ZdjfDFbpzRs\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1789,"url":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","url_meta":{"origin":1496,"position":3},"title":"Cybercriminals Exploit Remote Desktop Protocols in Cyber Attacks &#8211; A Disturbing Report","author":"Rhona Goskirk","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In the digital age, cybercriminals are constantly finding new ways to compromise the security of individuals and organizations. A recent report from a global cybersecurity company, Sophos, sheds light on a concerning trend - the exploitation of remote desktop protocols (RDP) in cyber attacks. This blog explores the key\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1797,"url":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","url_meta":{"origin":1496,"position":4},"title":"Cyberattack on AnyDesk: Ensuring Secure Access through Immediate Updates","author":"Dr. Ken","date":"6 6 \u6708, 2024","format":false,"excerpt":"Introduction: In our increasingly connected world, cybersecurity threats continue to pose significant risks to individuals and organizations alike. Recently, AnyDesk, a prominent provider of remote desktop software, experienced a cyberattack that has raised concerns among its user base. This blog aims to shed light on the incident, outline the measures\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1686,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication\/","url_meta":{"origin":1496,"position":5},"title":"Microsoft Legacy Account Hacked by Russian APT: The Importance of Multi-Factor Authentication","author":"Rhona Goskirk","date":"14 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent cyber attack, Microsoft's legacy test tenant account fell victim to a sophisticated hacking operation conducted by a Russian Advanced Persistent Threat (APT) group. The breach, attributed to the notorious Russian nation-state actor known as Midnight Blizzard or APT29, revealed a critical security oversight: the compromised account\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-14-230007.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1496"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1496"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1496\/revisions"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}