{"id":1686,"date":"2024-04-14T15:02:18","date_gmt":"2024-04-14T15:02:18","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1686"},"modified":"2024-04-14T15:02:22","modified_gmt":"2024-04-14T15:02:22","slug":"microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication\/","title":{"rendered":"\u5fae\u8edf\u820a\u5e33\u865f\u906d\u4fc4\u7f85\u65af APT \u653b\u64ca\uff1a\u591a\u91cd\u8eab\u5206\u7684\u91cd\u8981\u6027"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"517\" height=\"450\" src=\"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/image.png\" alt=\"\" class=\"wp-image-1687\" srcset=\"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/image.png 517w, https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/image-300x261.png 300w, https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/image-14x12.png 14w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/figure><\/div>\n\n\n<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u5728\u6700\u8fd1\u7684\u7db2\u8def\u653b\u64ca\u4e2d\uff0c\u5fae\u8edf\u6e2c\u8a66\u79df\u6236\u7684\u820a\u5e33\u6236\u6210\u70ba\u4fc4\u7f85\u65af APT\uff08\u9ad8\u7d1a\u6301\u7e8c\u6027\u5a01\u8105\uff09\u7d44\u7e54\u8907\u96dc\u99ed\u5ba2\u653b\u64ca\u884c\u52d5\u7684\u53d7\u5bb3\u8005\u3002 \u9019\u6b21\u6f0f\u6d1e\u7531\u81ed\u540d\u662d\u8457\u7684\u4fc4\u7f85\u65af\u570b\u5bb6\u7d44\u7e54\u5348\u591c\u66b4\u96ea\u6216 APT29 \u767c\u8d77\uff0c\u66b4\u9732\u4e86\u4e00\u500b\u56b4\u91cd\u7684\u5b89\u5168\u6f0f\u6d1e\uff1a\u53d7\u611f\u67d3\u7684\u5e33\u6236\u6c92\u6709\u555f\u7528\u591a\u91cd\u8eab\u4efd\u9a57\u8b49\uff08MFA\uff09\u3002 \u9019\u4e8b\u4ef6\u6709\u529b\u5730\u63d0\u9192\u6211\u5011\uff0cMFA \u5728\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u548c\u62b5\u79a6\u8907\u96dc\u7db2\u8def\u5a01\u8105\u65b9\u9762\u7684\u91cd\u8981\u6027\u3002<\/p>\n\n\n\n<p>\u662f\u6b21\u7db2\u7d61\u653b\u64ca\uff1a<\/p>\n\n\n\n<p>Midnight Blizzard \u662f\u4e00\u500b\u96b8\u5c6c\u65bc\u4fc4\u7f85\u65af\u570b\u5bb6\u7684\u5a01\u8105\u7d44\u7e54\uff0c\u5b83\u5728\u672a\u7d93\u6388\u6b0a\u7684\u60c5\u6cc1\u4e0b\u5b58\u53d6\u4e86\u5c11\u91cf\u5fae\u8edf\u4f01\u696d\u96fb\u5b50\u90f5\u4ef6\u5e33\u6236\uff0c\u5176\u4e2d\u5305\u62ec\u9ad8\u968e\u4e3b\u7ba1\u7684\u5e33\u6236\u3002 \u7b2c\u4e00\u6b21\u653b\u64ca\u767c\u751f\u5728 2023 \u5e74 11 \u6708\uff0c\u653b\u64ca\u8005\u5229\u7528\u52a0\u5bc6\u5783\u573e\u90f5\u4ef6\u6280\u8853\u5165\u4fb5\u4e86\u4e00\u500b\u820a\u7684\u6e2c\u8a66\u79df\u6236\u5e33\u6236\u3002 \u96a8\u8457\u6642\u9593\u7684\u63a8\u79fb\uff0c\u653b\u64ca\u8005\u7684\u6388\u6b0a\u4e0d\u65b7\u5347\u7d1a\uff0c\u5c0e\u81f4\u5fae\u8edf\u5728 2024 \u5e74 1 \u6708 12 \u65e5\u767c\u73fe\u4e86\u653b\u64ca\u3002<\/p>\n\n\n\n<p>\u591a\u56e0\u7d20\u8a8d\u8b49\u7684\u4f5c\u7528\uff1a<\/p>\n\n\n\n<p>\u5fae\u8edf\u63ed\u9732\u7684\u8cc7\u8a0a\u5f37\u8abf\uff0c\u88ab\u5165\u4fb5\u7684\u820a\u5e33\u6236\u7f3a\u4e4f\u591a\u91cd\u8eab\u4efd\u9a57\u8b49\uff08MFA\uff09\u4fdd\u8b77\uff0c\u5373\u8981\u6c42\u7528\u6236\u63d0\u4f9b\u591a\u7a2e\u5f62\u5f0f\u7684\u8eab\u4efd\u9a57\u8b49\uff0c\u5305\u62ec\u5bc6\u78bc\u548c\u767c\u9001\u5230\u884c\u52d5\u88dd\u7f6e\u7684\u552f\u4e00\u6642\u9593\u654f\u611f\u4ee3\u78bc\u3001 \u9019\u5c31\u589e\u52a0\u4e86\u4e00\u5c64 \u984d\u5916\u7684\u5b89\u5168\u4fdd\u8b77\uff1a\u5982\u679c\u4e0d\u555f\u7528\u591a\u91cd\u8eab\u4efd\u9a57\u8b49\uff0c\u88ab\u5165\u4fb5\u7684\u5e33\u6236\u5c31\u5f88\u5bb9\u6613\u53d7\u5230\u672a\u7d93\u6388\u6b0a\u7684\u8a2a\u554f\uff0c\u5f9e\u800c\u4f7f\u5a01\u8105\u8005\u80fd\u5920\u9577\u6642\u9593\u8a2a\u554f\u654f\u611f\u4fe1\u606f\uff0c\u4e26\u6709\u53ef\u80fd\u5371\u53ca\u6574\u500b\u4f01\u696d\u74b0\u5883\u3002<\/p>\n\n\n\n<p>\u52a0\u5f37\u5b89\u5168\u63aa\u65bd<\/p>\n\n\n\n<p>\u96d6\u7136\u6c92\u6709\u900f\u9732 MFA \u672a\u61c9\u7528\u65bc\u820a\u6e2c\u8a66\u79df\u6236\u5e33\u6236\u7684\u5177\u9ad4\u539f\u56e0\uff0c\u4f46\u5fae\u8edf\u627f\u8a8d\uff0c\u76ee\u524d\u7684\u653f\u7b56\u548c\u5de5\u4f5c\u6d41\u7a0b\u5141\u8a31\u70ba\u985e\u4f3c\u79df\u6236\u61c9\u7528 MFA \u4e26\u4e3b\u52d5\u63d0\u4f9b\u4fdd\u8b77\u3002 \u8a72\u8072\u660e\u5f37\u8abf\uff0c\u5fae\u8edf\u627f\u8afe\u4e0d\u65b7\u6539\u9032\u5176\u5b89\u5168\u63aa\u65bd\uff0c\u4e26\u5be6\u65bd\u5f37\u5236\u4fdd\u969c\u63aa\u65bd\uff0c\u4ee5\u78ba\u4fdd\u672a\u4f86\u4e0d\u518d\u767c\u751f\u6b64\u985e\u653b\u64ca\u3002 \u8072\u660e\u4e5f\u547c\u7c72\u5404\u7d44\u7e54\u63a1\u53d6\u63aa\u65bd\uff0c\u78ba\u4fdd\u5728\u5176\u5e33\u6236\u548c\u7cfb\u7d71\u4e2d\u512a\u5148\u4f7f\u7528 MFA\u3002<\/p>\n\n\n\n<p>\u662f\u6b21\u653b\u64ca\u7684\u6df1\u5165\u5206\u6790\uff1a<\/p>\n\n\n\n<p>\u9664\u4e86\u63ed\u9732 MFA \u7684\u7f3a\u5931\uff0c\u5fae\u8edf\u7684\u90e8\u843d\u683c\u6587\u7ae0\u4e5f\u5c0d Midnight Blizzard \u63a1\u7528\u7684\u653b\u64ca\u7b56\u7565\u63d0\u4f9b\u4e86\u6709\u50f9\u503c\u7684\u898b\u89e3\u3002 \u5a01\u8105\u884c\u70ba\u8005\u5229\u7528\u52a0\u5bc6\u7206\u7834\u6280\u8853\uff0c\u9019\u662f\u4e00\u7a2e\u65e8\u5728\u9003\u907f\u5075\u6e2c\u548c\u907f\u514d\u5e33\u6236\u5c01\u5835\u7684\u4f4e\u5bb9\u91cf\u6280\u8853\u3002 \u6b64\u5916\uff0c\u4ed6\u5011\u9084\u5229\u7528\u5206\u6563\u7684\u4f4f\u5b85\u4ee3\u7406\u57fa\u790e\u8a2d\u65bd\u4f86\u9032\u4e00\u6b65\u96b1\u85cf\u5176\u6d3b\u52d5\u3002 \u6b64\u5916\uff0cMidnight Blizzard \u9084\u5229\u7528\u50b3\u7d71\u7684\u6e2c\u8a66 OAuth \u61c9\u7528\u7a0b\u5f0f\u5c0d\u5fae\u8edf\u4f01\u696d\u74b0\u5883\u4e2d\u7684\u90f5\u7bb1\u9032\u884c\u9ad8\u5b58\u53d6\u6b0a\u548c\u5165\u4fb5\u3002<\/p>\n\n\n\n<p>\u9632\u79a6\u985e\u4f3c\u653b\u64ca<\/p>\n\n\n\n<p>\u91dd\u5c0d\u6b64\u6b21\u6f0f\u6d1e\uff0c\u5fae\u8edf\u63d0\u4f9b\u4e86\u985e\u4f3c\u653b\u64ca\u7684\u9632\u79a6\u63aa\u65bd\u3002 \u6307\u5357\u5efa\u8b70\u4ed4\u7d30\u6aa2\u67e5\u4f7f\u7528\u8005\u548c\u670d\u52d9\u5be6\u9ad4\u8eab\u4efd\uff0c\u4ed4\u7d30\u6aa2\u67e5\u8207\u672a\u77e5\u8eab\u4efd\u76f8\u95dc\u7684\u6b0a\u9650\uff0c\u4e26\u76e3\u63a7\u61c9\u7528\u7a0b\u5f0f\u5c08\u7528\u6b0a\u9650\u3002 \u6b64\u5916\uff0c\u5fae\u8edf\u5efa\u8b70\u6aa2\u67e5 Exchange Online \u4e2d\u5177\u6709 Application Impersonation \u6b0a\u9650\u7684\u8eab\u4efd\uff0c\u4e26\u4f7f\u7528\u7570\u5e38\u6aa2\u6e2c\u7b56\u7565\u4f86\u8b58\u5225\u60e1\u610f OAuth \u61c9\u7528\u7a0b\u5f0f\u3002 \u4f01\u696d\u4e5f\u61c9\u6aa2\u67e5\u4e26\u522a\u9664\u4e0d\u5fc5\u8981\u7684\u6b0a\u9650\uff0c\u4f8b\u5982 EWS.AccessAsUser.All Microsoft Graph API \u89d2\u8272\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u4fc4\u7f85\u65af APT \u7d44\u7e54 Midnight Blizzard \u5165\u4fb5\u5fae\u8edf\u6e2c\u8a66\u79df\u6236\u5e33\u6236\u7684\u4e8b\u4ef6\u51f8\u986f\u4e86\u591a\u56e0\u7d20\u8eab\u4efd\u9a57\u8b49\u5728\u73fe\u4ee3\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u4e2d\u7684\u91cd\u8981\u6027\u3002 \u6b64\u4e8b\u4ef6\u61c9\u8b66\u9192\u5168\u7403\u7684\u7d44\u7e54\u6a5f\u69cb\u63a1\u53d6\u5305\u62ec\u591a\u56e0\u7d20\u8eab\u4efd\u9a57\u8b49\u5728\u5167\u7684\u5f37\u6709\u529b\u7684\u5b89\u5168\u63aa\u65bd\uff0c\u4ee5\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u4e26\u964d\u4f4e\u8907\u96dc\u7684\u5a01\u8105\u884c\u70ba\u8005\u5e36\u4f86\u7684\u98a8\u96aa\u3002 \u900f\u904e\u63a1\u7528\u591a\u5c64\u6b21\u7684\u5b89\u5168\u65b9\u6cd5\uff0c\u4f01\u696d\u53ef\u4ee5\u52a0\u5f37\u9632\u79a6\uff0c\u5927\u5e45\u964d\u4f4e\u906d\u53d7\u985e\u4f3c\u7db2\u8def\u653b\u64ca\u7684\u5e7e\u7387\u3002<\/p>\n\n\n\n<p>#\u591a\u91cd\u8eab\u4efd\u9a57\u8b49#\u7db2\u8def\u5b89\u5168#\u8cc7\u6599\u5916\u6d29#\u5a01\u8105\u884c\u70ba\u8005#\u5348\u591c\u98a8\u66b4#APT29 #\u5b89\u5168\u6700\u4f73\u5be6\u8e10#\u7db2\u8def\u9632\u79a6\n#OAuth\u5b89\u5168#\u7db2\u8def\u653b\u64ca\u9810\u9632#\u5b89\u5168\u8a8d\u8b49#\u8cc7\u6599\u4fdd\u8b77#\u7db2\u8def\u5a01\u8105#IT\u5b89\u5168#\u6578\u4f4d\u5b89\u5168#\u4fdd\u6301\u9632\u8b77#\u7db2\u8def\u5b89\u5168\u610f\u8b58<\/p>","protected":false},"excerpt":{"rendered":"<p>\u5728\u6700\u8fd1\u7684\u7db2\u8def\u653b\u64ca\u4e2d\uff0c\u5fae\u8edf\u6e2c\u8a66\u79df\u6236\u7684\u820a\u5e33\u6236\u6210\u70ba\u4fc4\u7f85\u65af APT\uff08\u9ad8\u7d1a\u6301\u7e8c\u6027\u5a01\u8105\uff09\u7d44\u7e54\u8907\u96dc\u99ed\u5ba2\u653b\u64ca\u884c\u52d5\u7684\u53d7\u5bb3\u8005\u3002 \u9019\u6b21\u6f0f\u6d1e\u7531\u81ed\u540d\u662d\u8457\u7684\u4fc4\u7f85\u65af\u570b\u5bb6\u7d44\u7e54\u5348\u591c\u66b4\u96ea\u6216 APT29 \u767c\u8d77\uff0c\u66b4\u9732\u4e86\u4e00\u500b\u56b4\u91cd\u7684\u5b89\u5168\u6f0f\u6d1e\uff1a\u53d7\u611f\u67d3\u7684\u5e33\u6236\u6c92\u6709\u555f\u7528\u591a\u91cd\u8eab\u4efd\u9a57\u8b49\uff08MFA\uff09\u3002 \u9019\u4e8b\u4ef6\u6709\u529b\u5730\u63d0\u9192\u6211\u5011\uff0cMFA \u5728\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u548c\u62b5\u79a6\u8907\u96dc\u7db2\u8def\u5a01\u8105\u65b9\u9762\u7684\u91cd\u8981\u6027\u3002<\/p>","protected":false},"author":11,"featured_media":1688,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[52],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-14-230007.png","jetpack-related-posts":[{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1686,"position":0},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1809,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-faces-network-attack-steps-users-can-take-to-ensure-security\/","url_meta":{"origin":1686,"position":1},"title":"AnyDesk Faces Network Attack: Steps Users Can Take to Ensure Security","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent news, AnyDesk, a popular remote control software used by many individuals in Hong Kong, has been reported to have suffered a network attack. This incident has raised concerns among its users regarding the security of their information. Reports suggest that the program's source code and signing certificates\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1748,"url":"https:\/\/first-unity.com.hk\/zh\/safeguarding-your-google-account-understanding-the-exploit-that-allows-hackers-to-bypass-passwords\/","url_meta":{"origin":1686,"position":2},"title":"Safeguarding Your Google Account: Understanding the Exploit That Allows Hackers to Bypass Passwords","author":"Lewis Lok","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, online security has become a major concern for individuals and businesses alike. One of the most widely used platforms, Google, is often considered to have robust security measures in place. However, recent reports have revealed a new vulnerability that allows hackers to gain control of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1496,"url":"https:\/\/first-unity.com.hk\/zh\/veterinary-cyber-security-protecting-your-practice-in-the-digital-era\/","url_meta":{"origin":1686,"position":3},"title":"Veterinary Cyber Security: Protecting Your Practice in the Digital Era","author":"Thomas","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/joGzD4yrf-c?si=CQY11NYHXu078LFA The Importance of Cyber Security in Veterinary Practices In today's interconnected world, cyber security plays a crucial role in safeguarding electronic devices and networks from malicious attacks. For veterinary practices, the need for robust cyber security measures is even more essential. Why? Because it involves the safety of sensitive\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/joGzD4yrf-c\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1797,"url":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","url_meta":{"origin":1686,"position":4},"title":"Cyberattack on AnyDesk: Ensuring Secure Access through Immediate Updates","author":"Dr. Ken","date":"6 6 \u6708, 2024","format":false,"excerpt":"Introduction: In our increasingly connected world, cybersecurity threats continue to pose significant risks to individuals and organizations alike. Recently, AnyDesk, a prominent provider of remote desktop software, experienced a cyberattack that has raised concerns among its user base. This blog aims to shed light on the incident, outline the measures\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1539,"url":"https:\/\/first-unity.com.hk\/zh\/the-future-of-remote-work-unlocking-productivity-and-flexibility\/","url_meta":{"origin":1686,"position":5},"title":"The Future of Remote Work: Unlocking Productivity and Flexibility","author":"Harry Spira","date":"3 1 \u6708, 2024","format":false,"excerpt":"https:\/\/youtu.be\/UYcoGc25Xj0?si=g7hroKyrBBK581H4 Introduction The world has entered into a new era of work - remote work. Gone are the days of commuting to the office, as the usual office desks have been replaced by living room tables. With this transition, there comes a great opportunity for companies to unlock more productivity\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/UYcoGc25Xj0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1686"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1686"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1686\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1688"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}