{"id":1717,"date":"2024-05-05T05:35:32","date_gmt":"2024-05-05T05:35:32","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1717"},"modified":"2024-05-05T05:35:35","modified_gmt":"2024-05-05T05:35:35","slug":"strengthening-cybersecurity-measures-in-hong-kong-the-urgent-need-for-enhanced-regulation","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/strengthening-cybersecurity-measures-in-hong-kong-the-urgent-need-for-enhanced-regulation\/","title":{"rendered":"\u52a0\u5f37\u9999\u6e2f\u7684\u7db2\u8def\u5b89\u5168\u6cd5\u898f\uff1a\u8feb\u5207\u9700\u8981\u5f37\u5316\u76e3\u7ba1\u63aa\u65bd\u3002"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u5728\u73fe\u4eca\u7684\u6578\u78bc\u5e74\u4ee3\uff0c\u7db2\u7d61\u4fdd\u5b89\u5df2\u6210\u70ba\u4e16\u754c\u5404\u5730\u7684\u500b\u4eba\u3001\u6a5f\u69cb\u548c\u653f\u5e9c\u6240\u95dc\u6ce8\u7684\u4e3b\u8981\u554f\u984c\u3002\u6700\u8fd1\uff0c\u99ed\u5ba2\u5165\u4fb5\u9999\u6e2f\u6578\u78bc\u6e2f\u7684\u7db2\u7d61\u4fdd\u5b89\u9632\u79a6\u7cfb\u7d71\uff0c\u4ee4\u9999\u6e2f\u7684\u7db2\u7d61\u4fdd\u5b89\u57fa\u790e\u8a2d\u65bd\u53d7\u5230\u56b4\u91cd\u8cea\u7591\u3002\u672c\u535a\u5ba2\u5c07\u6df1\u5165\u63a2\u8a0e\u4e8b\u4ef6\u7684\u7d30\u7bc0\uff0c\u8a0e\u8ad6\u6b64\u985e\u5165\u4fb5\u7684\u5f8c\u679c\uff0c\u4e26\u5f37\u8abf\u9999\u6e2f\u6025\u9700\u63a1\u53d6\u66f4\u56b4\u683c\u7684\u7db2\u8def\u5b89\u5168\u76e3\u7ba1\u63aa\u65bd\u3002<\/p>\n\n\n\n<p>\u6578\u78bc\u6e2f\u906d\u99ed\u5ba2\u5165\u4fb5:<\/p>\n\n\n\n<p>\u5728\u4e00\u5b97\u4ee4\u4eba\u9707\u9a5a\u7684\u4e8b\u4ef6\u4e2d\uff0c\u99ed\u5ba2\u5165\u4fb5\u6578\u78bc\u6e2f\u7684\u7cfb\u7d71\uff0c\u5728\u672a\u7d93\u6388\u6b0a\u7684\u60c5\u6cc1\u4e0b\u9032\u5165\u7cfb\u7d71\uff0c\u4e26\u76dc\u53d6\u4e86\u7d04 400 GB \u7684\u654f\u611f\u8cc7\u6599\u3002\u9019\u6b21\u4e8b\u4ef6\u7a81\u986f\u6578\u78bc\u6e2f\u7684\u7db2\u7d61\u4fdd\u5b89\u67b6\u69cb\u5b58\u5728\u56b4\u91cd\u6f0f\u6d1e\uff0c\u7279\u5225\u662f\u99ed\u5ba2\u53ef\u5229\u7528\u7684\u6f0f\u6d1e\u3002\u9019\u6b21\u5165\u4fb5\u4e8b\u4ef6\u4ee4\u4eba\u95dc\u6ce8\u9999\u6e2f\u7db2\u7d61\u4fdd\u5b89\u7684\u6574\u9ad4\u72c0\u6cc1\uff0c\u4ee5\u53ca\u9999\u6e2f\u5176\u4ed6\u6a5f\u69cb\u53ef\u80fd\u9762\u5c0d\u7684\u6f5b\u5728\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u5c08\u5bb6\u898b\u89e3:<\/p>\n\n\n\n<p>\u96fb\u8166\u5b89\u5168\u7814\u7a76\u54e1 Lai Chok Tong \u63ed\u793a\u4e86\u6b64\u6b21\u5165\u4fb5\u7684\u56b4\u91cd\u6027\u3002\u4ed6\u6307\u51fa\uff0c\u99ed\u5ba2\u6210\u529f\u5229\u7528\u6578\u78bc\u6e2f\u7cfb\u7d71\u5df2\u5b58\u5728\u5169\u5e74\u7684\u6f0f\u6d1e\uff0c\u5c0e\u81f4\u8cc7\u6599\u88ab\u76dc\u53d6\uff0c\u5176\u5f8c\u66f4\u9032\u884c\u52d2\u7d22\u3002\u8cf4\u6e05\u5fb7\u9032\u4e00\u6b65\u6307\u51fa\uff0c\u9019\u8d77\u4e8b\u4ef6\u51f8\u986f\u4e86\u6578\u78bc\u6e2f\u5728\u7db2\u8def\u5b89\u5168\u65b9\u9762\u7684\u56b4\u91cd\u758f\u5ffd\u3002\u4ed6\u9084\u5f37\u8abf\u4e86\u65b0\u52a0\u5761\u6cd5\u5f8b\u7684\u6548\u529b\uff0c\u5373\u5c0d\u767c\u751f\u8cc7\u6599\u6d29\u9732\u4e8b\u4ef6\u7684\u6a5f\u69cb\u8655\u4ee5\u5373\u6642\u7f70\u6b3e\u3002<\/p>\n\n\n\n<p>\u547c\u7c72\u52a0\u5f37\u76e3\u7ba1:<\/p>\n\n\n\n<p>\u5165\u4fb5\u4e8b\u4ef6\u767c\u751f\u5f8c\uff0c\u5305\u62ec\u80e1\u5fd7\u5f37\u5728\u5167\u7684\u9999\u6e2f\u7acb\u6cd5\u6703\u4fdd\u5b89\u4e8b\u52d9\u59d4\u54e1\u6703\u6210\u54e1\u5c0d\u4e8b\u4ef6\u7684\u5f71\u97ff\u8868\u793a\u56b4\u91cd\u95dc\u5207\u3002\u4ed6\u5011\u5f37\u8abf\uff0c\u6b64\u6b21\u5165\u4fb5\u4e8b\u4ef6\u53cd\u6620\u51fa\u6578\u78bc\u6e2f\u7f3a\u4e4f\u7db2\u8def\u5b89\u5168\u610f\u8b58\uff0c\u4e26\u547c\u7c72\u653f\u5e9c\u52a0\u5f37\u5c0d\u8cc7\u6599\u7ba1\u7406\u7684\u76e3\u7763\uff0c\u5236\u5b9a\u5168\u9762\u7684\u61c9\u6025\u8a08\u756b\u3002\u9019\u4e9b\u8072\u97f3\u986f\u793a\uff0c\u9999\u6e2f\u4e9f\u9700\u66f4\u56b4\u8b39\u7684\u898f\u7ba1\u548c\u66f4\u56b4\u5bc6\u7684\u7db2\u7d61\u4fdd\u5b89\u63aa\u65bd\u3002<\/p>\n\n\n\n<p>\u672a\u4f86\u65b9\u5411:<\/p>\n\n\n\n<p>\u79c1\u96b1\u5c08\u54e1\u5df2\u610f\u8b58\u5230\u4eca\u6b21\u4e8b\u4ef6\u7684\u56b4\u91cd\u6027\uff0c\u4e26\u627f\u8afe\u6703\u56e0\u61c9\u9999\u6e2f\u7684\u7279\u6b8a\u60c5\u6cc1\uff0c\u6aa2\u8a0e\u5176\u4ed6\u53f8\u6cd5\u7ba1\u8f44\u5340\u7684\u76f8\u95dc\u6cd5\u4f8b\u3002\u5c08\u54e1\u7684\u76ee\u6a19\u662f\u63d0\u51fa\u5207\u5be6\u6709\u6548\u7684\u4fee\u8a02\u5efa\u8b70\uff0c\u4ee5\u4fdd\u969c\u500b\u4eba\u8cc7\u6599\u79c1\u96b1\u3002\u6211\u5011\u6025\u9700\u9019\u985e\u63aa\u65bd\uff0c\u4e0d\u4f46\u53ef\u963b\u5687\u6f5b\u5728\u7684\u99ed\u5ba2\u8972\u64ca\uff0c\u66f4\u53ef\u63a8\u884c\u6709\u529b\u7684\u7db2\u7d61\u4fdd\u5b89\u898f\u7ba1\u63aa\u65bd\uff0c\u78ba\u4fdd\u500b\u4eba\u8cc7\u6599\u5f97\u5230\u4fdd\u969c\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u6578\u78bc\u6e2f\u7db2\u7d61\u5165\u4fb5\u4e8b\u4ef6\u70ba\u9999\u6e2f\u6572\u97ff\u4e86\u8b66\u9418\uff0c\u51f8\u986f\u4e86\u52a0\u5f37\u7db2\u7d61\u4fdd\u5b89\u57fa\u5efa\u7684\u8feb\u5207\u6027\u3002\u9019\u6b21\u4e8b\u4ef6\u7a81\u986f\u4e86\u63a1\u53d6\u7a4d\u6975\u63aa\u65bd\u7684\u91cd\u8981\u6027\uff0c\u4f8b\u5982\u5b9a\u671f\u9032\u884c\u6ef2\u900f\u6e2c \u8a66\u53ca\u53ca\u6642\u4fee\u88dc\u6f0f\u6d1e\u3002\u901a\u904e\u52a0\u5f37\u7db2\u8def\u5b89\u5168\u6cd5\u898f\uff0c\u9999\u6e2f\u53ef\u4ee5\u5275\u5efa\u4e00\u500b\u5b89\u5168\u7684\u6578\u4f4d\u74b0\u5883\uff0c\u4fdd\u8b77\u500b\u4eba\u3001\u7d44\u7e54\u548c\u6578\u4f4d\u57fa\u790e\u8a2d\u65bd\u7684\u5b8c\u6574\u6027\u3002\u73fe\u5728\u662f\u63a1\u53d6\u884c\u52d5\u7684\u6642\u5019\u4e86\uff0c\u6211\u5011\u5fc5\u9808\u9f4a\u5fc3\u5354\u529b\uff0c\u9632\u6b62\u672a\u4f86\u7684\u5165\u4fb5\uff0c\u4fdd\u8b77\u9999\u6e2f\u9019\u500b\u4e2d\u5fc3\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#CybersecurityRegulation #CyberAttackatCyberport #CybersecurityVulnerabilities<\/p>\n\n\n\n<p>#PersonalDataPrivacy #EnhancingCybersecurity #HackerAttacks<\/p>\n\n\n\n<p>#DataBreachRisks #CybersecurityAwareness #EmergencyPlan #StrengtheningDataManagement<\/p>","protected":false},"excerpt":{"rendered":"<p>\u5728\u73fe\u4eca\u7684\u6578\u78bc\u5e74\u4ee3\uff0c\u7db2\u7d61\u4fdd\u5b89\u5df2\u6210\u70ba\u4e16\u754c\u5404\u5730\u7684\u500b\u4eba\u3001\u6a5f\u69cb\u548c\u653f\u5e9c\u6240\u95dc\u6ce8\u7684\u4e3b\u8981\u554f\u984c\u3002\u6700\u8fd1\uff0c\u99ed\u5ba2\u5165\u4fb5\u9999\u6e2f\u6578\u78bc\u6e2f\u7684\u7db2\u7d61\u4fdd\u5b89\u9632\u79a6\u7cfb\u7d71\uff0c\u4ee4\u9999\u6e2f\u7684\u7db2\u7d61\u4fdd\u5b89\u57fa\u790e\u8a2d\u65bd\u53d7\u5230\u56b4\u91cd\u8cea\u7591\u3002\u672c\u535a\u5ba2\u5c07\u6df1\u5165\u63a2\u8a0e\u4e8b\u4ef6\u7684\u7d30\u7bc0\uff0c\u8a0e\u8ad6\u6b64\u985e\u5165\u4fb5\u7684\u5f8c\u679c\uff0c\u4e26\u5f37\u8abf\u9999\u6e2f\u6025\u9700\u63a1\u53d6\u66f4\u56b4\u683c\u7684\u7db2\u8def\u5b89\u5168\u76e3\u7ba1\u63aa\u65bd\u3002<\/p>","protected":false},"author":12,"featured_media":1718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png","jetpack-related-posts":[{"id":1771,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","url_meta":{"origin":1717,"position":0},"title":"Cybersecurity Breach at Hong Kong Tech Park Exposes Sensitive Data","author":"Dr. Ken","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Hong Kong's prominent technology hub, Cyberport, has announced that it fell victim to a \"malicious intrusion\" in mid-August, resulting in a significant data breach. The breach, which was only disclosed recently, has raised concerns regarding cybersecurity measures and the protection of sensitive information. This incident\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1665,"url":"https:\/\/first-unity.com.hk\/zh\/navigating-cybersecurity-challenges-an-it-consultants-perspective-on-edetector\/","url_meta":{"origin":1717,"position":1},"title":"Navigating Cybersecurity Challenges: An IT Consultant\u2019s Perspective on eDetector","author":"Dr. Ken","date":"17 2 \u6708, 2024","format":false,"excerpt":"Introduction As an experienced IT consultant based in Hong Kong, I\u2019ve witnessed the increasing frequency of cybersecurity incidents that businesses of all sizes are grappling with. Large corporations often have the resources to hire cybersecurity consultants for investigations, but small and medium-sized enterprises (SMEs) often find themselves in a bind.\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1662,"url":"https:\/\/first-unity.com.hk\/zh\/guarding-your-digital-life-a-deep-dive-into-cybersecurity-threats\/","url_meta":{"origin":1717,"position":2},"title":"Guarding Your Digital Life: A Deep Dive into Cybersecurity Threats","author":"Thomas Leung","date":"17 2 \u6708, 2024","format":false,"excerpt":"Introduction In this digital world, our lives and work are closely connected to the internet. For the working class in Hong Kong, protecting their digital information and cybersecurity is becoming increasingly important. The Emerging Threat Recently, a hacker group named Water Hydra is actively exploiting a vulnerability in Microsoft Windows\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1744,"url":"https:\/\/first-unity.com.hk\/zh\/beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity\/","url_meta":{"origin":1717,"position":3},"title":"Beware of the Rising Threat of FakeUpdates: Safeguarding Cybersecurity","author":"Thomas Leung","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In recent months, Hong Kong has witnessed a surge in the prevalence of a malicious software called \"FakeUpdates\" or \"SocGholish.\" This JavaScript-based download program has affected over 2.44% of local organizations, highlighting the alarming trend of hackers bypassing traditional defenses and deceiving users through simple techniques. In Check Point's\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1717,"position":4},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1717,"position":5},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1717"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1717"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1718"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}