{"id":1771,"date":"2024-06-01T07:04:24","date_gmt":"2024-06-01T07:04:24","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1771"},"modified":"2024-06-01T07:04:27","modified_gmt":"2024-06-01T07:04:27","slug":"cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","title":{"rendered":"\u9999\u6e2f\u79d1\u6280\u5712\u5340\u7db2\u8def\u5b89\u5168\u6f0f\u6d1e\u66b4\u9732\u654f\u611f\u6578\u64da"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u9999\u6e2f\u8457\u540d\u79d1\u6280\u4e2d\u5fc3\u6578\u4f4d\u6e2f\u5ba3\u5e03\uff0c\u516b\u6708\u4e2d\u65ec\u906d\u9047\u201c\u60e1\u610f\u5165\u4fb5\u201d\uff0c\u5c0e\u81f4\u91cd\u5927\u8cc7\u6599\u5916\u6d29\u3002 \u8a72\u6f0f\u6d1e\u6700\u8fd1\u624d\u88ab\u62ab\u9732\uff0c\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u548c\u654f\u611f\u8cc7\u8a0a\u4fdd\u8b77\u7684\u64d4\u6182\u3002 \u9019\u4e00\u4e8b\u4ef6\u70ba\u7d44\u7e54\u548c\u500b\u4eba\u6572\u97ff\u4e86\u8b66\u9418\uff0c\u8981\u6c42\u4ed6\u5011\u5728\u65e5\u76ca\u6578\u4f4d\u5316\u7684\u4e16\u754c\u4e2d\u512a\u5148\u8003\u616e\u7a69\u5065\u7684\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u5916\u6d29\uff1a<\/p>\n\n\n\n<p>\u6578\u78bc\u6e2f\u662f\u8457\u540d\u7684\u6578\u4f4d\u79d1\u6280\u65d7\u8266\u5e97\u548c\u5275\u696d\u5b75\u5316\u5668\uff0c\u767c\u73fe\u654f\u611f\u8cc7\u6599\u56e0\u6b64\u6b21\u5916\u6d29\u800c\u5728\u7db2\u8def\u4e0a\u6d29\u6f0f\u3002 \u6d29\u6f0f\u7684\u8cc7\u8a0a\u5305\u62ec\u500b\u4eba\u7684\u59d3\u540d\u3001\u806f\u7d61\u65b9\u5f0f\u3001\u54e1\u5de5\u548c\u524d\u54e1\u5de5\u7684\u4eba\u529b\u8cc7\u6e90\u8cc7\u6599\u3001\u6c42\u8077\u8005\u4ee5\u53ca\u6709\u9650\u6578\u91cf\u7684\u4fe1\u7528\u5361\u8a18\u9304\u3002 \u9019\u7a2e\u9055\u898f\u884c\u70ba\u4e0d\u50c5\u5c0d\u53d7\u5f71\u97ff\u500b\u4eba\u7684\u96b1\u79c1\u69cb\u6210\u5a01\u8105\uff0c\u4e5f\u5f15\u767c\u4e86\u5c0d\u6f5b\u5728\u8eab\u5206\u76dc\u7aca\u548c\u8ca1\u52d9\u8a50\u6b3a\u7684\u64d4\u6182\u3002<\/p>\n\n\n\n<p>\u5ef6\u9072\u62ab\u9732\u548c\u5f8c\u679c\uff1a<\/p>\n\n\n\n<p>\u9019\u6b21\u9055\u898f\u4e8b\u4ef6\u4e26\u672a\u7acb\u5373\u5411\u516c\u773e\u62ab\u9732\uff0c\u9019\u5f15\u767c\u4e86\u6709\u95dc\u5ef6\u9072\u7684\u6279\u8a55\u548c\u8cea\u7591\u3002 \u6578\u78bc\u6e2f\u8868\u793a\uff0c\u4ed6\u5011\u6700\u521d\u6c7a\u5b9a\u96b1\u779e\u9019\u4e9b\u8cc7\u8a0a\u662f\u70ba\u4e86\u907f\u514d\u5f15\u8d77\u4e0d\u5fc5\u8981\u7684\u95dc\u6ce8\u3002 \u7136\u800c\uff0c\u9019\u7a2e\u65b9\u6cd5\u5f15\u8d77\u4e86\u4eba\u5011\u5c0d\u6b64\u985e\u4e8b\u4ef6\u4e2d\u900f\u660e\u5ea6\u548c\u53ca\u6642\u62ab\u9732\u7684\u91cd\u8981\u6027\u7684\u95dc\u6ce8\u3002 \u5ef6\u9072\u7684\u56de\u61c9\u5f15\u8d77\u4e86\u7acb\u6cd5\u8005\u3001\u5c08\u5bb6\u548c\u516c\u773e\u5c0d\u7576\u524d\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u548c\u654f\u611f\u8cc7\u6599\u4fdd\u8b77\u7684\u6709\u6548\u6027\u7684\u8cea\u7591\u3002<\/p>\n\n\n\n<p>\u8abf\u67e5\u53ca\u56de\u61c9\uff1a<\/p>\n\n\n\n<p>\u767c\u73fe\u6f0f\u6d1e\u5f8c\uff0c\u6578\u78bc\u6e2f\u8b74\u8cac\u4e00\u5207\u5f62\u5f0f\u7684\u7db2\u8def\u72af\u7f6a\uff0c\u4e26\u627f\u8afe\u8207\u57f7\u6cd5\u6a5f\u69cb\u5145\u5206\u5408\u4f5c\u3002 \u9999\u6e2f\u8b66\u65b9\u548c\u8a72\u5e02\u7684\u96b1\u79c1\u76e3\u7ba1\u6a5f\u69cb\u5df2\u5c0d\u6b64\u4e8b\u4ef6\u5c55\u958b\u8abf\u67e5\u3002 \u6b64\u5916\uff0c\u9999\u6e2f\u79d1\u6280\u90e8\u9577\u5c0d\u6b64\u8868\u793a\u6df1\u5207\u95dc\u6ce8\uff0c\u4e26\u547d\u4ee4\u6240\u6709\u653f\u5e9c\u90e8\u9580\u52a0\u5f37\u6578\u4f4d\u5b89\u5168\u63aa\u65bd\u3002 \u5c0d\u65bc\u7d44\u7e54\u4f86\u8aaa\uff0c\u7acb\u5373\u63a1\u53d6\u884c\u52d5\u52a0\u5f37\u7db2\u8def\u5b89\u5168\u57fa\u790e\u8a2d\u65bd\u3001\u4fdd\u8b77\u654f\u611f\u8cc7\u6599\u4e26\u9632\u6b62\u672a\u4f86\u6d29\u6f0f\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u5c0d\u500b\u4eba\u548c\u4f01\u696d\u7684\u5f71\u97ff\uff1a<\/p>\n\n\n\n<p>\u6578\u78bc\u6e2f\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u6e05\u695a\u63d0\u9192\u4eba\u5011\u7db2\u8def\u5b89\u5168\u5c0d\u65bc\u500b\u4eba\u548c\u4f01\u696d\u7684\u91cd\u8981\u6027\u3002 \u96a8\u8457\u5c0d\u6578\u4f4d\u5e73\u53f0\u7684\u65e5\u76ca\u4f9d\u8cf4\u548c\u7db2\u8def\u5a01\u8105\u7684\u65e5\u76ca\u8907\u96dc\uff0c\u5fc5\u9808\u512a\u5148\u8003\u616e\u8cc7\u6599\u4fdd\u8b77\u4e26\u5be6\u65bd\u5f37\u6709\u529b\u7684\u5b89\u5168\u63aa\u65bd\u3002 \u500b\u4eba\u5fc5\u9808\u5c0d\u5176\u500b\u4eba\u8cc7\u8a0a\u4fdd\u6301\u8b66\u60d5\uff0c\u5b9a\u671f\u76e3\u63a7\u5176\u5e33\u6236\u662f\u5426\u6709\u4efb\u4f55\u53ef\u7591\u6d3b\u52d5\uff0c\u4e26\u53ca\u6642\u5831\u544a\u4efb\u4f55\u6f5b\u5728\u7684\u8eab\u4efd\u76dc\u7aca\u6216\u8a50\u6b3a\u8de1\u8c61\u3002 \u53e6\u4e00\u65b9\u9762\uff0c\u4f01\u696d\u61c9\u6295\u8cc7\u5148\u9032\u7684\u7db2\u8def\u5b89\u5168\u6280\u8853\uff0c\u5b9a\u671f\u9032\u884c\u5b89\u5168\u5be9\u6838\uff0c\u4e26\u70ba\u54e1\u5de5\u63d0\u4f9b\u5168\u9762\u7684\u57f9\u8a13\uff0c\u4ee5\u6700\u5927\u9650\u5ea6\u5730\u964d\u4f4e\u8cc7\u6599\u5916\u6d29\u7684\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u589e\u5f37\u7db2\u8def\u5b89\u5168\u4e4b\u8def\uff1a<\/p>\n\n\n\n<p>\u9451\u65bc\u6b64\u4e8b\u4ef6\uff0c\u7d44\u7e54\u548c\u500b\u4eba\u8feb\u5207\u9700\u8981\u52a0\u5f37\u5176\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u3002 \u9019\u5305\u62ec\u5be6\u65bd\u5f37\u5bc6\u78bc\u5354\u8b70\u3001\u5229\u7528\u591a\u56e0\u7d20\u8eab\u4efd\u9a57\u8b49\u3001\u5b9a\u671f\u66f4\u65b0\u8edf\u9ad4\u548c\u7cfb\u7d71\u3001\u5b9a\u671f\u9032\u884c\u5b89\u5168\u8a55\u4f30\u4ee5\u53ca\u57f9\u990a\u7db2\u8def\u5b89\u5168\u610f\u8b58\u6587\u5316\u3002 \u6b64\u5916\uff0c\u516c\u5171\u548c\u79c1\u71df\u90e8\u9580\u4e4b\u9593\u7684\u5408\u4f5c\u5c0d\u65bc\u5236\u5b9a\u5168\u9762\u7684\u7db2\u8def\u5b89\u5168\u6846\u67b6\u548c\u5171\u4eab\u6709\u95dc\u65b0\u5a01\u8105\u7684\u8cc7\u8a0a\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u6578\u78bc\u6e2f\u8cc7\u6599\u5916\u6d29\u66b4\u9732\u4e86\u7d44\u7e54\u548c\u500b\u4eba\u5728\u6578\u4f4d\u6642\u4ee3\u9762\u81e8\u7684\u8106\u5f31\u6027\u3002 \u5b83\u6e05\u695a\u5730\u63d0\u9192\u6211\u5011\uff0c\u7db2\u8def\u5b89\u5168\u61c9\u8a72\u662f\u6240\u6709\u5229\u5bb3\u95dc\u4fc2\u4eba\u7684\u9996\u8981\u4efb\u52d9\u3002 \u900f\u904e\u63a1\u53d6\u7a4d\u6975\u4e3b\u52d5\u7684\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u3001\u6295\u8cc7\u5148\u9032\u6280\u8853\u4e26\u57f9\u990a\u8b66\u60d5\u6587\u5316\uff0c\u6211\u5011\u53ef\u4ee5\u5171\u540c\u964d\u4f4e\u8cc7\u6599\u5916\u6d29\u98a8\u96aa\u4e26\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u3002 \u53ea\u6709\u900f\u904e\u5171\u540c\u52aa\u529b\uff0c\u6211\u5011\u624d\u80fd\u78ba\u4fdd\u672a\u4f86\u7684\u6578\u4f4d\u74b0\u5883\u66f4\u52a0\u5b89\u5168\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#CybersecurityConcerns #DataBreachAlert #ProtectingSensitiveData #CyberportHack #EnhancedCybersecurity #DigitalPrivacyMatters #DataProtection #SecuringOurDigitalWorld #CyberThreatAwareness #StrengtheningCyberDefenses<\/p>","protected":false},"excerpt":{"rendered":"<p>\u9999\u6e2f\u8457\u540d\u79d1\u6280\u4e2d\u5fc3\u6578\u4f4d\u6e2f\u5ba3\u5e03\uff0c\u516b\u6708\u4e2d\u65ec\u906d\u9047\u201c\u60e1\u610f\u5165\u4fb5\u201d\uff0c\u5c0e\u81f4\u91cd\u5927\u8cc7\u6599\u5916\u6d29\u3002 \u8a72\u6f0f\u6d1e\u6700\u8fd1\u624d\u88ab\u62ab\u9732\uff0c\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u548c\u654f\u611f\u8cc7\u8a0a\u4fdd\u8b77\u7684\u64d4\u6182\u3002 \u9019\u4e00\u4e8b\u4ef6\u70ba\u7d44\u7e54\u548c\u500b\u4eba\u6572\u97ff\u4e86\u8b66\u9418\uff0c\u8981\u6c42\u4ed6\u5011\u5728\u65e5\u76ca\u6578\u4f4d\u5316\u7684\u4e16\u754c\u4e2d\u512a\u5148\u8003\u616e\u7a69\u5065\u7684\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u3002<\/p>","protected":false},"author":10,"featured_media":1773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png","jetpack-related-posts":[{"id":1717,"url":"https:\/\/first-unity.com.hk\/zh\/strengthening-cybersecurity-measures-in-hong-kong-the-urgent-need-for-enhanced-regulation\/","url_meta":{"origin":1771,"position":0},"title":"Strengthening Cybersecurity Measures in Hong Kong: The Urgent Need for Enhanced Regulation","author":"Steve Parker","date":"5 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, cybersecurity has become a critical concern for individuals, organizations, and governments worldwide. The recent incident of a hacker breaching the cybersecurity defenses of Cyberport, a prominent digital hub in Hong Kong, has raised serious questions about the region's cybersecurity infrastructure. This blog post will delve\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1793,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet\/","url_meta":{"origin":1771,"position":1},"title":"Microsoft Data Breach: Employees&#8217; Credentials and Passwords Leaked on the Internet","author":"Randy Yip","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Microsoft, one of the world's largest technology companies, has reportedly experienced a significant data breach that has exposed employees' credentials and internal company files to the internet. Security researchers recently discovered an open and public storage server hosted on Microsoft's Azure cloud service, which was\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1771,"position":2},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1767,"url":"https:\/\/first-unity.com.hk\/zh\/japanese-mobile-game-developer-accidentally-sets-wrong-google-drive-permissions-resulting-in-data-breach\/","url_meta":{"origin":1771,"position":3},"title":"Japanese Mobile Game Developer Accidentally Sets Wrong Google Drive Permissions, Resulting in Data Breach","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent incident, a Japanese mobile game developer, known as ATeam, has mistakenly set incorrect permissions on their Google Drive, leading to a massive data breach affecting millions of users. This oversight has raised concerns about the security practices of developers and the potential risks users face when\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1771,"position":4},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1723,"url":"https:\/\/first-unity.com.hk\/zh\/fujitsu-discovers-malware-on-corporate-network-highlights-potential-data-breach\/","url_meta":{"origin":1771,"position":5},"title":"Fujitsu Discovers Malware on Corporate Network, Highlights Potential Data Breach","author":"Lewis Lok","date":"29 5 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent announcement, Fujitsu, the Japan-based IT giant, revealed the presence of malware on its corporate network. The company issued a warning, stating that this security incident could potentially lead to a data breach. Fujitsu expressed deep regret for the situation and acknowledged the potential unauthorized access to\u2026","rel":"","context":"\u5728\u300cOn Demand IT\u300d\u4e2d","block_context":{"text":"On Demand IT","link":"https:\/\/first-unity.com.hk\/zh\/category\/on-demand-it\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1771"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1771"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1771\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1773"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}