{"id":1785,"date":"2024-06-05T07:15:11","date_gmt":"2024-06-05T07:15:11","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1785"},"modified":"2024-06-08T07:19:11","modified_gmt":"2024-06-08T07:19:11","slug":"microsofts-38tb-leak-how-it-leaders-should-respond","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","title":{"rendered":"\u5fae\u8edf 38TB \u8cc7\u6599\u5916\u6d29\uff1aIT \u9818\u5c0e\u8005\u61c9\u5982\u4f55\u61c9\u5c0d"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u5728\u7576\u4eca\u7684\u6578\u4f4d\u74b0\u5883\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u6f0f\u6d1e\u6301\u7e8c\u70ba\u5168\u7403\u7d44\u7e54\u5e36\u4f86\u91cd\u5927\u6311\u6230\u3002 \u5f15\u8d77 IT \u9818\u5c0e\u8005\u548c\u7db2\u8def\u5b89\u5168\u5c08\u696d\u4eba\u58eb\u6ce8\u610f\u7684\u4e00\u4ef6\u503c\u5f97\u6ce8\u610f\u7684\u4e8b\u4ef6\u662f Microsoft \u7684 38TB \u8cc7\u6599\u5916\u6d29\u3002 \u9019\u6b21\u5927\u898f\u6a21\u8cc7\u6599\u5916\u6d29\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u96f2\u7aef\u5b89\u5168\u548c\u5f37\u5927\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u91cd\u8981\u6027\u7684\u64d4\u6182\u3002 \u5728\u9019\u7bc7\u6587\u7ae0\u4e2d\uff0c\u6211\u5011\u5c07\u63a2\u8a0e\u6d29\u5bc6\u4e8b\u4ef6\u7684\u5f71\u97ff\uff0c\u4e26\u8a0e\u8ad6 IT \u9818\u5c0e\u8005\u5982\u4f55\u6709\u6548\u61c9\u5c0d\u6b64\u985e\u4e8b\u4ef6\u3002<\/p>\n\n\n\n<p>\u4e86\u89e3 Microsoft 38TB \u5916\u6d29\uff1a<\/p>\n\n\n\n<p>\u7531\u65bc AI \u5718\u968a\u5728 Azure \u96f2\u7aef\u670d\u52d9\u4e2d\u7684\u932f\u8aa4\uff0c\u5fae\u8edf 38TB \u5916\u6d29\u4e8b\u4ef6\u6d29\u6f0f\u4e86\u5927\u91cf\u79c1\u4eba\u516c\u53f8\u8cc7\u6599\u3002 \u6d29\u6f0f\u7684\u8cc7\u6599\u5305\u62ec\u54e1\u5de5\u96fb\u8166\u7684\u5b8c\u6574\u5099\u4efd\u3001\u5fae\u8edf\u670d\u52d9\u7684\u5bc6\u78bc\u3001\u91d1\u9470\u548c\u5167\u90e8\u5fae\u8edf\u5718\u968a\u8a0a\u606f\u3002 \u6f0f\u6d1e\u767c\u751f\u5728\u4e0a\u50b3\u5305\u542b\u958b\u6e90\u7a0b\u5f0f\u78bc\u548c AI \u6a21\u578b\u7684\u8a13\u7df4\u8cc7\u6599\u6642\uff0c\u5c0e\u81f4 GitHub \u4f7f\u7528\u8005\u900f\u904e Azure \u7684 SAS \u4ee4\u724c\u9032\u884c\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u3002<\/p>\n\n\n\n<p>IT \u9818\u5c0e\u8005\u7684\u7d93\u9a57\u6559\u8a13\uff1a<\/p>\n\n\n\n<p>\u52a0\u5f37\u96f2\u7aef\u5b89\u5168\uff1a\u5fae\u8edf\u7684\u6d29\u5bc6\u4e8b\u4ef6\u51f8\u986f\u4e86\u5728\u96f2\u7aef\u74b0\u5883\u4e2d\u5be6\u65bd\u5f37\u5927\u7684\u5b89\u5168\u63aa\u65bd\u7684\u81f3\u95dc\u91cd\u8981\u6027\u3002 IT \u9818\u5c0e\u8005\u61c9\u512a\u5148\u8003\u616e\u5b89\u5168\u6027\u914d\u7f6e\u3001\u5b58\u53d6\u63a7\u5236\u548c\u52a0\u5bc6\uff0c\u4ee5\u4fdd\u8b77\u654f\u611f\u8cc7\u6599\u3002<\/p>\n\n\n\n<p>\u6559\u80b2\u54e1\u5de5\uff1a\u9019\u4e8b\u4ef6\u63d0\u9192\u6211\u5011\uff0c\u54e1\u5de5\u5728\u7dad\u8b77\u7db2\u8def\u5b89\u5168\u65b9\u9762\u767c\u63ee\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\u3002 IT \u9818\u5c0e\u8005\u61c9\u6295\u8cc7\u5168\u9762\u7684\u57f9\u8a13\u8a08\u5283\uff0c\u4ee5\u6559\u80b2\u54e1\u5de5\u6f5b\u5728\u7684\u5b89\u5168\u98a8\u96aa\u3001\u8cc7\u6599\u4fdd\u8b77\u7684\u91cd\u8981\u6027\u4ee5\u53ca\u5b89\u5168\u4f7f\u7528\u96f2\u7aef\u670d\u52d9\u7684\u6700\u4f73\u5be6\u8e10\u3002<\/p>\n\n\n\n<p>\u5be6\u65bd\u6700\u5c0f\u6b0a\u9650\u539f\u5247\uff1a\u63a1\u7528\u6700\u5c0f\u6b0a\u9650\u539f\u5247\u53ef\u78ba\u4fdd\u54e1\u5de5\u50c5\u64c1\u6709\u57f7\u884c\u5176\u5de5\u4f5c\u8077\u80fd\u6240\u9700\u7684\u5b58\u53d6\u6b0a\u9650\u3002 \u900f\u904e\u9650\u5236\u5b58\u53d6\u6b0a\u9650\uff0c\u7d44\u7e54\u53ef\u4ee5\u6700\u5927\u9650\u5ea6\u5730\u6e1b\u5c11\u5167\u90e8\u5a01\u8105\u6216\u53d7\u640d\u5e33\u6236\u9020\u6210\u7684\u6f5b\u5728\u640d\u5bb3\u3002<\/p>\n\n\n\n<p>\u5b9a\u671f\u5b89\u5168\u5be9\u8a08\uff1aIT \u9818\u5c0e\u8005\u61c9\u5b9a\u671f\u9032\u884c\u5b89\u5168\u5be9\u8a08\u548c\u8a55\u4f30\uff0c\u4ee5\u8b58\u5225\u7cfb\u7d71\u4e2d\u7684\u6f0f\u6d1e\u548c\u5f31\u9ede\u3002 \u9019\u4e9b\u5be9\u8a08\u53ef\u4ee5\u5e6b\u52a9\u78ba\u5b9a\u6f5b\u5728\u7684\u6539\u9032\u9818\u57df\u4e26\u52a0\u5f37\u6574\u9ad4\u7db2\u8def\u5b89\u5168\u614b\u52e2\u3002<\/p>\n\n\n\n<p>\u4e8b\u4ef6\u56de\u61c9\u8a08\u5283\uff1a\u7d44\u7e54\u61c9\u5236\u5b9a\u660e\u78ba\u7684\u4e8b\u4ef6\u56de\u61c9\u8a08\u5283\uff0c\u4ee5\u6709\u6548\u8655\u7406\u7db2\u8def\u5b89\u5168\u6f0f\u6d1e\u3002 IT \u9818\u5c0e\u8005\u61c9\u5efa\u7acb\u5c08\u9580\u7684\u5718\u968a\uff0c\u5b9a\u7fa9\u89d2\u8272\u548c\u8077\u8cac\uff0c\u4e26\u5efa\u7acb\u6e9d\u901a\u7ba1\u9053\uff0c\u4ee5\u4fbf\u53ca\u6642\u56de\u61c9\u4e26\u6e1b\u8f15\u9055\u898f\u7684\u5f71\u97ff\u3002<\/p>\n\n\n\n<p>\u5354\u4f5c\u548c\u8cc7\u8a0a\u5171\u4eab\uff1aIT\u9818\u5c0e\u8005\u61c9\u7a4d\u6975\u8207\u696d\u754c\u540c\u884c\u3001\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u548c\u76f8\u95dc\u7576\u5c40\u9032\u884c\u5354\u4f5c\u548c\u8cc7\u8a0a\u5171\u4eab\u3002 \u900f\u904e\u5206\u4eab\u898b\u89e3\u548c\u7d93\u9a57\uff0c\u7d44\u7e54\u53ef\u4ee5\u5171\u540c\u589e\u5f37\u5176\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u4e26\u96a8\u6642\u4e86\u89e3\u65b0\u51fa\u73fe\u7684\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>Microsoft 38TB \u5916\u6d29\u4e8b\u4ef6\u7d66 IT \u9818\u5c0e\u8005\u6572\u97ff\u4e86\u8b66\u9418\uff0c\u8981\u6c42\u4ed6\u5011\u512a\u5148\u8003\u616e\u7db2\u8def\u5b89\u5168\u4e26\u52a0\u5f37\u5c0d\u6f5b\u5728\u6f0f\u6d1e\u7684\u9632\u79a6\u3002 \u900f\u904e\u5be6\u65bd\u5f37\u6709\u529b\u7684\u5b89\u5168\u63aa\u65bd\u3001\u6559\u80b2\u54e1\u5de5\u4e26\u63a1\u53d6\u4e3b\u52d5\u7b56\u7565\uff0c\u7d44\u7e54\u53ef\u4ee5\u6700\u5927\u9650\u5ea6\u5730\u964d\u4f4e\u672a\u4f86\u767c\u751f\u985e\u4f3c\u4e8b\u4ef6\u7684\u98a8\u96aa\u3002 \u7db2\u8def\u5b89\u5168\u4ecd\u61c9\u662f IT \u9818\u5c0e\u8005\u7684\u9996\u8981\u4efb\u52d9\uff0c\u56e0\u70ba\u4e0d\u65b7\u8b8a\u5316\u7684\u5a01\u8105\u60c5\u52e2\u9700\u8981\u4e0d\u65b7\u4fdd\u6301\u8b66\u60d5\u548c\u9069\u61c9\u3002 \u900f\u904e\u7a4d\u6975\u4e3b\u52d5\u7684\u63aa\u65bd\u548c\u5f37\u5927\u7684\u7db2\u8def\u5b89\u5168\u601d\u7dad\uff0c\u7d44\u7e54\u53ef\u4ee5\u6709\u6548\u4fdd\u8b77\u5176\u654f\u611f\u8cc7\u6599\u4e26\u7dad\u6301\u5229\u5bb3\u95dc\u4fc2\u4eba\u7684\u4fe1\u4efb\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#MicrosoftDataLeak #CybersecurityBreaches #CloudSecurity #ITLeadership #DataProtection #CyberResilience #IncidentResponse #SecurityAudits #LeastPrivilege #CollaborationInCybersecurity #DataPrivacy #InformationSecurity #CybersecurityAwareness #CloudSecurityBestPractices #ITSecurity #DataBreachResponse #CybersecurityStrategy #DataProtectionMeasures #ITInfrastructure #DataSecurity #CyberThreats #ITRiskManagement #SecureCloudEnvironments<\/p>","protected":false},"excerpt":{"rendered":"<p>\u5728\u7576\u4eca\u7684\u6578\u4f4d\u74b0\u5883\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u6f0f\u6d1e\u6301\u7e8c\u70ba\u5168\u7403\u7d44\u7e54\u5e36\u4f86\u91cd\u5927\u6311\u6230\u3002 \u5f15\u8d77 IT \u9818\u5c0e\u8005\u548c\u7db2\u8def\u5b89\u5168\u5c08\u696d\u4eba\u58eb\u6ce8\u610f\u7684\u4e00\u4ef6\u503c\u5f97\u6ce8\u610f\u7684\u4e8b\u4ef6\u662f Microsoft \u7684 38TB \u8cc7\u6599\u5916\u6d29\u3002 \u9019\u6b21\u5927\u898f\u6a21\u8cc7\u6599\u5916\u6d29\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u96f2\u7aef\u5b89\u5168\u548c\u5f37\u5927\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u91cd\u8981\u6027\u7684\u64d4\u6182\u3002 \u5728\u9019\u7bc7\u6587\u7ae0\u4e2d\uff0c\u6211\u5011\u5c07\u63a2\u8a0e\u6d29\u5bc6\u4e8b\u4ef6\u7684\u5f71\u97ff\uff0c\u4e26\u8a0e\u8ad6 IT \u9818\u5c0e\u8005\u5982\u4f55\u6709\u6548\u61c9\u5c0d\u6b64\u985e\u4e8b\u4ef6\u3002<\/p>","protected":false},"author":13,"featured_media":1833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png","jetpack-related-posts":[{"id":1793,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet\/","url_meta":{"origin":1785,"position":0},"title":"Microsoft Data Breach: Employees&#8217; Credentials and Passwords Leaked on the Internet","author":"Randy Yip","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Microsoft, one of the world's largest technology companies, has reportedly experienced a significant data breach that has exposed employees' credentials and internal company files to the internet. Security researchers recently discovered an open and public storage server hosted on Microsoft's Azure cloud service, which was\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1686,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication\/","url_meta":{"origin":1785,"position":1},"title":"Microsoft Legacy Account Hacked by Russian APT: The Importance of Multi-Factor Authentication","author":"Rhona Goskirk","date":"14 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent cyber attack, Microsoft's legacy test tenant account fell victim to a sophisticated hacking operation conducted by a Russian Advanced Persistent Threat (APT) group. The breach, attributed to the notorious Russian nation-state actor known as Midnight Blizzard or APT29, revealed a critical security oversight: the compromised account\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-14-230007.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1728,"url":"https:\/\/first-unity.com.hk\/zh\/introducing-microsoft-copilot-for-security-empowering-security-professionals-with-ai\/","url_meta":{"origin":1785,"position":2},"title":"Introducing Microsoft Copilot for Security: Empowering Security Professionals with AI","author":"Harry Spira","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In the ever-evolving landscape of cybersecurity, organizations face increasing challenges in defending against sophisticated threats. To address this, Microsoft is set to launch Microsoft Copilot for Security in April, a groundbreaking AI-powered solution that aims to empower security and IT professionals with enhanced skills, rapid collaboration, comprehensive insights, and\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-140530.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-140530.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-140530.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1789,"url":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","url_meta":{"origin":1785,"position":3},"title":"Cybercriminals Exploit Remote Desktop Protocols in Cyber Attacks &#8211; A Disturbing Report","author":"Rhona Goskirk","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In the digital age, cybercriminals are constantly finding new ways to compromise the security of individuals and organizations. A recent report from a global cybersecurity company, Sophos, sheds light on a concerning trend - the exploitation of remote desktop protocols (RDP) in cyber attacks. This blog explores the key\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1703,"url":"https:\/\/first-unity.com.hk\/zh\/windows-11-security-update-faces-installation-problems-what-you-need-to-know\/","url_meta":{"origin":1785,"position":4},"title":"Windows 11 Security Update Faces Installation Problems: What You Need to Know","author":"Dr. Ken","date":"18 4 \u6708, 2024","format":false,"excerpt":"Introduction:Windows users eagerly await security updates to ensure the safety and stability of their systems. However, sometimes these updates can bring unexpected issues. In February 2024, Microsoft released a security update for Windows 11, only to find that it unraveled at 96% for some users. This setback left many Windows\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105443.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105443.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105443.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1731,"url":"https:\/\/first-unity.com.hk\/zh\/the-growing-security-risks-of-ai-a-race-against-time-for-companies\/","url_meta":{"origin":1785,"position":5},"title":"The Growing Security Risks of AI: A Race Against Time for Companies","author":"Randy Yip","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: Artificial intelligence (AI) has been hailed as a revolutionary technology, promising increased productivity and efficiency across various industries. However, as the rapid growth of generative AI-based software continues, it presents a significant challenge for business technology leaders to keep up with potential cybersecurity risks. In this blog post, we\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1785"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1785"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1833"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}