{"id":7215,"date":"2024-04-01T12:07:09","date_gmt":"2024-04-01T12:07:09","guid":{"rendered":"http:\/\/localhost\/hashstudioz\/?post_type=web-story&#038;p=7215"},"modified":"2024-04-01T12:07:11","modified_gmt":"2024-04-01T12:07:11","slug":"securing-the-future-with-cyber-security-measures","status":"publish","type":"web-story","link":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/","title":{"rendered":"Securing the Future with Cyber Security Measures"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40700\" rel=\"stylesheet\"\/><link href=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1.png\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n                \/* \n                  AMP CTA Layer will exactly occupy 74px regardless of any device.\n                  To space out captions 74px from the BOTTOM (AMP CTA Layer),\n                  74px from the TOP should also be spaced out and thus: 2 * 74px\n                  will be the desired max-height.\n                *\/\n                max-height: calc(100vh - (2 * 74px));\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Securing the Future with Cyber Security Measures<\/p>\n<p><\/title><link rel=\"canonical\" href=\"http:\/\/localhost\/hashstudioz\/?post_type=web-story&amp;p=7215\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"\" publisher-logo-src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2023\/10\/HashSTudioz-Logo.jpg\" title=\"Securing the Future with Cyber Security Measures\n\n\" poster-portrait-src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg\"><amp-story-page id=\"13c239ea-30d3-4d10-936f-27fb6d346d0b\" auto-advance-after=\"5s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#c5afa0\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-c3881f76-281d-4054-bd30-a57f5392aff2\">\n<div style=\"position:absolute;width:345.19957%;height:100%;left:-122.59979%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1.png\" alt=\"cyber security\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1.png 800w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-768x396.png 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-300x155.png 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-150x77.png 150w\" sizes=\"(min-width: 1024px) 57vh, 126vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:4.12621%;top:3.23625%;width:95.87379%;height:38.67314%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5063291139240507% 0.5063291139240507% 0.5063291139240507% 0.5063291139240507% \/ 0.8368200836820083% 0.8368200836820083% 0.8368200836820083% 0.8368200836820083%\" id=\"el-826da4b8-6d6f-4b37-bf77-2571f9284c4a\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.809061em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Securing the Future with Cyber Security Measures<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"6472aa21-537c-4df6-9d58-3eaf70ca1109\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-af97b621-a613-4f49-b9e8-b31edfbe0513\",\"keyframes\":[{\"offset\":0,\"transform\":\"translate3d(0, -160.50759%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.29,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.45,\"transform\":\"translate3d(0, -45.134734308%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.61,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.71,\"transform\":\"translate3d(0, -15.344525604%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.8,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.85,\"transform\":\"translate3d(0, -5.762222481%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.92,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.96,\"transform\":\"translate3d(0, -2.5039184039999998%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":1,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"}],\"delay\":0,\"duration\":600,\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-16c3957b-df67-426a-a0a3-464c11a634cd\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:21.0356%;width:76.69903%;height:58.09061%;opacity:1\">\n<div id=\"anim-af97b621-a613-4f49-b9e8-b31edfbe0513\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(0, -160.50759%, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 0.5571030640668524% 0.5571030640668524% 0.5571030640668524% 0.5571030640668524%\" id=\"el-d217edd3-add7-480e-886c-79154ec38282\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.22250791139240508% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.809061em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #590d22\">Cyber security is essential for safeguarding our digital future.<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"8f6dd6e9-8e16-44f8-ba89-d8b33a77e8f8\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-13f5ef13-ae83-4e1a-99ed-5f076c7ba2e3\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.4, 0.4, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-add88218-f971-4b57-adeb-6df7ce217568\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.4, 0.4, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-ac0071b8-3112-4b7f-9252-c94abd28f50a\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.4, 0.4, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-12a0f2b3-e981-4b0a-bb0d-2457becd6aec\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:76.69903%;height:15.37217%;opacity:1\">\n<div id=\"anim-13f5ef13-ae83-4e1a-99ed-5f076c7ba2e3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 2.1052631578947367% 2.1052631578947367% 2.1052631578947367% 2.1052631578947367%\" id=\"el-d4277d6e-81f5-405b-985d-5dd2c7465803\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Understanding Cyber Threats:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:59.06149%;width:76.69903%;height:40.45307%;opacity:1\">\n<div id=\"anim-add88218-f971-4b57-adeb-6df7ce217568\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 0.8% 0.8% 0.8% 0.8%\" id=\"el-3fd976ef-eb27-43c0-971e-fee4c2e44f0f\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15575553797468356% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Various malicious activities pose risks, including hacking, malware, phishing, and data breaches.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:21.0356%;width:72.81553%;height:32.36246%;opacity:1\">\n<div id=\"anim-ac0071b8-3112-4b7f-9252-c94abd28f50a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-04fba9c6-dbdf-41ab-bba3-2faa26a2fb73\">\n<div style=\"position:absolute;width:100.00001%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity.jpg\" alt=\"Cybersecurity\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity.jpg 600w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-300x200.jpg 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 33vh, 73vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"57aee4cd-3bc6-4e46-bdaf-39d991b56808\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-8435206b-a638-403a-bc5a-2b87d43ec1b1\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-0b55d305-9e65-4a92-9ce8-2c04da78bee1\",\"keyframes\":{\"transform\":[\"translate3d(-114.87342%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-58d7a25b-5aca-423f-b6bc-b6719100aa8a\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-10883c26-e342-41b7-a955-ce7195377e49\",\"keyframes\":{\"transform\":[\"translate3d(115.38461%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-cd0a567a-3a26-4f87-937c-8ff618faa6b3\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-e67e39bc-1ba8-4ed3-9d45-3a739f330156\",\"keyframes\":{\"transform\":[\"translate3d(0px, -216.31341%, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-b0a01164-e995-4419-998a-b732350fbf6b\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.40777%;top:-0.32362%;width:76.69903%;height:15.37217%;opacity:1\">\n<div id=\"anim-8435206b-a638-403a-bc5a-2b87d43ec1b1\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-0b55d305-9e65-4a92-9ce8-2c04da78bee1\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(-114.87342%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 2.1052631578947367% 2.1052631578947367% 2.1052631578947367% 2.1052631578947367%\" id=\"el-8db74724-d8b1-4aa4-a4a0-6fa59cc3ea5c\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Importance of Cyber Security:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:12.62136%;top:59.54693%;width:75.72816%;height:40.45307%;opacity:1\">\n<div id=\"anim-58d7a25b-5aca-423f-b6bc-b6719100aa8a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-10883c26-e342-41b7-a955-ce7195377e49\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.38461%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.641025641025641% 0.641025641025641% 0.641025641025641% 0.641025641025641% \/ 0.8% 0.8% 0.8% 0.8%\" id=\"el-5ea8c428-765b-4f1b-bd9c-aaf895198a6e\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15775240384615385% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Effective measures protect sensitive data, personal information, and critical infrastructure.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:9.70874%;top:23.30097%;width:80.09709%;height:27.99353%;opacity:1\">\n<div id=\"anim-cd0a567a-3a26-4f87-937c-8ff618faa6b3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-e67e39bc-1ba8-4ed3-9d45-3a739f330156\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(0px, -216.31341%, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-be380664-5ae4-407c-928c-7e962d19b9de\">\n<div style=\"position:absolute;width:100%;height:100.1445%;left:0%;top:-0.07225%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security.jpg\" alt=\"importance of cyber security\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security.jpg 1200w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-1060x557.jpg 1060w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-768x403.jpg 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-300x158.jpg 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-150x79.jpg 150w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"838f2ab9-531e-464a-9071-b734463eab13\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-b50bc9a9-858d-4007-a97f-187fb2c38e84\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-e863442e-d2e5-473d-af3c-0da67a716598\",\"keyframes\":{\"transform\":[\"translate3d(-115.53399%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-ec0c4a4f-c0dd-41a8-b2b3-fdd5c8fb6309\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-07f4a1db-b576-4197-b863-c4b9f2b4d3f1\",\"keyframes\":{\"transform\":[\"translate3d(115.38461%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-8ad19947-7a8f-49ff-a832-b6dc8d43b66a\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-22954feb-0bdf-42e4-afd9-224769f7aa97\",\"keyframes\":{\"transform\":[\"translate3d(0px, 322.08668%, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-9db7d6f2-a9e9-4248-bf9b-3f2b8c90f3b2\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:75%;height:15.37217%;opacity:1\">\n<div id=\"anim-b50bc9a9-858d-4007-a97f-187fb2c38e84\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-e863442e-d2e5-473d-af3c-0da67a716598\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(-115.53399%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6472491909385114% 0.6472491909385114% 0.6472491909385114% 0.6472491909385114% \/ 2.1052631578947367% 2.1052631578947367% 2.1052631578947367% 2.1052631578947367%\" id=\"el-7bf7e7c4-c239-495e-888d-851bbbf02764\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1820388349514563% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Cyber Security Measures:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:12.62136%;top:58.89968%;width:75.72816%;height:40.45307%;opacity:1\">\n<div id=\"anim-ec0c4a4f-c0dd-41a8-b2b3-fdd5c8fb6309\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-07f4a1db-b576-4197-b863-c4b9f2b4d3f1\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.38461%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.641025641025641% 0.641025641025641% 0.641025641025641% 0.641025641025641% \/ 0.8% 0.8% 0.8% 0.8%\" id=\"el-c37ddfad-74b2-4c54-a5c3-f5b1a37deb86\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15775240384615385% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Implement strong passwords, update software, and educate users to prevent cyber attacks.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:10.43689%;top:23.78641%;width:80.09709%;height:26.53722%;opacity:1\">\n<div id=\"anim-8ad19947-7a8f-49ff-a832-b6dc8d43b66a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-22954feb-0bdf-42e4-afd9-224769f7aa97\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(0px, 322.08668%, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-10aa3294-44f7-402c-85a2-f3a55f75fb59\">\n<div style=\"position:absolute;width:100%;height:100.08737%;left:0%;top:-0.04369%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures.png\" alt=\"cyber security measures\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures.png 963w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-768x382.png 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-300x149.png 300w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"16173de3-8c3d-42bd-8e84-753084d83325\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-2e70946b-b747-41f9-8495-212e0db08291\",\"keyframes\":{\"transform\":[\"scale(1)\",\"scale(1.5)\",\"scale(0.95)\",\"scale(1)\"],\"offset\":[0,0.33,0.66,1]},\"delay\":0,\"duration\":1450,\"easing\":\"ease-in-out\",\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-4c4eb90f-0bcc-4295-a3b3-632e8f0033d2\",\"keyframes\":{\"transform\":[\"scale(1)\",\"scale(1.5)\",\"scale(0.95)\",\"scale(1)\"],\"offset\":[0,0.33,0.66,1]},\"delay\":0,\"duration\":1450,\"easing\":\"ease-in-out\",\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-43530326-9315-4512-aab4-4afc8f6ddcad\",\"keyframes\":{\"transform\":[\"translate3d(-114.54546%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":1000,\"easing\":\"cubic-bezier(.2, 0, .8, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-5e6c5103-6f10-4bb3-9109-1ff871709cb9\",\"keyframes\":{\"transform\":[\"rotateZ(-180deg)\",\"rotateZ(0deg)\"]},\"delay\":0,\"duration\":1000,\"easing\":\"cubic-bezier(.2, 0, .5, 1)\",\"fill\":\"forwards\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e14e776c-3c8f-44a0-a075-e2a178138ca6\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:-0.80906%;width:76.69903%;height:15.37217%;opacity:1\">\n<div id=\"anim-2e70946b-b747-41f9-8495-212e0db08291\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 2.1052631578947367% 2.1052631578947367% 2.1052631578947367% 2.1052631578947367%\" id=\"el-1b5aa746-cc74-4437-8b0c-d442d29960e4\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Advanced Technologies<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:58.73786%;width:75.72816%;height:40.45307%;opacity:1\">\n<div id=\"anim-4c4eb90f-0bcc-4295-a3b3-632e8f0033d2\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.641025641025641% 0.641025641025641% 0.641025641025641% 0.641025641025641% \/ 0.8% 0.8% 0.8% 0.8%\" id=\"el-b52a60ec-57ad-4a12-bf39-4f1b8df86d99\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15775240384615385% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Encryption, intrusion detection, and AI enhance security and threat detection capabilities.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:18.93204%;width:80.09709%;height:35.43689%;opacity:1\">\n<div id=\"anim-43530326-9315-4512-aab4-4afc8f6ddcad\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(-114.54546%, 0px, 0)\">\n<div id=\"anim-5e6c5103-6f10-4bb3-9109-1ff871709cb9\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:rotateZ(-180deg)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0666b6ac-84f3-425f-b6f2-9c8f9da3ad24\">\n<div style=\"position:absolute;width:100.083%;height:100%;left:-0.0415%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology.jpg\" alt=\"advanced technology\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology.jpg 1024w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-768x509.jpg 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-300x199.jpg 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-150x99.jpg 150w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"ffc1b864-8e33-461b-8aee-364607026297\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-900b93b1-d818-4c05-bb48-ac05c127ceab\",\"keyframes\":{\"transform\":[\"scale(1)\",\"scale(1.5)\",\"scale(0.95)\",\"scale(1)\"],\"offset\":[0,0.33,0.66,1]},\"delay\":0,\"duration\":1450,\"easing\":\"ease-in-out\",\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-3eb65375-2002-4473-b1b5-2d9aa8da07c4\",\"keyframes\":{\"transform\":[\"scale(1)\",\"scale(1.5)\",\"scale(0.95)\",\"scale(1)\"],\"offset\":[0,0.33,0.66,1]},\"delay\":0,\"duration\":1450,\"easing\":\"ease-in-out\",\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-1b373d83-8414-493a-84ee-7b0b95fa1bcd\",\"keyframes\":{\"transform\":[\"translate3d(110.30302%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":1000,\"easing\":\"cubic-bezier(.2, 0, .8, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-29c6b61d-1e67-4bee-87ff-1faf29e1bc5a\",\"keyframes\":{\"transform\":[\"rotateZ(180deg)\",\"rotateZ(0deg)\"]},\"delay\":0,\"duration\":1000,\"easing\":\"cubic-bezier(.2, 0, .5, 1)\",\"fill\":\"forwards\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-eab70415-f274-4100-b00f-309adc29a7c9\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:-0.80906%;width:76.69903%;height:23.13916%;opacity:1\">\n<div id=\"anim-900b93b1-d818-4c05-bb48-ac05c127ceab\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-0d1df93e-1f57-4636-b6d9-34d923247559\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Collaboration and Information Sharing:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:72.49191%;width:77.42718%;height:27.02265%;opacity:1\">\n<div id=\"anim-3eb65375-2002-4473-b1b5-2d9aa8da07c4\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6269592476489028% 0.6269592476489028% 0.6269592476489028% 0.6269592476489028% \/ 1.1976047904191618% 1.1976047904191618% 1.1976047904191618% 1.1976047904191618%\" id=\"el-43165a73-23e0-438d-a880-90c85bf728e5\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15429075235109718% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Foster partnerships and forums to share threat intelligence and best practices.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:28.47896%;width:80.09709%;height:37.86408%;opacity:1\">\n<div id=\"anim-1b373d83-8414-493a-84ee-7b0b95fa1bcd\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(110.30302%, 0px, 0)\">\n<div id=\"anim-29c6b61d-1e67-4bee-87ff-1faf29e1bc5a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:rotateZ(180deg)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-472c5486-c80c-407c-83ba-0a8304284135\">\n<div style=\"position:absolute;width:100%;height:100.26579%;left:0%;top:-0.13289%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and.jpg\" alt=\"secure-communication-for-collaboration-and-information-communication-and\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and.jpg 820w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-768x546.jpg 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-300x213.jpg 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-150x107.jpg 150w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"0ffbda94-e9b8-4366-8c25-2d91644fcd16\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-320edd13-720d-44c2-a6b8-f45b99beb784\",\"keyframes\":[{\"offset\":0,\"transform\":\"translate3d(0, -251.90366%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.29,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.45,\"transform\":\"translate3d(0, -70.835309192%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.61,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.71,\"transform\":\"translate3d(0, -24.081989896%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.8,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.85,\"transform\":\"translate3d(0, -9.043341394%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.92,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.96,\"transform\":\"translate3d(0, -3.929697096%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":1,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"}],\"delay\":0,\"duration\":600,\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-c00af559-ddc3-4f58-82cd-491c9443cb95\",\"keyframes\":[{\"offset\":0,\"transform\":\"translate3d(0, -403.12712%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.29,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.45,\"transform\":\"translate3d(0, -113.359346144%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.61,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.71,\"transform\":\"translate3d(0, -38.538952672%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.8,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.85,\"transform\":\"translate3d(0, -14.472263608%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":0.92,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"},{\"offset\":0.96,\"transform\":\"translate3d(0, -6.288783071999999%, 0)\",\"easing\":\"cubic-bezier(.5, 0, 1, 1)\"},{\"offset\":1,\"transform\":\"translate3d(0, 0%, 0)\",\"easing\":\"cubic-bezier(0, 0, .5, 1)\"}],\"delay\":0,\"duration\":600,\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-fec795aa-b3a4-4c0b-a91e-4661814e6a34\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:76.69903%;height:23.13916%;opacity:1\">\n<div id=\"anim-320edd13-720d-44c2-a6b8-f45b99beb784\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(0, -251.90366%, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 1.3986013986013985% 1.3986013986013985% 1.3986013986013985% 1.3986013986013985%\" id=\"el-e5794505-f0da-4e0a-aa67-745923812a0c\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.17800632911392406% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Continuous Monitoring and Improvement:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:72.65372%;width:76.69903%;height:27.02265%;opacity:1\">\n<div id=\"anim-c00af559-ddc3-4f58-82cd-491c9443cb95\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(0, -403.12712%, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 1.1976047904191618% 1.1976047904191618% 1.1976047904191618% 1.1976047904191618%\" id=\"el-6500903d-0296-473d-aaa7-05f9e8fb1afc\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.15575553797468356% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Regularly assess and adapt security strategies to evolving threats.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:-66.74757%;top:27.83172%;width:166.74757%;height:39.96764%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-48d08a5a-2958-4ce0-a22f-0e29d8fe7814\">\n<div style=\"position:absolute;width:100%;height:131.99752%;left:0%;top:-15.99876%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring.png\" alt=\"Continuous security monitoring\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring.png 1180w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-1060x503.png 1060w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-768x364.png 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-300x142.png 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-150x71.png 150w\" sizes=\"(min-width: 1024px) 75vh, 167vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"3cfa9a06-4e22-48a6-bbae-387ac8663270\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-d5f5f8b1-47fe-444f-b8fb-73d1f909cf50\",\"keyframes\":{\"transform\":[\"rotate(-540deg) scale(0.1)\",\"none\"],\"opacity\":[0,1]},\"delay\":0,\"duration\":1000,\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-fc2731ea-6a1e-4ca0-9f70-e5f7401c5413\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(.3,0,.55,1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-fcc9dedc-a4e9-4162-b1d8-42977b98008d\",\"keyframes\":{\"transform\":[\"scale(0.3333333333333333)\",\"scale(1)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(.3,0,.55,1)\",\"fill\":\"forwards\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-e46f2660-f86e-422b-857b-47e11db407b6\",\"keyframes\":{\"transform\":[\"rotate(-540deg) scale(0.1)\",\"none\"],\"opacity\":[0,1]},\"delay\":0,\"duration\":1000,\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-a1d32f5a-4640-42b7-bb99-115494b9dad0\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:6.6343%;width:73.30097%;height:7.60518%;opacity:1\">\n<div id=\"anim-d5f5f8b1-47fe-444f-b8fb-73d1f909cf50\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:rotate(-540deg) scale(0.1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6622516556291391% 0.6622516556291391% 0.6622516556291391% 0.6622516556291391% \/ 4.25531914893617% 4.25531914893617% 4.25531914893617% 4.25531914893617%\" id=\"el-673f586d-def6-4018-91a0-dc5ff54be638\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.18625827814569537% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.647249em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Conclusion:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:12.86408%;top:66.34304%;width:74.27184%;height:33.65696%;opacity:1\">\n<div id=\"anim-e46f2660-f86e-422b-857b-47e11db407b6\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:rotate(-540deg) scale(0.1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6535947712418301% 0.6535947712418301% 0.6535947712418301% 0.6535947712418301% \/ 0.9615384615384616% 0.9615384615384616% 0.9615384615384616% 0.9615384615384616%\" id=\"el-57660f62-6549-4c78-952b-0d075daa59a7\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1608455882352941% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.566343em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Prioritizing cyber security ensures a safer and more resilient digital future.<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:20.71197%;width:78.39806%;height:42.23301%;opacity:1\">\n<div id=\"anim-fc2731ea-6a1e-4ca0-9f70-e5f7401c5413\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-fcc9dedc-a4e9-4162-b1d8-42977b98008d\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(0.3333333333333333)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-227b1920-c9c8-4a04-9915-02d9e5a52528\">\n<div style=\"position:absolute;width:141.91869%;height:100%;left:-20.95934%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity.jpg\" alt=\"future-of-cybersecurity\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity.jpg 1600w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-1536x875.jpg 1536w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-1060x604.jpg 1060w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-768x437.jpg 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-300x171.jpg 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-150x85.jpg 150w\" sizes=\"(min-width: 1024px) 35vh, 78vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"4b750bae-14b4-4105-a9cf-b2c7b8dd7c27\" auto-advance-after=\"5s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-06ea16f0-388f-4dd6-97e6-5863cb2e085a\",\"keyframes\":{\"transform\":[\"rotate(-540deg) scale(0.1)\",\"none\"],\"opacity\":[0,1]},\"delay\":0,\"duration\":1000,\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-33804e9b-8836-4ff6-bd5a-12b5061ff0f7\",\"keyframes\":{\"transform\":[\"scale(1)\",\"scale(1.5)\",\"scale(0.95)\",\"scale(1)\"],\"offset\":[0,0.33,0.66,1]},\"delay\":0,\"duration\":1450,\"easing\":\"ease-in-out\",\"fill\":\"both\",\"iterations\":1}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-ba925947-7406-411b-9965-a9cb3c5c68ce\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:11.48867%;width:76.69903%;height:19.25566%;opacity:1\">\n<div id=\"anim-33804e9b-8836-4ff6-bd5a-12b5061ff0f7\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:scale(1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 1.680672268907563% 1.680672268907563% 1.680672268907563% 1.680672268907563%\" id=\"el-af1af5dc-5425-4700-a6b4-3e7167b56fa1\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.22250791139240508% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.809061em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">For More Query:<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:9.46602%;top:50%;width:80.33981%;height:38.02589%;opacity:1\">\n<div id=\"anim-06ea16f0-388f-4dd6-97e6-5863cb2e085a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:rotate(-540deg) scale(0.1)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-804f2264-f653-4ff2-959e-9aecfd900bdc\"><a href=\"https:\/\/hashstudioz.com\/contact.html?utm_source=YS&amp;utm_medium=YS&amp;utm_campaign=YS\" data-tooltip-icon=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2023\/11\/cropped-logo-1.png\" data-tooltip-text=\"Contact Us - HashStudioz Technologies\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:106.63182%;height:100%;left:-3.31591%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us.png\" alt=\"contact us\" srcSet=\"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us.png 1173w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-1060x706.png 1060w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-768x511.png 768w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-300x200.png 300w,http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-150x100.png 150w\" sizes=\"(min-width: 1024px) 36vh, 80vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Learn why cyber security is crucial for our digital future. Explore threats, measures, and collaboration for a safer online world.&#8221;<\/p>\n","protected":false},"author":16,"featured_media":7228,"template":"","meta":{"_eb_attr":"","web_stories_publisher_logo":4811,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-7215","web-story","type-web-story","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Future with Cyber Security Measures - HashStudioz Technologies<\/title>\n<meta name=\"description\" content=\"&quot;Learn why cyber security is crucial for our digital future. Explore threats, measures, and collaboration for a safer online world.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Future with Cyber Security Measures - HashStudioz Technologies\" \/>\n<meta property=\"og:description\" content=\"&quot;Learn why cyber security is crucial for our digital future. Explore threats, measures, and collaboration for a safer online world.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hashstudioz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-01T12:07:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@hashstudioz\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/\"},\"author\":{\"name\":\"Yatin Sapra\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#\\\/schema\\\/person\\\/157605f89a90b6e451a9959856644879\"},\"headline\":\"Securing the Future with Cyber Security Measures\",\"datePublished\":\"2024-04-01T12:07:09+00:00\",\"dateModified\":\"2024-04-01T12:07:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/\"},\"wordCount\":130,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cropped-Cybersecurity-_18723400af9_medium.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/\",\"name\":\"Securing the Future with Cyber Security Measures - HashStudioz Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cropped-Cybersecurity-_18723400af9_medium.jpg\",\"datePublished\":\"2024-04-01T12:07:09+00:00\",\"dateModified\":\"2024-04-01T12:07:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cropped-Cybersecurity-_18723400af9_medium.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cropped-Cybersecurity-_18723400af9_medium.jpg\",\"width\":640,\"height\":853,\"caption\":\"Cybersecurity-_18723400af9_medium\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/web-stories\\\/securing-the-future-with-cyber-security-measures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Future with Cyber Security Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/\",\"name\":\"HashStudioz Technologies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#organization\",\"name\":\"HashStudioz Technologies\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/logo-1.png\",\"contentUrl\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/logo-1.png\",\"width\":1709,\"height\":365,\"caption\":\"HashStudioz Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hashstudioz\\\/\",\"https:\\\/\\\/x.com\\\/hashstudioz\",\"https:\\\/\\\/www.instagram.com\\\/hashstudioz\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/hashstudioz\",\"https:\\\/\\\/in.pinterest.com\\\/hashstudioz\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/#\\\/schema\\\/person\\\/157605f89a90b6e451a9959856644879\",\"name\":\"Yatin Sapra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&r=g\",\"caption\":\"Yatin Sapra\"},\"description\":\"Yatin is a highly skilled digital transformation consultant and a passionate tech blogger. With a deep understanding of both the strategic and technical aspects of digital transformation, Yatin empowers businesses to navigate the digital landscape with confidence and drive meaningful change.\",\"url\":\"https:\\\/\\\/www.hashstudioz.com\\\/blog\\\/author\\\/yatin-sapra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Future with Cyber Security Measures - HashStudioz Technologies","description":"\"Learn why cyber security is crucial for our digital future. Explore threats, measures, and collaboration for a safer online world.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Future with Cyber Security Measures - HashStudioz Technologies","og_description":"\"Learn why cyber security is crucial for our digital future. Explore threats, measures, and collaboration for a safer online world.\"","og_url":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/","article_publisher":"https:\/\/www.facebook.com\/hashstudioz\/","article_modified_time":"2024-04-01T12:07:11+00:00","og_image":[{"width":640,"height":853,"url":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@hashstudioz","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#article","isPartOf":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/"},"author":{"name":"Yatin Sapra","@id":"https:\/\/www.hashstudioz.com\/blog\/#\/schema\/person\/157605f89a90b6e451a9959856644879"},"headline":"Securing the Future with Cyber Security Measures","datePublished":"2024-04-01T12:07:09+00:00","dateModified":"2024-04-01T12:07:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/"},"wordCount":130,"publisher":{"@id":"https:\/\/www.hashstudioz.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/","url":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/","name":"Securing the Future with Cyber Security Measures - HashStudioz Technologies","isPartOf":{"@id":"https:\/\/www.hashstudioz.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#primaryimage"},"image":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","datePublished":"2024-04-01T12:07:09+00:00","dateModified":"2024-04-01T12:07:11+00:00","breadcrumb":{"@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#primaryimage","url":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","contentUrl":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","width":640,"height":853,"caption":"Cybersecurity-_18723400af9_medium"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hashstudioz.com\/blog\/web-stories\/securing-the-future-with-cyber-security-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hashstudioz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing the Future with Cyber Security Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.hashstudioz.com\/blog\/#website","url":"https:\/\/www.hashstudioz.com\/blog\/","name":"HashStudioz Technologies","description":"","publisher":{"@id":"https:\/\/www.hashstudioz.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hashstudioz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hashstudioz.com\/blog\/#organization","name":"HashStudioz Technologies","url":"https:\/\/www.hashstudioz.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hashstudioz.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2020\/02\/logo-1.png","contentUrl":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2020\/02\/logo-1.png","width":1709,"height":365,"caption":"HashStudioz Technologies"},"image":{"@id":"https:\/\/www.hashstudioz.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hashstudioz\/","https:\/\/x.com\/hashstudioz","https:\/\/www.instagram.com\/hashstudioz\/","https:\/\/www.linkedin.com\/company\/hashstudioz","https:\/\/in.pinterest.com\/hashstudioz\/"]},{"@type":"Person","@id":"https:\/\/www.hashstudioz.com\/blog\/#\/schema\/person\/157605f89a90b6e451a9959856644879","name":"Yatin Sapra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&r=g","caption":"Yatin Sapra"},"description":"Yatin is a highly skilled digital transformation consultant and a passionate tech blogger. With a deep understanding of both the strategic and technical aspects of digital transformation, Yatin empowers businesses to navigate the digital landscape with confidence and drive meaningful change.","url":"https:\/\/www.hashstudioz.com\/blog\/author\/yatin-sapra\/"}]}},"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":800,"height":412,"sizes":{"medium":{"file":"shutterstock_649992646-800x412-1-300x155.png","width":300,"height":155,"filesize":89151,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-300x155.png"},"thumbnail":{"file":"shutterstock_649992646-800x412-1-150x150.png","width":150,"height":150,"filesize":50687,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-150x150.png"},"medium_large":{"file":"shutterstock_649992646-800x412-1-768x396.png","width":768,"height":396,"filesize":524265,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-768x396.png"},"vmag-slider-thumb":{"file":"shutterstock_649992646-800x412-1-534x412.png","width":534,"height":412,"filesize":460721,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-534x412.png"},"vmag-horizontal-thumb":{"file":"shutterstock_649992646-800x412-1-535x261.png","width":535,"height":261,"filesize":257159,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-535x261.png"},"vmag-featured-thumb":{"file":"shutterstock_649992646-800x412-1-480x357.png","width":480,"height":357,"filesize":339045,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-480x357.png"},"vmag-vertical-slider-thumb":{"file":"shutterstock_649992646-800x412-1-500x412.png","width":500,"height":412,"filesize":434498,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-500x412.png"},"vmag-rectangle-thumb":{"file":"shutterstock_649992646-800x412-1-510x369.png","width":510,"height":369,"filesize":367699,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-510x369.png"},"vmag-small-thumb":{"file":"shutterstock_649992646-800x412-1-320x224.png","width":320,"height":224,"filesize":150093,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-320x224.png"},"web-stories-poster-portrait":{"file":"shutterstock_649992646-800x412-1-640x412.png","width":640,"height":412,"filesize":534408,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-640x412.png"},"web-stories-publisher-logo":{"file":"shutterstock_649992646-800x412-1-96x96.png","width":96,"height":96,"filesize":21411,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-96x96.png"},"web-stories-thumbnail":{"file":"shutterstock_649992646-800x412-1-150x77.png","width":150,"height":77,"filesize":22430,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1-150x77.png"},"full":{"file":"shutterstock_649992646-800x412-1.png","width":800,"height":412,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#c5afa0","blurHash":"UMBfz{9G0f~UIUWB%MWCI@xaslIos:RjkAoz","creationDate":1711968319000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/shutterstock_649992646-800x412-1.png","id":7217,"alt":"cyber security","local":false},"type":"image","x":-75,"y":-62,"width":542,"height":762,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"c3881f76-281d-4054-bd30-a57f5392aff2","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":50,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">Securing the Future with Cyber Security Measures<\/span>","x":17,"y":20,"width":395,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":239,"id":"826da4b8-6d6f-4b37-bf77-2571f9284c4a"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"13c239ea-30d3-4d10-936f-27fb6d346d0b","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"ee9cbdf0-208a-48dd-87e1-5943066be9c4"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"16c3957b-df67-426a-a0a3-464c11a634cd"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":50,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #590d22\">Cyber security is essential for safeguarding our digital future.<\/span>","x":48,"y":130,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":359,"id":"d217edd3-add7-480e-886c-79154ec38282"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"6472aa21-537c-4df6-9d58-3eaf70ca1109","animations":[{"id":"ba9c5da6-1e6a-414d-94ad-daecd502200e","type":"effect-drop","duration":600,"delay":0,"targets":["d217edd3-add7-480e-886c-79154ec38282"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"12a0f2b3-e981-4b0a-bb0d-2457becd6aec"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Understanding Cyber Threats:<\/span>","x":48,"y":0,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":95,"id":"d4277d6e-81f5-405b-985d-5dd2c7465803"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Various malicious activities pose risks, including hacking, malware, phishing, and data breaches.<\/span>","x":48,"y":365,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":250,"id":"3fd976ef-eb27-43c0-971e-fee4c2e44f0f"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":600,"height":400,"sizes":{"medium":{"file":"Cybersecurity-300x200.jpg","width":300,"height":200,"filesize":13951,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-300x200.jpg"},"thumbnail":{"file":"Cybersecurity-150x150.jpg","width":150,"height":150,"filesize":7039,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-150x150.jpg"},"vmag-slider-thumb":{"file":"Cybersecurity-534x400.jpg","width":534,"height":400,"filesize":37778,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-534x400.jpg"},"vmag-horizontal-thumb":{"file":"Cybersecurity-535x261.jpg","width":535,"height":261,"filesize":27428,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-535x261.jpg"},"vmag-featured-thumb":{"file":"Cybersecurity-480x357.jpg","width":480,"height":357,"filesize":30032,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-480x357.jpg"},"vmag-vertical-slider-thumb":{"file":"Cybersecurity-500x400.jpg","width":500,"height":400,"filesize":36912,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-500x400.jpg"},"vmag-rectangle-thumb":{"file":"Cybersecurity-510x369.jpg","width":510,"height":369,"filesize":31971,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-510x369.jpg"},"vmag-small-thumb":{"file":"Cybersecurity-320x224.jpg","width":320,"height":224,"filesize":15684,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-320x224.jpg"},"web-stories-publisher-logo":{"file":"Cybersecurity-96x96.jpg","width":96,"height":96,"filesize":3601,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-96x96.jpg"},"web-stories-thumbnail":{"file":"Cybersecurity-150x100.jpg","width":150,"height":100,"filesize":4903,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity-150x100.jpg"},"full":{"file":"Cybersecurity.jpg","width":600,"height":400,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#081823","blurHash":"UA5Y]BpyVrVYcuk@V@eTDiWVjsR4WAbFofjE","creationDate":1711972171000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/Cybersecurity.jpg","id":7224,"alt":"Cybersecurity","local":false},"type":"image","x":56,"y":130,"width":300,"height":200,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"04fba9c6-dbdf-41ab-bba3-2faa26a2fb73"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"8f6dd6e9-8e16-44f8-ba89-d8b33a77e8f8","animations":[{"id":"feb5cd2c-f1bf-40c0-bca2-40c98c8ff929","type":"effect-fade-in","duration":600,"delay":0,"targets":["d4277d6e-81f5-405b-985d-5dd2c7465803"]},{"id":"8a72552e-13c3-413a-99f6-997571783c00","type":"effect-fade-in","duration":600,"delay":0,"targets":["3fd976ef-eb27-43c0-971e-fee4c2e44f0f"]},{"id":"a318d6a6-a8a9-449c-9ab7-57a6471e588e","type":"effect-fade-in","duration":600,"delay":0,"targets":["04fba9c6-dbdf-41ab-bba3-2faa26a2fb73"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b0a01164-e995-4419-998a-b732350fbf6b"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Importance of Cyber Security:<\/span>","x":47,"y":-2,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":95,"id":"8db74724-d8b1-4aa4-a4a0-6fa59cc3ea5c"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Effective measures protect sensitive data, personal information, and critical infrastructure.<\/span>","x":52,"y":368,"width":312,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":250,"id":"5ea8c428-765b-4f1b-bd9c-aaf895198a6e"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1200,"height":630,"sizes":{"medium":{"file":"importance-of-cyber-security-300x158.jpg","width":300,"height":158,"filesize":8665,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-300x158.jpg"},"large":{"file":"importance-of-cyber-security-1060x557.jpg","width":1060,"height":557,"filesize":46898,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-1060x557.jpg"},"thumbnail":{"file":"importance-of-cyber-security-150x150.jpg","width":150,"height":150,"filesize":5294,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-150x150.jpg"},"medium_large":{"file":"importance-of-cyber-security-768x403.jpg","width":768,"height":403,"filesize":30173,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-768x403.jpg"},"vmag-slider-thumb":{"file":"importance-of-cyber-security-534x464.jpg","width":534,"height":464,"filesize":25547,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-534x464.jpg"},"vmag-horizontal-thumb":{"file":"importance-of-cyber-security-535x261.jpg","width":535,"height":261,"filesize":18785,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-535x261.jpg"},"vmag-featured-thumb":{"file":"importance-of-cyber-security-480x357.jpg","width":480,"height":357,"filesize":21470,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-480x357.jpg"},"vmag-vertical-slider-thumb":{"file":"importance-of-cyber-security-500x575.jpg","width":500,"height":575,"filesize":23188,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-500x575.jpg"},"vmag-rectangle-thumb":{"file":"importance-of-cyber-security-510x369.jpg","width":510,"height":369,"filesize":22783,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-510x369.jpg"},"vmag-small-thumb":{"file":"importance-of-cyber-security-320x224.jpg","width":320,"height":224,"filesize":12333,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-320x224.jpg"},"web-stories-poster-portrait":{"file":"importance-of-cyber-security-640x630.jpg","width":640,"height":630,"filesize":33860,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-640x630.jpg"},"web-stories-publisher-logo":{"file":"importance-of-cyber-security-96x96.jpg","width":96,"height":96,"filesize":2921,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-96x96.jpg"},"web-stories-thumbnail":{"file":"importance-of-cyber-security-150x79.jpg","width":150,"height":79,"filesize":3371,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security-150x79.jpg"},"full":{"file":"importance-of-cyber-security.jpg","width":1200,"height":630,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#e8ddea","blurHash":"UNP~?0S2-B-;~pMyJ7Rjo4$*NGNGS1Nb$*xa","creationDate":1711972081000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/importance-of-cyber-security.jpg","id":7223,"alt":"importance of cyber security","local":false},"type":"image","x":40,"y":144,"width":330,"height":173,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"be380664-5ae4-407c-928c-7e962d19b9de"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"57aee4cd-3bc6-4e46-bdaf-39d991b56808","animations":[{"id":"28ec0a02-303b-4637-9fb4-2b8201a48105","type":"effect-fly-in","flyInDir":"leftToRight","duration":600,"delay":0,"targets":["8db74724-d8b1-4aa4-a4a0-6fa59cc3ea5c"]},{"id":"c64a6aa3-d384-4113-9cf7-24752a2e75f8","type":"effect-fly-in","flyInDir":"rightToLeft","duration":600,"delay":0,"targets":["5ea8c428-765b-4f1b-bd9c-aaf895198a6e"]},{"id":"4cdf1cdf-0c17-4b07-9f19-8f8455c5f845","type":"effect-fly-in","flyInDir":"topToBottom","duration":600,"delay":0,"targets":["be380664-5ae4-407c-928c-7e962d19b9de"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"9db7d6f2-a9e9-4248-bf9b-3f2b8c90f3b2"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Cyber Security Measures:<\/span>","x":48,"y":0,"width":309,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":95,"id":"7bf7e7c4-c239-495e-888d-851bbbf02764","marginOffset":0.7875000000000014},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Implement strong passwords, update software, and educate users to prevent cyber attacks.<\/span>","x":52,"y":364,"width":312,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":250,"id":"c37ddfad-74b2-4c54-a5c3-f5b1a37deb86"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":963,"height":479,"sizes":{"medium":{"file":"cyber-security-measures-300x149.png","width":300,"height":149,"filesize":81682,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-300x149.png"},"thumbnail":{"file":"cyber-security-measures-150x150.png","width":150,"height":150,"filesize":46082,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-150x150.png"},"medium_large":{"file":"cyber-security-measures-768x382.png","width":768,"height":382,"filesize":396331,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-768x382.png"},"vmag-slider-thumb":{"file":"cyber-security-measures-534x464.png","width":534,"height":464,"filesize":357417,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-534x464.png"},"vmag-horizontal-thumb":{"file":"cyber-security-measures-535x261.png","width":535,"height":261,"filesize":218397,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-535x261.png"},"vmag-featured-thumb":{"file":"cyber-security-measures-480x357.png","width":480,"height":357,"filesize":265422,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-480x357.png"},"vmag-vertical-slider-thumb":{"file":"cyber-security-measures-500x479.png","width":500,"height":479,"filesize":344860,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-500x479.png"},"vmag-rectangle-thumb":{"file":"cyber-security-measures-510x369.png","width":510,"height":369,"filesize":286429,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-510x369.png"},"vmag-small-thumb":{"file":"cyber-security-measures-320x224.png","width":320,"height":224,"filesize":127212,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-320x224.png"},"web-stories-poster-portrait":{"file":"cyber-security-measures-640x479.png","width":640,"height":479,"filesize":423386,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-640x479.png"},"web-stories-publisher-logo":{"file":"cyber-security-measures-96x96.png","width":96,"height":96,"filesize":20835,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-96x96.png"},"web-stories-thumbnail":{"file":"cyber-security-measures-150x75.png","width":150,"height":75,"filesize":24285,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures-150x75.png"},"full":{"file":"cyber-security-measures.png","width":963,"height":479,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#2f6391","blurHash":"UZ8r,;o#MdV@cbbcjEoMMdoft7WXnNahW:kC","creationDate":1711971991000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/cyber-security-measures.png","id":7222,"alt":"cyber security measures","local":false},"type":"image","x":43,"y":147,"width":330,"height":164,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"10aa3294-44f7-402c-85a2-f3a55f75fb59"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"838f2ab9-531e-464a-9071-b734463eab13","animations":[{"id":"15d83b91-c055-4e77-863b-c489e2ac3e46","type":"effect-fly-in","flyInDir":"leftToRight","duration":600,"delay":0,"targets":["7bf7e7c4-c239-495e-888d-851bbbf02764"]},{"id":"25b2e3c3-774a-4574-8914-2ee5f59da5c5","type":"effect-fly-in","flyInDir":"rightToLeft","duration":600,"delay":0,"targets":["c37ddfad-74b2-4c54-a5c3-f5b1a37deb86"]},{"id":"673d00c1-b256-4c0e-b49c-a1838e80863f","type":"effect-fly-in","flyInDir":"bottomToTop","duration":600,"delay":0,"targets":["10aa3294-44f7-402c-85a2-f3a55f75fb59"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"e14e776c-3c8f-44a0-a075-e2a178138ca6"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Advanced Technologies<\/span>","x":48,"y":-5,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":95,"id":"1b5aa746-cc74-4437-8b0c-d442d29960e4"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Encryption, intrusion detection, and AI enhance security and threat detection capabilities.<\/span>","x":48,"y":363,"width":312,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":250,"id":"b52a60ec-57ad-4a12-bf39-4f1b8df86d99"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1024,"height":679,"sizes":{"medium":{"file":"advanced-technology-300x199.jpg","width":300,"height":199,"filesize":15316,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-300x199.jpg"},"thumbnail":{"file":"advanced-technology-150x150.jpg","width":150,"height":150,"filesize":7684,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-150x150.jpg"},"medium_large":{"file":"advanced-technology-768x509.jpg","width":768,"height":509,"filesize":63919,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-768x509.jpg"},"vmag-slider-thumb":{"file":"advanced-technology-534x464.jpg","width":534,"height":464,"filesize":46729,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-534x464.jpg"},"vmag-horizontal-thumb":{"file":"advanced-technology-535x261.jpg","width":535,"height":261,"filesize":28570,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-535x261.jpg"},"vmag-featured-thumb":{"file":"advanced-technology-480x357.jpg","width":480,"height":357,"filesize":34818,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-480x357.jpg"},"vmag-vertical-slider-thumb":{"file":"advanced-technology-500x575.jpg","width":500,"height":575,"filesize":49245,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-500x575.jpg"},"vmag-rectangle-thumb":{"file":"advanced-technology-510x369.jpg","width":510,"height":369,"filesize":37333,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-510x369.jpg"},"vmag-small-thumb":{"file":"advanced-technology-320x224.jpg","width":320,"height":224,"filesize":17700,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-320x224.jpg"},"vmag-single-large":{"file":"advanced-technology-1024x630.jpg","width":1024,"height":630,"filesize":95383,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-1024x630.jpg"},"web-stories-poster-portrait":{"file":"advanced-technology-640x679.jpg","width":640,"height":679,"filesize":70538,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-640x679.jpg"},"web-stories-publisher-logo":{"file":"advanced-technology-96x96.jpg","width":96,"height":96,"filesize":4004,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-96x96.jpg"},"web-stories-thumbnail":{"file":"advanced-technology-150x99.jpg","width":150,"height":99,"filesize":5667,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology-150x99.jpg"},"full":{"file":"advanced-technology.jpg","width":1024,"height":679,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#5d6f82","blurHash":"U9EDF^^h000L4TS6xas+00IqIAR+_N%MIAR*","creationDate":1711971826000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/advanced-technology.jpg","id":7221,"alt":"advanced technology","local":false},"type":"image","x":48,"y":117,"width":330,"height":219,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0666b6ac-84f3-425f-b6f2-9c8f9da3ad24"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"16173de3-8c3d-42bd-8e84-753084d83325","animations":[{"id":"d6a6da6a-a51b-4242-bdea-bb22fd7667b5","type":"effect-pulse","scale":0.5,"iterations":1,"duration":1450,"delay":0,"targets":["1b5aa746-cc74-4437-8b0c-d442d29960e4"]},{"id":"ae0fe9c0-5440-469f-b6b3-3fa46c155f88","type":"effect-pulse","scale":0.5,"iterations":1,"duration":1450,"delay":0,"targets":["b52a60ec-57ad-4a12-bf39-4f1b8df86d99"]},{"id":"5101789e-8b70-46a5-9ca2-51adec148ca9","type":"effect-rotate-in","rotateInDir":"leftToRight","duration":1000,"delay":0,"targets":["0666b6ac-84f3-425f-b6f2-9c8f9da3ad24"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"eab70415-f274-4100-b00f-309adc29a7c9"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Collaboration and Information Sharing:<\/span>","x":48,"y":-5,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":143,"id":"0d1df93e-1f57-4636-b6d9-34d923247559"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Foster partnerships and forums to share threat intelligence and best practices.<\/span>","x":48,"y":448,"width":319,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":167,"id":"43165a73-23e0-438d-a880-90c85bf728e5"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":820,"height":583,"sizes":{"medium":{"file":"secure-communication-for-collaboration-and-information-communication-and-300x213.jpg","width":300,"height":213,"filesize":10040,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-300x213.jpg"},"thumbnail":{"file":"secure-communication-for-collaboration-and-information-communication-and-150x150.jpg","width":150,"height":150,"filesize":6053,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-150x150.jpg"},"medium_large":{"file":"secure-communication-for-collaboration-and-information-communication-and-768x546.jpg","width":768,"height":546,"filesize":34147,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-768x546.jpg"},"vmag-slider-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-534x464.jpg","width":534,"height":464,"filesize":27174,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-534x464.jpg"},"vmag-horizontal-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-535x261.jpg","width":535,"height":261,"filesize":20209,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-535x261.jpg"},"vmag-featured-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-480x357.jpg","width":480,"height":357,"filesize":19875,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-480x357.jpg"},"vmag-vertical-slider-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-500x575.jpg","width":500,"height":575,"filesize":32805,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-500x575.jpg"},"vmag-rectangle-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-510x369.jpg","width":510,"height":369,"filesize":20926,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-510x369.jpg"},"vmag-small-thumb":{"file":"secure-communication-for-collaboration-and-information-communication-and-320x224.jpg","width":320,"height":224,"filesize":10997,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-320x224.jpg"},"web-stories-poster-portrait":{"file":"secure-communication-for-collaboration-and-information-communication-and-640x583.jpg","width":640,"height":583,"filesize":37870,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-640x583.jpg"},"web-stories-publisher-logo":{"file":"secure-communication-for-collaboration-and-information-communication-and-96x96.jpg","width":96,"height":96,"filesize":3382,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-96x96.jpg"},"web-stories-thumbnail":{"file":"secure-communication-for-collaboration-and-information-communication-and-150x107.jpg","width":150,"height":107,"filesize":4060,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and-150x107.jpg"},"full":{"file":"secure-communication-for-collaboration-and-information-communication-and.jpg","width":820,"height":583,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#f0f1f0","blurHash":"UOQcxKxa~WR*xaWBWBaz_2WB9at6RjkCt6ae","creationDate":1711971579000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/secure-communication-for-collaboration-and-information-communication-and.jpg","id":7220,"alt":"secure-communication-for-collaboration-and-information-communication-and","local":false},"type":"image","x":48,"y":176,"width":330,"height":234,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"472c5486-c80c-407c-83ba-0a8304284135"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"ffc1b864-8e33-461b-8aee-364607026297","animations":[{"id":"5dead24e-3520-425f-adc6-435b2ac7bccb","type":"effect-pulse","scale":0.5,"iterations":1,"duration":1450,"delay":0,"targets":["0d1df93e-1f57-4636-b6d9-34d923247559"]},{"id":"aa948a07-4d96-4167-99f0-ed9222f929d2","type":"effect-pulse","scale":0.5,"iterations":1,"duration":1450,"delay":0,"targets":["43165a73-23e0-438d-a880-90c85bf728e5"]},{"id":"f3d3e285-2026-4583-9af5-04da0e4e18c6","type":"effect-rotate-in","rotateInDir":"rightToLeft","duration":1000,"delay":0,"targets":["472c5486-c80c-407c-83ba-0a8304284135"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"fec795aa-b3a4-4c0b-a91e-4661814e6a34"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Continuous Monitoring and Improvement:<\/span>","x":48,"y":0,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":143,"id":"e5794505-f0da-4e0a-aa67-745923812a0c"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Regularly assess and adapt security strategies to evolving threats.<\/span>","x":48,"y":449,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":167,"id":"6500903d-0296-473d-aaa7-05f9e8fb1afc"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1180,"height":560,"sizes":{"medium":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-300x142.png","width":300,"height":142,"filesize":16488,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-300x142.png"},"large":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-1060x503.png","width":1060,"height":503,"filesize":81013,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-1060x503.png"},"thumbnail":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-150x150.png","width":150,"height":150,"filesize":8124,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-150x150.png"},"medium_large":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-768x364.png","width":768,"height":364,"filesize":53933,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-768x364.png"},"vmag-slider-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-534x464.png","width":534,"height":464,"filesize":34728,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-534x464.png"},"vmag-horizontal-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-535x261.png","width":535,"height":261,"filesize":35068,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-535x261.png"},"vmag-featured-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-480x357.png","width":480,"height":357,"filesize":31204,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-480x357.png"},"vmag-vertical-slider-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-500x560.png","width":500,"height":560,"filesize":26136,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-500x560.png"},"vmag-rectangle-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-510x369.png","width":510,"height":369,"filesize":34982,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-510x369.png"},"vmag-small-thumb":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-320x224.png","width":320,"height":224,"filesize":19399,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-320x224.png"},"web-stories-poster-portrait":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-640x560.png","width":640,"height":560,"filesize":32292,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-640x560.png"},"web-stories-publisher-logo":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-96x96.png","width":96,"height":96,"filesize":4947,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-96x96.png"},"web-stories-thumbnail":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-150x71.png","width":150,"height":71,"filesize":6810,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring-150x71.png"},"full":{"file":"60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring.png","width":1180,"height":560,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#e3f8fb","blurHash":"UFOqc.~p?b01t8M|jExt-;RkoJWBNI%M%MIV","creationDate":1711971363000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/60dbfdd56e7f4309a4b469ae_Continuous-security-monitoring.png","id":7219,"alt":"Continuous security monitoring","local":false},"type":"image","x":-275,"y":172,"width":687,"height":247,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"48d08a5a-2958-4ce0-a22f-0e29d8fe7814"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"0ffbda94-e9b8-4366-8c25-2d91644fcd16","animations":[{"id":"c62fbb6f-b193-42b0-9978-715b9697faf5","type":"effect-drop","duration":600,"delay":0,"targets":["e5794505-f0da-4e0a-aa67-745923812a0c"]},{"id":"34ac3090-3ad8-4964-97ae-dd145ce737cf","type":"effect-drop","duration":600,"delay":0,"targets":["6500903d-0296-473d-aaa7-05f9e8fb1afc"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"a1d32f5a-4640-42b7-bb99-115494b9dad0"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":40,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Conclusion:<\/span>","x":55,"y":41,"width":302,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":47,"id":"673f586d-def6-4018-91a0-dc5ff54be638"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":35,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Prioritizing cyber security ensures a safer and more resilient digital future.<\/span>","x":53,"y":410,"width":306,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":208,"id":"57660f62-6549-4c78-952b-0d075daa59a7"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1600,"height":911,"sizes":{"medium":{"file":"future-of-cybersecurity-300x171.jpg","width":300,"height":171,"filesize":9165,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-300x171.jpg"},"large":{"file":"future-of-cybersecurity-1060x604.jpg","width":1060,"height":604,"filesize":83020,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-1060x604.jpg"},"thumbnail":{"file":"future-of-cybersecurity-150x150.jpg","width":150,"height":150,"filesize":6334,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-150x150.jpg"},"medium_large":{"file":"future-of-cybersecurity-768x437.jpg","width":768,"height":437,"filesize":46677,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-768x437.jpg"},"1536x1536":{"file":"future-of-cybersecurity-1536x875.jpg","width":1536,"height":875,"filesize":153438,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-1536x875.jpg"},"vmag-slider-thumb":{"file":"future-of-cybersecurity-534x464.jpg","width":534,"height":464,"filesize":46144,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-534x464.jpg"},"vmag-horizontal-thumb":{"file":"future-of-cybersecurity-535x261.jpg","width":535,"height":261,"filesize":22966,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-535x261.jpg"},"vmag-featured-thumb":{"file":"future-of-cybersecurity-480x357.jpg","width":480,"height":357,"filesize":30678,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-480x357.jpg"},"vmag-vertical-slider-thumb":{"file":"future-of-cybersecurity-500x575.jpg","width":500,"height":575,"filesize":57235,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-500x575.jpg"},"vmag-rectangle-thumb":{"file":"future-of-cybersecurity-510x369.jpg","width":510,"height":369,"filesize":32630,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-510x369.jpg"},"vmag-small-thumb":{"file":"future-of-cybersecurity-320x224.jpg","width":320,"height":224,"filesize":13461,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-320x224.jpg"},"vmag-single-large":{"file":"future-of-cybersecurity-1200x630.jpg","width":1200,"height":630,"filesize":101004,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-1200x630.jpg"},"web-stories-poster-portrait":{"file":"future-of-cybersecurity-640x853.jpg","width":640,"height":853,"filesize":95990,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-640x853.jpg"},"web-stories-publisher-logo":{"file":"future-of-cybersecurity-96x96.jpg","width":96,"height":96,"filesize":3273,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-96x96.jpg"},"web-stories-thumbnail":{"file":"future-of-cybersecurity-150x85.jpg","width":150,"height":85,"filesize":3368,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity-150x85.jpg"},"full":{"file":"future-of-cybersecurity.jpg","width":1600,"height":911,"mimeType":"image\/jpeg","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#322523","blurHash":"U7AJl==w01s;.6%1ICIp01W?~oWADQNK?txX","creationDate":1711971232000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/future-of-cybersecurity.jpg","id":7218,"alt":"future-of-cybersecurity","local":false},"type":"image","x":48,"y":128,"width":323,"height":261,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"227b1920-c9c8-4a04-9915-02d9e5a52528"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"3cfa9a06-4e22-48a6-bbae-387ac8663270","animations":[{"id":"3c62a835-fe65-4aad-8e26-dd6406beb62e","type":"effect-twirl-in","duration":1000,"delay":0,"targets":["673f586d-def6-4018-91a0-dc5ff54be638"]},{"id":"6373d7ea-1a1e-4c74-bc85-5a9072b44a0a","type":"effect-zoom","scaleDirection":"scaleIn","duration":2000,"delay":0,"targets":["227b1920-c9c8-4a04-9915-02d9e5a52528"]},{"id":"5e77bc13-9afb-4531-9cd0-d94b46468430","type":"effect-twirl-in","duration":1000,"delay":0,"targets":["57660f62-6549-4c78-952b-0d075daa59a7"]}]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"ba925947-7406-411b-9965-a9cb3c5c68ce"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":50,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">For More Query:<\/span>","x":48,"y":71,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":119,"id":"af1af5dc-5425-4700-a6b4-3e7167b56fa1"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1173,"height":781,"sizes":{"medium":{"file":"contact-us-300x200.png","width":300,"height":200,"filesize":39416,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-300x200.png"},"large":{"file":"contact-us-1060x706.png","width":1060,"height":706,"filesize":282758,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-1060x706.png"},"thumbnail":{"file":"contact-us-150x150.png","width":150,"height":150,"filesize":21207,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-150x150.png"},"medium_large":{"file":"contact-us-768x511.png","width":768,"height":511,"filesize":172611,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-768x511.png"},"vmag-slider-thumb":{"file":"contact-us-534x464.png","width":534,"height":464,"filesize":137275,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-534x464.png"},"vmag-horizontal-thumb":{"file":"contact-us-535x261.png","width":535,"height":261,"filesize":94949,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-535x261.png"},"vmag-featured-thumb":{"file":"contact-us-480x357.png","width":480,"height":357,"filesize":96958,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-480x357.png"},"vmag-vertical-slider-thumb":{"file":"contact-us-500x575.png","width":500,"height":575,"filesize":160942,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-500x575.png"},"vmag-rectangle-thumb":{"file":"contact-us-510x369.png","width":510,"height":369,"filesize":102685,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-510x369.png"},"vmag-small-thumb":{"file":"contact-us-320x224.png","width":320,"height":224,"filesize":46936,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-320x224.png"},"vmag-single-large":{"file":"contact-us-1173x630.png","width":1173,"height":630,"filesize":343086,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-1173x630.png"},"web-stories-poster-portrait":{"file":"contact-us-640x781.png","width":640,"height":781,"filesize":262457,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-640x781.png"},"web-stories-publisher-logo":{"file":"contact-us-96x96.png","width":96,"height":96,"filesize":10941,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-96x96.png"},"web-stories-thumbnail":{"file":"contact-us-150x100.png","width":150,"height":100,"filesize":13701,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us-150x100.png"},"full":{"file":"contact-us.png","width":1173,"height":781,"mimeType":"image\/png","sourceUrl":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#222222","blurHash":"U36kVCj[00%M_3Rj9Fof00j[~qM{9Fxu?bM{","creationDate":1711972569000,"src":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2024\/04\/contact-us.png","id":7225,"alt":"contact us","local":false},"type":"image","x":39,"y":309,"width":331,"height":235,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"804f2264-f653-4ff2-959e-9aecfd900bdc","link":{"needsProxy":true,"url":"https:\/\/hashstudioz.com\/contact.html?utm_source=YS&utm_medium=YS&utm_campaign=YS","rel":[],"type":"regular","pageId":null,"icon":"http:\/\/localhost\/hashstudioz\/wp-content\/uploads\/2023\/11\/cropped-logo-1.png","desc":"Contact Us - HashStudioz Technologies"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"4b750bae-14b4-4105-a9cf-b2c7b8dd7c27","animations":[{"id":"72f30bb0-5524-40ec-84bf-b7e11238a0b1","type":"effect-twirl-in","duration":1000,"delay":0,"targets":["804f2264-f653-4ff2-959e-9aecfd900bdc"]},{"id":"85ad1a6e-a368-4528-aef8-a9b8a92316e9","type":"effect-pulse","scale":0.5,"iterations":1,"duration":1450,"delay":0,"targets":["af1af5dc-5425-4700-a6b4-3e7167b56fa1"]}]}],"fonts":{"Roboto":{"family":"Roboto","weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"fallbacks":["Helvetica Neue","Helvetica","sans-serif"],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":5,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":7228,"url":"https:\/\/www.hashstudioz.com\/blog\/wp-content\/uploads\/2024\/04\/cropped-Cybersecurity-_18723400af9_medium.jpg","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web-story\/7215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/users\/16"}],"version-history":[{"count":2,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web-story\/7215\/revisions"}],"predecessor-version":[{"id":7229,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web-story\/7215\/revisions\/7229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/media\/7228"}],"wp:attachment":[{"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/media?parent=7215"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web_story_category?post=7215"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web_story_tag?post=7215"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/web-story\/7215\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/www.hashstudioz.com\/blog\/wp-json\/web-stories\/v1\/media\/4811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}