{"id":8662,"date":"2014-08-05T09:00:38","date_gmt":"2014-08-05T01:00:38","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=8662"},"modified":"2014-08-06T11:13:36","modified_gmt":"2014-08-06T03:13:36","slug":"%e5%93%a1%e5%b7%a5%e9%80%a0%e6%88%90%e7%9a%84%e8%b3%87%e5%ae%89%e4%ba%8b%e4%bb%b6%e4%b8%a6%e6%9c%aa%e5%83%8f%e9%a7%ad%e5%ae%a2%e5%a8%81%e8%84%85%e9%82%a3%e6%a8%a3%e5%8f%97%e5%88%b0%e5%9a%b4%e6%a0%bc","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=8662","title":{"rendered":"\u54e1\u5de5\u9020\u6210\u7684\u8cc7\u5b89\u4e8b\u4ef6,\u4e26\u672a\u50cf\u99ed\u5ba2\u5a01\u8105\u90a3\u6a23\u53d7\u5230\u56b4\u683c\u91cd\u8996"},"content":{"rendered":"<blockquote><p>\u00a0<a href=\"https:\/\/www.continuitycentral.com\/news07229.html\">\u56db\u5bb6\u4f01\u696d\u7576\u4e2d\u5c31\u6709\u4e09\u5bb6<\/a>\u904e\u53bb 12 \u500b\u6708\u5167\u66fe\u7d93\u767c\u751f\u8cc7\u8a0a\u5b89\u5168\u4e8b\u4ef6\u3002\u4e00\u5bb6\u5178\u578b\u7684\u4f01\u696d\u5728\u904e\u53bb\u4e00\u5e74\u5e73\u5747\u906d\u9047 135 \u6b21\u8cc7\u5b89\u4e8b\u4ef6\uff0c\u9020\u6210\u5927\u7d04 415,000 \u7f8e\u5143\u7684\u91d1\u9322\u640d\u5931\u3002<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/05\/IT-SMB-Man.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-8282\" alt=\"\u4f01\u696d \u5546\u52d9 IT SMB Man\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/05\/IT-SMB-Man.jpg\" width=\"500\" height=\"500\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/05\/IT-SMB-Man.jpg 500w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/05\/IT-SMB-Man-150x150.jpg 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/05\/IT-SMB-Man-300x300.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<\/blockquote>\n<p><b>\u00a0<b>\u4eca\u65e5\u7db2\u8def\u5b89\u5168\u74b0\u5883\u6700\u5927\u7684\u5a01\u8105\u548c\u7b2c\u4e00\u8981\u52d9\u70ba\u4f55\uff1f<\/b><\/b><\/p>\n<p>\u7f8e\u570b\u4f01\u696d\u5df2\u9010\u6f38\u611f\u53d7\u5230\u8cc7\u6599\u5916\u6d29\u7684\u5f71\u97ff\u3002\u4e0d\u8ad6\u4ed6\u5011\u662f\u5426\u66fe\u70ba\u99ed\u5ba2\u5165\u4fb5\u7684\u53d7\u5bb3\u8005\uff0c\u6216\u662f\u5728\u96fb\u8996\u4e0a\u770b\u5230\u5176\u4ed6\u540c\u696d\u53d7\u5bb3\uff0c<a title=\"cyber crime research\" href=\"https:\/\/www.trendmicro.com\/us\/security-intelligence\/research-and-analysis\/index.html\" target=\"_blank\">\u7db2\u8def\u72af\u7f6a<\/a>\u5728\u4eca\u65e5\u7684\u5f71\u97ff\u529b\u4f3c\u4e4e\u4e0d\u5bb9\u5c0f\u89b7\u3002<\/p>\n<p>\u7136\u800c\uff0cPwC \u8207 CSO Magazine \u6240\u505a\u7684 <a title=\"\u7f8e\u570b\u7db2\u8def\u72af\u7f6a\u8abf\u67e5\u5831\u544a\" href=\"https:\/\/www.pwc.com\/en_US\/us\/increasing-it-effectiveness\/publications\/assets\/2014-us-state-of-cybercrime.pdf\" target=\"_blank\">2014 \u5e74\u7f8e\u570b\u7db2\u8def\u72af\u7f6a\u73fe\u6cc1\u8abf\u67e5<\/a> (2014 U.S. State of Cybercrime Survey) \u767c\u73fe\uff0c\u96a8\u8457\u5404\u9818\u57df\u7684\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u6578\u91cf\u6301\u7e8c\u6500\u5347\uff0c\u4f01\u696d\u6240\u63a1\u53d6\u7684\u8cc7\u8a0a\u9632\u8b77\u7b56\u7565\u537b\u5404\u4e0d\u76f8\u540c\u3002<\/p>\n<p>Continuity Central \u5f15\u8ff0\u8a72\u5831\u544a\u6307\u51fa\uff1a\u300c\u5118\u7ba1\u7db2\u8def\u72af\u7f6a\u4e8b\u4ef6\u7684\u6578\u91cf\u8207\u76f8\u95dc\u7684\u8ca1\u52d9\u640d\u5931\u6301\u7e8c\u5347\u9ad8\uff0c\u5927\u591a\u6578\u7684\u7f8e\u570b\u4f01\u696d\u5728\u7db2\u8def\u5b89\u5168\u9632\u8b77\u4e0a\u4f9d\u820a\u6bd4\u4e0d\u4e0a\u7db2\u8def\u99ed\u5ba2\u7684\u6bc5\u529b\u8207\u6280\u5de7\u300d\u3002<\/p>\n<p><b>\u7db2\u8def\u72af\u7f6a\u6982\u89c0<\/b><br \/>\n\u8a72\u8abf\u67e5\u767c\u73fe\u4e86\u591a\u9805\u9a5a\u4eba\u6578\u64da\uff0c\u63cf\u7e6a\u51fa\u4eca\u65e5\u7db2\u8def\u72af\u7f6a\u99ed\u4eba\u7684\u4e00\u9762\uff1a\u00a0<a href=\"https:\/\/www.continuitycentral.com\/news07229.html\">\u56db\u5bb6\u4f01\u696d\u7576\u4e2d\u5c31\u6709\u4e09\u5bb6<\/a>\u904e\u53bb 12 \u500b\u6708\u5167\u66fe\u7d93\u767c\u751f\u8cc7\u8a0a\u5b89\u5168\u4e8b\u4ef6\u3002\u4e00\u5bb6\u5178\u578b\u7684\u4f01\u696d\u5728\u904e\u53bb\u4e00\u5e74\u5e73\u5747\u906d\u9047 135 \u6b21\u8cc7\u5b89\u4e8b\u4ef6\uff0c\u9020\u6210\u5927\u7d04 415,000 \u7f8e\u5143\u7684\u91d1\u9322\u640d\u5931\u3002<\/p>\n<p>\u8a72\u8abf\u67e5\u767c\u73fe\uff0c14% \u7684\u53d7\u8a2a\u8005\u8868\u793a\u904e\u53bb\u4e00\u5e74\u66fe\u56e0\u653b\u64ca\u548c\u5165\u4fb5\u800c\u767c\u751f\u8ca1\u52d9\u640d\u5931\u3002\u4f46\u662f\uff0c\u7d93\u904e\u7814\u7a76\u4eba\u54e1\u4f30\u8a08\uff0c\u9019\u4e9b\u4e8b\u4ef6\u7684\u6210\u672c\u53ef\u80fd\u9060\u9ad8\u65bc\u6b64\uff0c\u56e0\u70ba\u66fe\u7d93\u906d\u9047\u8cc7\u5b89\u4e8b\u4ef6\u7684\u4f01\u696d\u6709 67% \u4e26\u7121\u6cd5\u4f30\u7b97\u76f8\u95dc\u7684\u8cbb\u7528\u3002<\/p>\n<p>\u7576\u524d\u7684\u7db2\u8def\u72af\u7f6a\u74b0\u5883\u5df2\u63d0\u9ad8\u4e86\u4f01\u696d\u7684\u5b89\u5168\u610f\u8b58\uff0c\u77e5\u9053\u81ea\u5df1\u9700\u8981\u4e00\u7a2e\u9632\u8b77\u63aa\u65bd\u4f86\u4fdd\u969c\u654f\u611f\u8cc7\u8a0a\u53ca\u4f01\u696d\u8cc7\u6e90\u3002\u5728\u904e\u53bb\u4e00\u5e74\u66fe\u7d93\u6210\u70ba\u7db2\u8def\u72af\u7f6a\u53d7\u5bb3\u8005\u7684 77% \u4f01\u696d\u7576\u4e2d\uff0c\u6709 34% \u8868\u793a\u9019\u985e\u4e8b\u4ef6\u5728\u904e\u53bb\u5e7e\u500b\u6708\u4f86\u66f4\u52a0\u666e\u904d\u3002\u6574\u9ad4\u800c\u8a00\uff0c\u73fe\u5728\u5df2\u6709\u8d85\u904e\u534a\u6578\u7684\u4f01\u696d (59%) \u6bd4\u4ee5\u5f80\u66f4\u64d4\u5fc3\u7db2\u8def\u5a01\u8105\u3002<!--more--><\/p>\n<p><b>\u7576\u524d\u7db2\u8def\u72af\u7f6a\u74b0\u5883\u7684\u6700\u5927\u5a01\u8105<\/b><br \/>\n\u7814\u7a76\u4eba\u54e1\u767c\u73fe\uff0c\u5728\u4eca\u65e5\u7684\u74b0\u5883\u7576\u4e2d\u6709\u5e7e\u7a2e\u662f\u4f01\u696d\u5e7e\u4e4e\u6bcf\u5929\u90fd\u8981\u9762\u7684\u5a01\u8105\uff0c\u56e0\u6b64\u82e5\u672a\u80fd\u52a0\u4ee5\u9069\u7576\u8655\u7f6e\u53ca\u9632\u8b77\uff0c\u5c31\u53ef\u80fd\u5c0e\u81f4\u8cc7\u6599\u5916\u6d29\u3002<\/p>\n<p>\u5176\u4e2d\u4e00\u9805\u5a01\u8105\u5c31\u662f\uff0c\u4f01\u696d\u7684\u652f\u51fa\u548c\u82b1\u8cbb\u4e26\u672a\u82b1\u5728\u7db2\u8def\u5b89\u5168\u7b56\u7565\u4e0a\u3002\u4f01\u696d\u61c9\u8a72\u5f37\u5316\u5176\u4f01\u696d\u76ee\u6a19\u8207\u8ca1\u52d9\u8cc7\u6e90\u5206\u914d\u4e4b\u9593\u7684\u95dc\u806f\uff0c\u4ee5\u9632\u6b62\u9019\u985e\u98a8\u96aa\u5f71\u97ff\u5176\u76ee\u6a19\u7684\u9054\u6210\u3002<\/p>\n<p>\u53e6\u4e00\u500b\u53ef\u80fd\u9020\u6210\u5b89\u5168\u6f0f\u6d1e\u7684\u554f\u984c\u662f\uff0c\u4f01\u696d\u5408\u4f5c\u5c0d\u8c61\u7d93\u5e38\u6703\u300c\u5f9e\u6383\u7784\u96f7\u9054\u4e0b\u4f4e\u7a7a\u98db\u904e\u300d(\u5957\u53e5 PwC\u3001CSO Magazine \u53ca CIO Magazine \u7684\u8aaa\u6cd5)\u3002\u7db2\u8def\u72af\u7f6a\u8005\u7d93\u5e38\u6703\u5229\u7528\u5354\u529b\u5ee0\u5546\u4f86\u6ef2\u900f\u76f8\u95dc\u4f01\u696d\u3002\u66f4\u7cdf\u7684\u662f\uff0c\u8a31\u591a\u4f01\u696d\u4e26\u672a\u5c07\u5354\u529b\u5ee0\u5546\u7684\u5b89\u5168\u5217\u5165\u5176\u9632\u8b77\u7b56\u7565\u7576\u4e2d\u3002\u524d\u8ff0\u8abf\u67e5\u767c\u73fe\uff0c\u76ee\u524d\u53ea\u6709\u4e0d\u5230\u4e00\u534a (44%) \u7684\u4f01\u696d\u5df2\u8a2d\u7f6e\u4e00\u4e9b\u6280\u8853\u548c\u653f\u7b56\u5728\u5408\u4f5c\u4e4b\u524d\u5148\u5c0d\u5354\u529b\u5ee0\u5546\u9032\u884c\u8abf\u67e5\u3002\u6b64\u5916\uff0c\u50c5\u6709 31% \u5c07\u5b89\u5168\u689d\u6b3e\u7d0d\u5165\u5408\u7d04\u7576\u4e2d\u3002<\/p>\n<p>\u5118\u7ba1\u5982\u6b64\uff0c\u5f71\u97ff\u4f01\u696d\u5b89\u5168\u6700\u5927\u7684\u98a8\u96aa\u4e4b\u4e00\u662f\u8a31\u591a\u4f01\u696d\u96c6\u5718\u4e26\u672a\u8a55\u4f30\u5176\u7576\u524d\u7684\u5468\u906d\u74b0\u5883\u4f86\u767c\u6398\u53ef\u80fd\u5f71\u97ff\u5176\u4f01\u696d\u5b89\u5168\u7684\u98a8\u96aa\u3002\u6574\u9ad4\u800c\u8a00\uff0c\u50c5\u6709 47% \u7684\u4f01\u696d\u6703\u5b9a\u671f\u57f7\u884c\u98a8\u96aa\u8a55\u4f30\uff0c\u800c\u6703\u59d4\u8a17\u7b2c\u4e09\u65b9\u670d\u52d9\u4f86\u5f9e\u5916\u90e8\u8a55\u4f30\u5176\u5b89\u5168\u653f\u7b56\u7684\u4f01\u696d\u5c31\u66f4\u5c11\uff0c\u50c5\u6709 24%\u3002<\/p>\n<p><b>\u7db2\u8def\u5b89\u5168\u7b2c\u4e00\u8981\u52d9<\/b><br \/>\n\u70ba\u4e86\u61c9\u4ed8\u66f4\u591a\u7684\u5b89\u5168\u554f\u984c\uff0c\u4f01\u696d\u9818\u5c0e\u4eba\u5fc5\u9808\u66f4\u805a\u7126\u65bc\u67d0\u4e9b\u9818\u57df\uff0c\u4f8b\u5982\u884c\u52d5\u9632\u8b77\u3002\u96a8\u8457\u8d8a\u4f86\u8d8a\u591a\u54e1\u5de5\u5728\u5de5\u4f5c\u4e0a\u4f7f\u7528\u81ea\u5df1\u7684\u500b\u4eba\u884c\u52d5\u88dd\u7f6e\uff0c\u9019\u4e9b\u7aef\u9ede\u88dd\u7f6e\u5df2\u6210\u70ba\u8d8a\u4f86\u8d8a\u5438\u5f15\u99ed\u5ba2\u7684\u653b\u64ca\u76ee\u6a19\uff0c\u56e0\u6b64\u5b83\u5011\u5fc5\u9808\u53d7\u5230\u59a5\u5584\u9632\u8b77\u3002\u4f46\u662f\uff0c\u537b\u50c5\u6709 31% \u7684\u53d7\u8a2a\u8005\u76ee\u524d\u5df2\u6709\u884c\u52d5\u9632\u8b77\u7b56\u7565\u3002\u6b64\u5916\uff0c<a href=\"https:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/assets\/pwc-cybersecurity-deficiencies.pdf\">\u4e0d\u5230\u534a\u6578\u7684\u4f01\u696d\u6703\u5c07\u54e1\u5de5\u7684\u884c\u52d5\u88dd\u7f6e\u52a0\u5bc6<\/a>\uff0c\u800c\u4e14\u50c5\u6709\u4e09\u5206\u4e4b\u4e00\u5f37\u7684\u4f01\u696d\u63a1\u7528\u4e86\u884c\u52d5\u88dd\u7f6e\u7ba1\u7406\u6280\u8853\u3002<\/p>\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u6c7a\u7b56\u8005\u9084\u5fc5\u9808\u66f4\u91cd\u8996\u5167\u90e8\u54e1\u5de5\u53ef\u7591\u884c\u70ba\u7684\u5075\u6e2c\uff0c\u4e26\u4e14\u5f37\u5316\u54e1\u5de5\u8a13\u7df4\u3002<\/p>\n<p>\u8a72\u8abf\u67e5\u6307\u51fa\uff1a\u300c\u5167\u90e8\u54e1\u5de5\u9020\u6210\u7684\u7db2\u8def\u5b89\u5168\u4e8b\u4ef6\u5c07\u62db\u81f4\u56b4\u91cd\u5f8c\u679c\uff0c\u4f46\u537b\u4e26\u672a\u50cf\u5916\u90e8\u99ed\u5ba2\u5a01\u8105\u90a3\u6a23\u53d7\u5230\u56b4\u683c\u91cd\u8996\u3002\u54e1\u5de5\u6240\u9020\u6210\u7684\u6f0f\u6d1e\u65e9\u5df2\u6642\u6709\u6240\u805e\uff0c\u4f46\u4f01\u696d\u4e26\u672a\u7d66\u4e88\u54e1\u5de5\u7db2\u8def\u5b89\u5168\u7fd2\u6163\u7684\u8a13\u7df4\u3002\u300d<\/p>\n<p>\u85c9\u7531\u5f37\u5316\u4e0a\u8ff0\u9818\u57df\u7684\u5de5\u4f5c\uff0c\u4e26\u4e14\u66f4\u52a0\u91cd\u8996\u5b89\u5168\u7684\u63d0\u5347\uff0c\u4f01\u696d\u9818\u5c0e\u8005\u5c31\u80fd\u6d88\u9664\u7db2\u8def\u5b89\u5168\u4e0a\u7684\u6182\u616e\uff0c\u4e26\u4e14\u505a\u597d\u66f4\u5145\u5206\u7684\u6e96\u5099\u4f86\u5c0d\u6297\u4eca\u65e5\u7684\u5a01\u8105\u3002<\/p>\n<p>\u25ce\u539f\u6587\u4f86\u6e90\uff1a<a href=\"https:\/\/blog.trendmicro.com\/top-threats-priorities-current-cybersecurity-environ\">What are the top threats and priorities in the current cybersecurity environment?<\/a><\/p>\n<h3><b><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=3279&amp;name=20140707\"><img loading=\"lazy\" decoding=\"async\" alt=\"851 215 FB Cover promotion812\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/07\/851-215-FB-Cover-promotion812.jpg\" width=\"511\" height=\"188\" \/><\/a><\/b><\/h3>\n<h3><b>\u842c\u7269\u806f\u7db2\u6642\u4ee3\uff0c\u4f01\u696d\u5fc5\u8981\u638c\u63e1\u7684\u8cc7\u5b89\u56db\u5927\u9762\u5411<\/b><\/h3>\n<h4><strong>\u842c\u7269\u806f\u7db2\u8cc7\u8a0a\u5b89\u5168\u4e2d\u5fc3\u3000\u3000\u591a\u5c64\u6b21\u7684\u8cc7\u8a0a\u5b89\u5168\u4e2d\u5fc3\u63a7\u7ba1<\/strong><br \/>\n<strong>\u842c\u7269\u806f\u7db2\u99ed\u5ba2\u653b\u9632\u624b\u6cd5\u3000\u3000\u6df1\u5ea6\u5206\u6790APT\u653b\u64ca\uff0c\u5efa\u7acb\u5b8c\u6574\u7684\u9632\u79a6\u67b6\u69cb<\/strong><br \/>\n<strong>\u842c\u7269\u806f\u7db2\u96f2\u7aef\u9632\u8b77\u67b6\u69cb\u3000\u3000\u79c1\u6709\u96f2\u00a0\u3001\u516c\u6709\u96f2\u3001\u6df7\u5408\u96f2\u7684\u8cc7\u8a0a\u5b89\u5168<\/strong><br \/>\n<strong>\u842c\u7269\u806f\u7db2\u884c\u52d5\u5b89\u5168\u6a5f\u5236\u3000\u3000\u4f01\u696d\u884c\u52d5\u88dd\u7f6e\u5b89\u5168\u7b56\u7565<\/strong><\/h4>\n<p>\u7576\u842c\u7269\u806f\u7db2IoE(Internet of Everything)\u6b63\u5f85\u5d1b\u8d77\uff0c\u7f8e\u570b\u8457\u540d\u7814\u7a76\u6a5f\u69cb\u66f4\u770b\u5230\u6bd4\u73fe\u4eca\u7d93\u6fdf\u5927\u4e0a30\u500d\u7684\u767c\u5c55\u5951\u6a5f\uff1b\u5f15\u9818\u4f01\u696d\u8cc7\u5b89\u5e03\u5c40\u7684\u60a8\uff0c\u8a72\u5982\u4f55\u9810\u898b\u5177\u524d\u77bb\u50f9\u503c\u7684\u8cc7\u5b89\u8da8\u52e2\uff0c\u70ba\u300c\u842c\u7269\u53ef\u806f\u7db2\u2027\u7121\u8655\u4e0d\u8cc7\u5b89\u300d\u7684\u6642\u4ee3\u53ca\u65e9\u6e96\u5099\uff1f<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=3279&amp;name=20140707\">\u3010\u5373\u523b\u5831\u540d!!CLOUDSEC 2014\u4f01\u696d\u8cc7\u5b89\u9ad8\u5cf0\u8ad6\u58c7\u3011<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u56db\u5bb6\u4f01\u696d\u7576\u4e2d\u5c31\u6709\u4e09\u5bb6\u904e\u53bb 12 \u500b\u6708\u5167\u66fe\u7d93\u767c\u751f\u8cc7\u8a0a\u5b89\u5168\u4e8b\u4ef6\u3002\u4e00\u5bb6\u5178\u578b\u7684\u4f01\u696d\u5728\u904e\u53bb\u4e00\u5e74\u5e73\u5747\u906d\u9047 135 \u6b21\u8cc7\u5b89 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[12,1268],"tags":[2344],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/8662"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8662"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/8662\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}