{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/ey3ceTPYkk34nYS7kL4C/0GKw5pVQVAMeLzmcxWeS/QzvdGLN4s-3.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as i}from\"framer\";import*as a from\"react\";export const richText=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When it comes to network security vs data security you need to understand the difference. Network security protects data in transit, while data security protects stored data.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"For startups, especially those backed by venture capital, protecting data isn\u2019t just a box to check for compliance: it\u2019s about building trust with investors and customers\"}),\". These companies often handle a lot of sensitive information, like user data and intellectual property, which makes them attractive targets for cyberattacks. In an environment where the focus is on rapid growth and scaling, having both layers of protection is crucial to keeping the business secure and trustworthy.\"]}),/*#__PURE__*/t(\"p\",{children:[\"And it\u2019s not just a matter of best practices, it\u2019s essential to avoid the costly consequences of a breach: Forbes \",/*#__PURE__*/e(i,{href:\"https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"indicates\"})}),\" that data breaches in 2023 increased by 72% compared to 2021, which had previously set the highest record, and according to Statista, the average cost of a data breach globally is \",/*#__PURE__*/e(i,{href:\"https://www.statista.com/markets/424/topic/1065/cyber-crime-security/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"about $4.35 million\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"The situation isn\u2019t pretty, so it\u2019s important to understand the difference between network security and data security. Our article will go into the roles, tools, and methods you can use to improve the cyber security of your startup.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Points\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Network security is about protecting data across the network, data security is about protecting sensitive data wherever it is.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Both use different tools: network security uses firewalls and intrusion detection systems, and data security uses encryption and data loss prevention to protect information.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Compliance with regulations like GDPR and HIPAA is a must for organizations to protect data integrity and avoid legal issues, so both network and data security are important.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Network Security vs Data Security\"}),/*#__PURE__*/t(\"p\",{children:[\"Network security and data security are two sides of the same coin of information security, each with its \",/*#__PURE__*/e(i,{href:\"https://www.cisco.com/c/en/us/products/security/what-is-network-security.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"areas of focus\"})}),\" and goals.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security is about protecting data as it traverses the network\"}),\". It\u2019s about keeping data integrity, confidentiality, and availability during transit. This involves using various security tools and controls like firewalls, intrusion detection systems (IDS), and VPNs to monitor and control access to network resources.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"On the other hand \"}),/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"data security\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is about protecting sensitive information from unauthorized access, modification, or destruction, regardless of where it is\"}),\". It involves using measures like encryption, multi-factor authentication (MFA), and data loss prevention (DLP) to secure data throughout its lifecycle.\"]}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between these two is key to building a comprehensive cybersecurity strategy that mitigates a wide range of security risks. For tech startups, securing both the network and data is critical to protecting sensitive information, building customer trust, and staying resilient as the business grows.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is Network Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security is the practice of protecting a computer network from unauthorized access, misuse, or damage.\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Fortinet \",/*#__PURE__*/e(i,{href:\"https://www.fortinet.com/resources/cyberglossary/what-is-network-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"defines it\"})}),\" as \u201Cthe technologies, policies, people, and procedures that defend any communication infrastructure from cyberattacks, unauthorized access, and data loss.\u201D\"]}),/*#__PURE__*/e(\"p\",{children:\"It involves using various security controls to protect the network infrastructure, so the data being transmitted within the network is secure. Key methods of network security are segmenting networks to limit attacker exploits and hardening devices to improve security.\"}),/*#__PURE__*/e(\"p\",{children:\"Network security is essential. Hackers are getting more clever, so protecting network resources is critical to business continuity and data breaches. Intrusion prevention systems (IPS) and intrusion detection systems (IDS) are key tools to monitor network traffic and detect threats. Additionally, cloud services enhance cybersecurity measures by providing data encryption and continuous monitoring to protect data and applications in the cloud environment.\"}),/*#__PURE__*/e(\"h2\",{children:\"Network Security Components\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security involves several key components working together to protect network resources, firewalls, IDS/IPS, and secure VPNs.\"}),\" Each one is important to monitor and control access to network resources, data confidentiality, integrity, and availability.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Firewalls\"}),/*#__PURE__*/e(\"p\",{children:\"Firewalls are the foundation of network security, a barrier between internal networks and external threats. They monitor, filter, and control network traffic based on security rules, preventing unauthorized access.\"}),/*#__PURE__*/e(\"p\",{children:\"Firewalls come in different types, packet-filtering, stateful inspection, and application-layer firewalls. Each type provides different levels of protection to maintain network resource integrity and confidentiality.\"}),/*#__PURE__*/e(\"h3\",{children:\"Intrusion Detection Systems (IDS)\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion Detection Systems (IDS) are key to detecting security breaches within a network. They monitor network activity in real-time, looking for abnormal patterns that may indicate a threat. When suspicious activity is detected, IDS alerts the admin for immediate investigation and response.\"}),/*#__PURE__*/e(\"p\",{children:\"This layer of defense allows IDS to help organizations detect and contain cyber threats before damage occurs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Virtual Private Networks (VPNs)\"}),/*#__PURE__*/e(\"p\",{children:\"Virtual Private Networks (VPNs) create an encrypted secure connection, commonly known as a \u201Ctunnel\u201D, that masks the user\u2019s IP address and improves online privacy. This encryption ensures data transmitted over the network is confidential and secure, so VPNs are essential to protect sensitive information from cyber threats.\"}),/*#__PURE__*/e(\"p\",{children:\"With the rise of remote work and online activities, using VPNs is critical to network security and data privacy.\"}),/*#__PURE__*/e(\"h2\",{children:\"Network Security Threats and Cyber Attacks\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network security faces many threats that can compromise data integrity and availability. Malware like viruses, worms, and trojans aim to disrupt network systems and can cause damage if not contained.\"}),\" In fact, \",/*#__PURE__*/e(i,{href:\"https://www.theverge.com/2024/5/1/24146205/lastpass-independent-company-security-breaches\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"in 2022\"})}),\", the LastPass breach was a reminder that even companies dedicated to security aren\u2019t immune to cyberattacks. Hackers were able to break into the company\u2019s development environment and steal not just source code, but also sensitive customer information, including encrypted password vaults.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This shattered user confidence and raised big questions about the safety of password management services. It was a clear example of how damaging a network security failure can be, even for businesses whose main job is to protect our data.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Another kind of cyber threat, ransomware, is a type of malware that encrypts files and demands a ransom to access them, is particularly nasty and has become a common threat.\"}),\" In fact, in 2021, the Kaseya ransomware attack \",/*#__PURE__*/e(i,{href:\"https://www.forbes.com/councils/forbestechcouncil/2022/01/25/the2021-kaseyaattack-highlighted-the-seven-deadly-sins-of-future-ransomware-attacks/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"hit more than 1,000 businesses\"})}),\" around the globe, including many startups. Hackers found a weakness in Kaseya's IT management software, which they used to lock up files and demand a ransom from every affected company. This attack threw many businesses into chaos and served as a stark reminder of the risks tied to using third-party software for essential operations.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing attacks, where emails or messages trick users into revealing sensitive information or downloading malicious files\"}),\", can result in data breaches and financial losses for startups. Cyber attacks like Distributed Denial of Service (DDoS) attacks flood the network with traffic from multiple sources to disrupt normal operations and cause outages.\"]}),/*#__PURE__*/e(\"p\",{children:\"IDS are key to defending against these threats by monitoring network traffic and detecting security breaches. Stay alert and implement robust security measures to protect your network from evolving cyber threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is Data Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security is about protecting private information from unauthorized access and breaches throughout its entire lifecycle.\"}),\" This includes:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"hardware\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"software\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"storage devices\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"user devices\"})})]}),/*#__PURE__*/e(\"p\",{children:\"And also implementing access controls and organizational policies.\"}),/*#__PURE__*/e(\"p\",{children:\"Good data security practices use tools and technologies like data masking and encryption to improve visibility and data usage.\"}),/*#__PURE__*/e(\"p\",{children:\"Compliance regulations like GDPR and HIPAA demand strict handling and protection of personal data. Organizations must follow these standards to reduce risk and protect data.\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to meeting industry standards like SOC 2 and ISO 27001, achieving compliance is a must for building trust and ensuring robust data protection. SOC 2 focuses on maintaining the security, availability, processing integrity, confidentiality, and privacy of customer data, while ISO 27001 provides a framework for managing information security risks.\"}),/*#__PURE__*/t(\"p\",{children:[\"This is where \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oneleet\"})}),\" steps in. With our practical approach to security, we help organizations get \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/the-ultimate-guide-to-soc-2-compliance-attestation\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"compliant with SOC 2\"})}),\" and ISO 27001 without falling into the trap of 'security theater'\u2014offering real protection, not just box-ticking.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Ways to Ensure Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ensuring data security requires a combination of strategies and tools. Key methods like encryption, multi-factor authentication (MFA), and data loss prevention (DLP) protect sensitive information\"}),\" by maintaining data confidentiality, integrity, and availability.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption converts readable data into an unreadable format so only authorized users can access it. Algorithms like AES and RSA encrypt data by converting it into a code, limiting access to those with decryption keys.\"}),/*#__PURE__*/e(\"p\",{children:\"This is done to protect data being transmitted over the network and stored on devices, to add an extra layer of security to prevent unauthorized access and data breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/e(\"p\",{children:\"Multi-factor authentication (MFA) adds an extra layer of security by requiring multiple forms of verification before access is granted. This can be something the user knows (e.g. a password), something they have (e.g. a smartphone), and something they are (e.g. a fingerprint) making it harder for unauthorized access to sensitive data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Loss Prevention (DLP)\"}),/*#__PURE__*/e(\"p\",{children:\"Data Loss Prevention (DLP) tools are key to network security to protect sensitive information from unauthorized access and data breaches. Good DLP practices involve monitoring and controlling data transfers to prevent sharing and maintain integrity.\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing DLP solutions allows organizations to monitor, detect, and prevent unauthorized data transfers, maintain data integrity, and protect against breaches.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Risks\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human error is the biggest risk to data security, often resulting in accidental data exposure. Mistakes like sending sensitive information to the wrong person or not following security protocols can be disastrous.\"}),\" \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/insider-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Insider threats\"})}),\" where employees try to steal data also pose a big risk, hence the importance of non-disclosure agreements and monitoring.\"]}),/*#__PURE__*/e(\"p\",{children:\"Remote and hybrid working environments increase these risks, creating security blind spots for attackers to exploit. Advanced security measures like hashing protects sensitive data from external threats by changing its face, making it less attractive to unauthorized access.\"}),/*#__PURE__*/e(\"h2\",{children:\"Network Security vs Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Although related, network security and data security are different aspects of information protection.\"}),\" Network security is about protecting the infrastructure and resources from unauthorized access and threats, data security is about protecting sensitive information from unauthorized access, modification, or destruction.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Focus Areas\"}),/*#__PURE__*/e(\"p\",{children:\"Network security is about protecting the network infrastructure, and ensuring data security during transmission. It\u2019s about protecting against unauthorized access and potential risks that could compromise the network\u2019s integrity and availability. Network security aims to achieve this.\"}),/*#__PURE__*/e(\"p\",{children:\"Data security is about protecting sensitive information from unauthorized access and ensuring its confidentiality, integrity, and availability throughout its lifecycle. Both are important but address different aspects of information security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Tools and Techniques\"}),/*#__PURE__*/e(\"p\",{children:\"Network security uses firewall security systems and intrusion detection systems to monitor and control network traffic. These tools act as a barrier to protect the network from unauthorized access and threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Data security uses tools like encryption and data loss prevention to protect sensitive information. Encryption makes data unreadable, so unauthorized people can\u2019t access it, while DLP monitors, detects, and prevents unauthorized data transfers.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compliance and Regulations\"}),/*#__PURE__*/e(\"p\",{children:\"Various regulatory frameworks and security guidelines, including for example SOC 2, require organizations to implement specific security controls to protect data integrity and confidentiality. Regulations like GDPR and HIPAA have strict requirements on how personal data is collected, stored, processed, and disposed of so startups adhere to high data protection standards.\"}),/*#__PURE__*/e(\"p\",{children:\"Compliance is key to trust and avoiding legal action.\"}),/*#__PURE__*/e(\"h2\",{children:\"Improve Your Company\u2019s Security Posture\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improving your organization\u2019s security posture requires a holistic approach with ongoing processes and practices.\"}),\" Regular assessments to identify current vulnerabilities and potential risks are critical. Proactive monitoring of networks and software for vulnerabilities, regular security control analysis, and establishment of key security metrics are key.\"]}),/*#__PURE__*/e(\"p\",{children:\"Having a comprehensive incident response plan is vital to deal with security incidents. Assigning specific risks to departments and managers ensures tracking and accountability. Regular backups and encryption are also important for data preservation and recovery in case of loss.\"}),/*#__PURE__*/e(\"h2\",{children:\"FAQs\"}),/*#__PURE__*/e(\"h3\",{children:\"What is the main focus of network security?\"}),/*#__PURE__*/e(\"p\",{children:\"The main focus of network security is to protect data integrity, confidentiality, and availability as data transmits across a network. Protecting these principles protects sensitive information from unauthorized access and breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"How is data security different from network security?\"}),/*#__PURE__*/e(\"p\",{children:\"Data security protects information regardless of where it is, network security protects data as it transmits across a network. Understanding this is key to overall security.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the common threats to network security?\"}),/*#__PURE__*/e(\"p\",{children:\"Common threats to network security are malware, phishing attacks, and DDoS attacks, all of which can compromise data integrity and availability. Stay vigilant to these risks.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why is encryption important in data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption is important in data security because it makes data unreadable so only authorized users can access the information. This protects sensitive data from unauthorized access and breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"What does MFA do for security?\"}),/*#__PURE__*/e(\"p\",{children:\"MFA adds security by requiring multiple ways of verification for access, which minimizes the risk of unauthorized access to sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Network security and data security are both part of a startup\u2019s overall cybersecurity strategy. Network security implies protecting the infrastructure and resources of the network, while data security involves protecting sensitive information from unauthorized access and breaches. Understanding the differences and implementing security controls for both will improve your company\u2019s security posture.\"}),/*#__PURE__*/e(\"p\",{children:\"By taking a holistic approach to network and data security, startups can protect their information assets, maintain customer trust, and comply with regulatory requirements. As cyber threats evolve, stay vigilant and proactive with security best practices to protect your digital assets.\"})]});export const richText1=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security keeps your information safe from unauthorized access and cybersecurity threats,\"}),\" though unfortunately, these threats are on the rise.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"When you\u2019re selling into organizations that care about security, have a strong security posture isn\u2019t just about preventing risk and protecting yourself from threat actors, it can become a critical barrier to selling into large organizations that require a certain level of protection.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Very often threat actors target the human element: 68% of data breaches involve it, \",/*#__PURE__*/e(i,{href:\"https://www.verizon.com/business/resources/reports/dbir/2024/summary-of-findings/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"according\"})}),\" to Verizon, and it\u2019s no wonder that email threats are also increasing: \",/*#__PURE__*/e(i,{href:\"https://pages.egress.com/whitepaper-email-risk-report-01-24.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"94%\"})}),\" of the organizations surveyed by Egress in 2024 experienced email security incidents.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this article, we will explore what data security is, along with its challenges and best practices.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Takeaways\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data security is important to protect sensitive information and compliance with GDPR and HIPAA.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data security has 3 main components: data encryption, data loss prevention (DLP), and access controls, each plays a big role in data integrity and confidentiality.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Phishing, insider threats, and ransomware require robust prevention and solutions, including regular data backups and endpoint security.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is Data Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Data security\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is the practice of keeping digital information safe from unauthorized access, corruption, or theft. This covers a wide range of measures to protect data integrity and confidentiality from creation to storage to transfer to erasure. \"}),\"Various types of data security measures include encryption, data erasure, data masking, and data resiliency. Organizations implement data security to keep sensitive data safe from threats such as cyber-attacks, accidental exposure, and insider threats.\"]}),/*#__PURE__*/t(\"p\",{children:[\"NIST\u2019s National Cybersecurity Center of Excellence \",/*#__PURE__*/e(i,{href:\"https://www.nccoe.nist.gov/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"defines\"})}),\" data security as \u201Cthe process of maintaining the confidentiality, integrity, and availability of an organization\u2019s data.\u201D\"]}),/*#__PURE__*/e(\"p\",{children:\"Data security is broad and involves hardware, software, and organizational policies working together to protect data. Implementing data security measures prevents unauthorized access to sensitive information, and keeps it confidential, integrity, and available.\"}),/*#__PURE__*/e(\"p\",{children:\"This data security strategy covers everything to keep data secure and trustworthy, the foundation of data security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security protects information from cyber-attacks and is compliant with data protection laws.\"}),\" Beyond financial risk, data breaches result in loss of customer trust and huge reputational damage. Reputational risk is a big one, customers may lose trust in an organization to protect their sensitive information.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Compliance also plays a big role in data security. GDPR \",/*#__PURE__*/e(i,{href:\"https://gdpr-info.eu/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"requires\"})}),\" organizations to get explicit consent from individuals before collecting their personal data. CCPA requires organizations to inform consumers about data collection and the purpose of data collection. For healthcare organizations, HIPAA requires the implementation of safeguards to ensure the integrity and confidentiality of patient health information.\"]}),/*#__PURE__*/e(\"p\",{children:\"Besides compliance and financial, data security and cybersecurity measures keep data confidential, integrity and available. Robust data security measures allow organizations to detect and prevent potential vulnerabilities, and minimize the risk of data breach. This not only protects critical assets but also helps in maintaining customer trust and compliance, data security is the foundation of modern business.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Components\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Knowing the data security components and data governance is key to protecting data. Data Security components are Data Encryption, Data Loss Prevention (DLP) and Access Controls.\"}),\" Each of these components plays a big role in keeping sensitive information safe and accessible only to authorized users.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Data Encryption\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data encryption \"}),/*#__PURE__*/e(i,{href:\"https://www.kaspersky.com/resource-center/definitions/encryption\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"is the process\"})})}),/*#__PURE__*/e(\"strong\",{children:\" of converting data from readable format to unreadable encoded format using encryption algorithms\"}),\". This ensures that only authorized users can access sensitive data, as only those with the decryption key can access the data. In case of a data breach, encryption prevents attackers from reading the data, thus keeping sensitive information confidential.\"]}),/*#__PURE__*/e(\"p\",{children:\"Common encryption solutions are tokenization which replaces sensitive data with non-sensitive data and data masking which obscures sensitive data. These techniques ensure that even if data is intercepted, it\u2019s unusable to unauthorized parties. Encrypting data helps organizations keep communication confidential and protect critical data from breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Loss Prevention (DLP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Loss Prevention (DLP) is a security strategy to detect and prevent data breaches, data theft, data leakage, unauthorized sharing, and compliance with data protection policies\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"DLP systems classify critical information, enforce policies to prevent unauthorized access or leakage, and monitor data transfer and usage to detect and block potential threats before they become a breach.\"}),/*#__PURE__*/e(\"p\",{children:\"DLP tools are part of an organization\u2019s data security, provide visibility to data usage, and enforce policies to prevent accidental or malicious data loss. Implementing a DLP strategy allows organizations to proactively protect sensitive information and comply with data protection regulations.\"}),/*#__PURE__*/e(\"h3\",{children:\"Access Controls\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access control is the foundation of data security, only authorized personnel can access sensitive information.\"}),\" Identity and Access Management (IAM) technologies play a big role in this process by storing identity data and applying access policies. IAM allows IT administrators to control user access efficiently, preventing unauthorized users from accessing critical data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Authentication and authorization are the key components of access controls. Authentication verifies the user\u2019s identity, and user authorization determines their access rights. These mechanisms monitor user activity and compliance with data security policies, thus enhancing overall security. Organizations should implement strong authentication methods such as multi-factor authentication to fortify their access control.\"}),/*#__PURE__*/e(\"p\",{children:\"A well-defined authorization framework is needed to control employee access to files within the organization. By applying rules on who can access data and systems, organizations can secure and prevent unauthorized access.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Threats\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Knowing the common data security threats is essential to developing effective protection. These threats are Phishing Attacks, Insider Threats, and Ransomware malware attacks,\"}),\" each poses different types of data security threats.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Phishing Attacks\"}),/*#__PURE__*/t(\"p\",{children:[\"Phishing attacks occur when individuals are tricked into revealing sensitive information through fraudulent communication that looks legitimate, allowing attackers to gain access to sensitive data. \",/*#__PURE__*/e(\"strong\",{children:\"These attacks often use emails that look like trusted sources to trick recipients into sharing confidential data\"}),\". The consequences of phishing can be severe, resulting in big data breaches and loss of sensitive information.\"]}),/*#__PURE__*/e(\"p\",{children:\"Preventive measures against phishing attacks are employee training, email security tools, and rigorous verification processes. By training employees to recognize phishing attempts and implementing robust email security policies, organizations can minimize the risk.\"}),/*#__PURE__*/e(\"h3\",{children:\"Insider Threats\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/insider-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Insider threats\"})})}),/*#__PURE__*/e(\"strong\",{children:\" are a big threat to data security, often from employees or contractors who either intentionally steal data or unintentionally mishandle it.\"}),\" These threats can be deliberate actions to compromise data or accidental human errors that expose sensitive information.\"]}),/*#__PURE__*/e(\"p\",{children:\"Mitigating insider threats is accomplished by implementing strict access controls, continuous monitoring of user activity, and regular security awareness training. Creating a culture of security awareness and vigilance reduces the likelihood of insider threats to compromise data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Ransomware\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ransomware is a type of malware that encrypts data and demands payment for decryption keys. \"}),\"Attackers will promise to return or restore the data after payment but there\u2019s no guarantee. Ransomware can spread fast across the network and render critical data unrecoverable without backups.\"]}),/*#__PURE__*/e(\"p\",{children:\"Regular backups are a must for recovering data during ransomware attacks. Having an up-to-date backup ensures data availability and minimizes downtime during an attack.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Solutions\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security solutions and data security policies protect sensitive data and compliance.\"}),\" Key solutions are Cloud Data Security, Endpoint Security, and Data Backup and Recovery.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Cloud Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud data security is protecting data stored and transferred in the cloud, including cloud security protocols\"}),\". One of the biggest challenges of moving data to the cloud is the difficulty of controlling and preventing data loss. It\u2019s easy to share files with unauthorized parties whether by accident or intentionally which can lead to data breaches.\"]}),/*#__PURE__*/e(\"p\",{children:\"To address these challenges, cloud storage security solutions are needed. These solutions protect data and comply with data protection regulations, securing sensitive information from unauthorized access and potential breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"Endpoint Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Endpoint security and endpoint protection are technologies that secure devices connecting to the network from various threats\"}),\". The goal is to prevent unauthorized access. It also detects and responds to threats while ensuring data confidentiality, integrity, and availability. Phishing attacks that often compromise user devices are a reason why we need robust endpoint security.\"]}),/*#__PURE__*/e(\"p\",{children:\"Antivirus software, firewalls, and endpoint detection and response (EDR) tools are part of endpoint security. Securing endpoints protects the network from threats coming from compromised user devices.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Backup and Recovery\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular backups are essential for data availability and disaster recovery during incidents like natural disasters or cyber-attacks\"}),\". Creating a backup copy of digital data is necessary to recover from damage, deletion, or theft; that\u2019s the concept of data resiliency. Without regular backup, organizations will not be able to recover data if ransomware infects their system.\"]}),/*#__PURE__*/e(\"p\",{children:\"Backup and recovery solutions allow organizations to recover lost data from accidental deletion or cyber-attacks. Regular backup minimizes data loss and ensures business continuity during a data breach.\"}),/*#__PURE__*/e(\"h2\",{children:\"Compliance and Regulations\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance with data protection regulations and data protection laws avoids legal penalties and maintains data security.\"}),\" Key regulations are the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the Health Insurance Portability and Accountability Act (HIPAA).\"]}),/*#__PURE__*/e(\"h3\",{children:\"General Data Protection Regulation (GDPR)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://gdpr-info.eu/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"GDPR\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is designed to protect the personal data and privacy of EU citizens\"}),\". It requires organizations to process personal data securely and protect it from unauthorized access and loss. Non-compliance with GDPR can result in severe fines of up to 4% of annual turnover or \u20AC20 million.\"]}),/*#__PURE__*/e(\"p\",{children:\"Organizations must have robust data security to comply with GDPR. This includes getting explicit consent from individuals before collecting their data and data is processed and stored securely.\"}),/*#__PURE__*/e(\"h3\",{children:\"California Consumer Privacy Act (CCPA)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://oag.ca.gov/privacy/ccpa\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"CCPA\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is designed to give consumers control over their personal data\"}),\". It focuses on giving individuals control over how their information is used. It grants consumers the right to know, delete, and opt out of the sale of their personal data and not to be discriminated against for exercising their privacy rights. Organizations must inform consumers about their privacy practices.\"]}),/*#__PURE__*/e(\"p\",{children:\"CCPA requires transparent data practices and an easy way for consumers to exercise their rights. This includes clear communication about data collection and usage policies.\"}),/*#__PURE__*/e(\"h3\",{children:\"Health Insurance Portability and Accountability Act (HIPAA)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.hhs.gov/hipaa/index.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"HIPAA\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is the regulation that healthcare organizations in the USA must comply with to ensure data security\"}),\". It requires the implementation of safeguards to protect the integrity and confidentiality of patient health information.\"]}),/*#__PURE__*/e(\"p\",{children:\"Compliance with HIPAA is key to maintaining trust and avoiding legal penalties.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Best Practices\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security best practices and security protocols are key to protecting an organization\u2019s data and reputation. A clear data usage policy defines acceptable use and access rights within the organization.\"}),\" Organizations should categorize data into public, private, confidential, and restricted to secure it.\"]}),/*#__PURE__*/e(\"p\",{children:\"Effective patch management addresses software vulnerabilities. Authentication and authorization controls are crucial to verify user credentials and confirm access privileges. Access controls must follow the principle of least privilege, users should only have the permissions needed for their role.\"}),/*#__PURE__*/e(\"p\",{children:\"Reviewing user permissions periodically is necessary to manage access effectively. The best practices for password hygiene are to use unique, strong passwords, multi-factor authentication, and a password manager. By enforcing longer passwords, frequent password changes, and multi-factor authentication, organizations can secure and protect sensitive data.\"}),/*#__PURE__*/e(\"p\",{children:\"Network segmentation can help isolate incidents and limit data breaches. Implementing change management can track changes to sensitive data and enhance auditing.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security FAQs\"}),/*#__PURE__*/e(\"h3\",{children:\"What is data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Data security involves protecting digital information from unauthorized access, corruption, and theft. Robust hardware, software, and organizational policies are key to data safety and integrity.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Data security protects sensitive information from cyber-attacks, complies with legal requirements, and maintains customer trust. By preventing data breaches, it prevents financial loss and reputational damage.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the components of data security?\"}),/*#__PURE__*/e(\"p\",{children:\"The components of data security are Data Encryption, Data Loss Prevention (DLP), and Access Controls, all of which collectively protect sensitive information from unauthorized access and breach. Implementing these components effectively is key to data integrity and confidentiality.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the common data security threats?\"}),/*#__PURE__*/e(\"p\",{children:\"Common data security threats such as Phishing Attacks, Insider Threats, and Ransomware require targeted mitigation. Organizations must be vigilant and implement strong security protocols to protect sensitive information.\"}),/*#__PURE__*/e(\"h3\",{children:\"How to comply with data protection regulations?\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations can comply with data protection regulations by implementing robust data security, encryption, and access controls and conducting regular audits. Following specific regulations such as GDPR, CCPA, and HIPAA is also a must to protect personal and sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Summary\"}),/*#__PURE__*/e(\"p\",{children:\"In a world where data breaches are getting more common, understanding and implementing robust data security and a data security framework is not just an option but a requirement.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Our article has covered the importance of data security, its components, threats, and solutions, to give you a solid foundation to build your data security strategy. By following these practices, organizations can protect sensitive information, comply with regulations, and build trust with their customers.\"}),/*#__PURE__*/e(\"p\",{children:\"This guide is a starting point for a more secure and trustworthy future for your organization. Remember, data protection is not just about protecting information, it\u2019s about protecting the trust and integrity of your business.\"})]});export const richText2=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data in transit is highly vulnerable, as it is particularly susceptible to interception and unauthorized access while being transmitted across networks. For tech startups the stakes are high when it comes to protecting data. \"}),\"These companies often deal with sensitive information\u2014whether it's user data or intellectual property\u2014that's constantly moving between servers, apps, and devices. A security lapse during data transmission can do more than just damage a startup's reputation; it can also scare off potential investors and partners.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Securing data in transit it\u2019s essential to keep the trust intact and stay competitive in the fast-paced tech world. According to Stationx, a 2021 report \",/*#__PURE__*/e(i,{href:\"https://www.stationx.net/cyber-security-breach-statistics/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"indicates\"})}),\" that 19% of all successful cyber attacks involved Man-in-the-Middle (MitM) attacks, which happen during data transit. Fortunately, things are improving: in 2023, 82.9% of websites were already using a valid SSL certificate as \",/*#__PURE__*/e(i,{href:\"https://www.ssldragon.com/blog/ssl-stats/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"stated\"})}),\" by SSLDragon, a significant increase from just 18.5% back in 2018. This is extremely important because SSL certificates play a huge role when it comes to securing data in transit.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this blog post, we will explore top strategies and best practices for securing data in transit to help you reduce the risk of interception and unauthorized access.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Points\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data in transit is open to interception so organizations need to implement robust security measures including encryption and access controls to protect sensitive info during transmission.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For startups, compliance with regulations like GDPR, HIPAA, SOC 2, and PCI DSS is essential to data in transit and data breach risk mitigation, so encryption and secure file transfers are a must.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Using advanced tech like machine learning and blockchain makes data in transit more secure by improving threat detection and data transfer integrity.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is Data in Transit?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data in transit means the movement of digital info across networks to transmit data securely.\"}),\" This movement makes it open to interception. As data moves from one place to another it\u2019s considered less secure than data at rest and so needs to be protected. The process of transmitting data, especially when it\u2019s sensitive info, requires robust security measures to prevent exposure to bad actors.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Regarding this, Amazon \",/*#__PURE__*/e(i,{href:\"https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-data-in-transit.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"states\"})}),\" that \u201CBy providing the appropriate level of protection for your data in transit, you protect the confidentiality and integrity of your workload\u2019s data.\u201D\"]}),/*#__PURE__*/e(\"p\",{children:\"Securing data in transit can\u2019t be stressed enough. Attackers will try to get to valuable data at its most breachable state and that\u2019s often during transmission. Employee negligence can cause data breaches during data transmission so strict security policies and training are needed. Data in motion is more vulnerable so we need to adopt protective measures.\"}),/*#__PURE__*/e(\"p\",{children:\"In the end, it\u2019s all about protecting the privacy and integrity of the info being shared. Whether it\u2019s personal data, financial transactions, or confidential business communications, securing data in transit is part of an organization\u2019s overall data security strategy. Knowing the vulnerabilities and implementing the right security measures will protect the data from threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Encrypt Data in Transit\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Protecting data is key to securing it in transit by making it unreadable to unauthorized users during transmission.\"}),\" This encryption process keeps sensitive info confidential and intact, preventing unauthorized access and data breaches. Encrypting reduces the risk of data breaches during transmission and provides an extra layer of security against eavesdropping and tampering.\"]}),/*#__PURE__*/t(\"p\",{children:[\"A recent case that shows why securing data in transit is crucial is the case of Ashley Liles, a sysadmin who took a dark turn and launched a Man-in-the-Middle (MitM) attack against his own company. During a ransomware crisis, he \",/*#__PURE__*/e(i,{href:\"https://www.bitdefender.com/blog/hotforsecurity/it-employee-goes-to-prison-for-attempting-to-redirect-ransomware-payment-to-his-own-wallet/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"intercepted messages\"})}),\" between his employer and the attackers. By tampering with emails, he tried to redirect the ransom payments into his own pocket. What makes this situation particularly alarming is that Liles, who was supposed to be helping the company handle the incident, instead used his insider access to carry out the attack. This case highlights the significant threat posed by \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/insider-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"insider threats\"})}),\" in MitM scenarios, especially when individuals have legitimate access to sensitive communication channels.\"]}),/*#__PURE__*/e(\"p\",{children:\"This really highlights how crucial regulations like PCI DSS and GDPR are, as they require that sensitive data be encrypted during transmission over open and public networks to keep it safe from unauthorized access. Encrypting data not only protects the information itself but also helps companies stay compliant with these regulations. This compliance is essential for building trust with customers and avoiding potentially costly legal penalties.\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption protects data while it's being transmitted, secures communications, and prevents data breaches by keeping the data safe.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Encryption in Transit Protocols\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Several encryption protocols are key to data in transit. These protocols including Transport Layer Security (TLS), Secure File Transfer Protocol (SFTP), and Hypertext Transfer Protocol Secure (HTTPS)\"}),\" are vital in \",/*#__PURE__*/e(i,{href:\"https://www.internetsociety.org/deploy360/tls/basics/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"maintaining data integrity\"})}),\" and confidentiality during transmission. Using these protocols is important to keep sensitive info protected from unauthorized access and tampering.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Transport Layer Security (TLS)\"}),/*#__PURE__*/e(\"p\",{children:\"Transport Layer Security (TLS) is a cryptographic protocol to secure network communication. It establishes an encrypted connection between networked devices so data transmitted is authentic, not altered, and private during the transmission. TLS provides encryption and integrity assurance so data can be exchanged securely between clients and servers and protects against eavesdropping and tampering.\"}),/*#__PURE__*/e(\"p\",{children:\"For a server to identify itself in a TLS connection it must present a valid certificate of its claimed identity. Intermediate Certificate Authorities (CAs) play a big role in the TLS handshake by signing server certificates to establish trust. This ensures secure communication across various applications like web browsing and email by encrypting the traffic and establishing end-to-end protection.\"}),/*#__PURE__*/e(\"h3\",{children:\"Secure File Transfer Protocol (SFTP)\"}),/*#__PURE__*/e(\"p\",{children:\"Secure File Transfer Protocol (SFTP) is another protocol that encrypts data during transfer and provides authentication and access control. SFTP uses Secure Shell (SSH) for secure data transfer so files are transferred securely across the network.\"}),/*#__PURE__*/e(\"p\",{children:\"This protocol encrypts data and also verifies the user identity so overall file transfer is more secure.\"}),/*#__PURE__*/e(\"h3\",{children:\"Hypertext Transfer Protocol Secure (HTTPS)\"}),/*#__PURE__*/t(\"p\",{children:[\"Hypertext Transfer Protocol Secure (HTTPS) secures web file transfer \",/*#__PURE__*/e(i,{href:\"https://www.cloudflare.com/learning/ssl/what-is-https/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"by using\"})}),\" SSL/TLS. Encrypting data during web sessions is important for data integrity and confidentiality, so this is a must protocol for secure online communication. This protocol protects users\u2019 interaction with websites from eavesdropping and tampering, so sensitive info during web transactions is protected.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Data in Transit Access Controls\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data in transit access controls are important to prevent unauthorized access to sensitive info. The sensitivity and value of data determines the risk during transit so robust network access control is vital to data security.\"}),\" Access controls limit file access to authorized users only so data is more secure during transmission.\"]}),/*#__PURE__*/e(\"p\",{children:\"Good file-sharing solutions should have features like user authentication and audit trails to add security. User authentication methods, role-based access control (RBAC), and two-factor authentication (2FA) are common mechanisms to enforce access controls. This ensures only authorized users can access sensitive data reducing the risk of data breach.\"}),/*#__PURE__*/e(\"h3\",{children:\"User Authentication Methods\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.criipto.com/blog/what-is-authentication\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"User authentication methods\"})}),\" are key to data in transit security. These can include traditional passwords which should be at least 8 characters with a combination of letters, numbers, and symbols.\"]}),/*#__PURE__*/e(\"p\",{children:\"Also, biometric systems and smart cards are used to add more security to data, more robust than passwords alone. Two-factor authentication (2FA) requires users to provide two forms of authentication, so it\u2019s more secure than using a password alone.\"}),/*#__PURE__*/e(\"h3\",{children:\"Role-Based Access Control (RBAC)\"}),/*#__PURE__*/t(\"p\",{children:[\"Role-Based Access Control (\",/*#__PURE__*/e(i,{href:\"https://www.techtarget.com/searchsecurity/definition/role-based-access-control-RBAC\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"RBAC\"})}),\") limits access based on user roles so unauthorized actions are prevented and employees can only access data needed for their job functions. Assigning permissions based on user roles simplifies security and reduces the risk of data exposure.\"]}),/*#__PURE__*/e(\"p\",{children:\"This access control method is effective in minimizing risks by only granting access rights based on a user\u2019s role within the organization.\"}),/*#__PURE__*/e(\"h3\",{children:\"Two-factor authentication (2FA)\"}),/*#__PURE__*/t(\"p\",{children:[\"Two-factor authentication (\",/*#__PURE__*/e(i,{href:\"https://authy.com/what-is-2fa/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"2FA\"})}),\") adds security by requiring users to provide a second form of identification, often a physical device, along with a password. This additional layer of security reduces the risk of unauthorized access by requiring users to provide two different forms of identification.\"]}),/*#__PURE__*/e(\"p\",{children:\"Adding a password with a physical 2FA token increases the security of user authentication.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data in Transit Compliance for Startups\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Organizations that process personal data must comply with regulations. Regulations like \"}),/*#__PURE__*/e(i,{href:\"https://gdpr-info.eu/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"GDPR\"})})}),/*#__PURE__*/e(\"strong\",{children:\", HIPAA, and PCI DSS require robust measures to protect data in transit.\"}),\" Complying with these regulations ensures customer data is protected, reducing the risk of data breach and data security. Secure file retention and destruction policies are key to compliance. Files must be either retained or destroyed according to the regulations.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Organizations must also comply with established security \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/the-ultimate-guide-to-soc-2-compliance-attestation\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"certifications like SOC 2\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://www.iso.org/standard/27001\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"ISO 27001\"})}),\" which is key in evaluating encryption solutions. These certifications provide a framework to ensure encryption solutions meet the required security standards so data is more protected during transmission.\"]}),/*#__PURE__*/t(\"p\",{children:[\"At \",/*#__PURE__*/e(i,{href:\"https://oneleet.com/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oneleet\"})}),\", our SOC 2 compliance services simplify encryption management and audit preparation, ensuring your data is secure and aligned with required standards.\"]}),/*#__PURE__*/e(\"h3\",{children:\"General Data Protection Regulation (GDPR)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://gdpr-info.eu/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"GDPR\"})}),\" requires organizations to protect the personal data of EU citizens. This includes getting clear consent from individuals before collecting personal data and classifying data to add tools for data loss prevention, discovery, and governance.\"]}),/*#__PURE__*/e(\"p\",{children:\"Classifying data makes data protection more effective.\"}),/*#__PURE__*/e(\"h3\",{children:\"Health Insurance Portability and Accountability Act (HIPAA)\"}),/*#__PURE__*/t(\"p\",{children:[\"Health Insurance Portability and Accountability Act (\",/*#__PURE__*/e(i,{href:\"https://www.hhs.gov/hipaa/index.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HIPAA\"})}),\") regulates the protection of personal health information for an individual's privacy. HIPAA requires covered entities to ensure confidentiality, integrity, and availability of electronic protected health information (e-PHI).\"]}),/*#__PURE__*/e(\"p\",{children:\"This regulation requires healthcare organizations to implement encryption and other security measures to protect e-PHI during transmission.\"}),/*#__PURE__*/e(\"h3\",{children:\"Payment Card Industry Data Security Standard (PCI DSS)\"}),/*#__PURE__*/t(\"p\",{children:[\"Payment Card Industry Data Security Standard (\",/*#__PURE__*/e(i,{href:\"https://www.pcisecuritystandards.org/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PCI DSS\"})}),\") requires organizations to protect credit card information during transmission. This regulation requires regular vulnerability scans and annual assessments to ensure cardholder data is secure.\"]}),/*#__PURE__*/e(\"p\",{children:\"Implementing encryption and other security measures is key to complying with PCI DSS and protecting sensitive payment information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Data in Transit\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Best practices are key to ensuring data in transit. Organizations must implement encryption as one of the technical measures to protect personal data and to comply with GDPR and HIPAA.\"}),\" Data in transit is considered less secure than data at rest. Regular risk assessment helps to identify vulnerabilities in data transmission systems and comply with regulatory standards and data security.\"]}),/*#__PURE__*/e(\"p\",{children:\"Other best practices are to classify and categorize data with security protocols and use robust encryption protocols, access control, and monitoring mechanisms. Organizations should not rely only on cloud services for security but consider additional measures to add data protection.\"}),/*#__PURE__*/e(\"p\",{children:\"Managed File Transfer (MFT) can also increase security and compliance for sensitive data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Classification and Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Data classification is key to identifying sensitive data and protecting it. Identifying sensitive information allows organizations to prioritize encryption and apply the right security measures to protect data during transmission. This proactive approach protects customer data, financial data, and other sensitive information from breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"Auditing and Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Auditing and monitoring are essential to data security. Regular security audits ensure ongoing compliance and effectiveness of security measures, audit trails provide valuable information on file-sharing activities.\"}),/*#__PURE__*/e(\"p\",{children:\"These proactive security measures help organizations to detect and respond to threats in time.\"}),/*#__PURE__*/e(\"h3\",{children:\"Secure File Transfer Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Secure file transfer solutions are key to protecting data in transit. Cloud service file-sharing solutions like Dropbox, Google Drive, and Microsoft OneDrive have features like user authentication, access controls, and audit trail to ensure data security.\"}),/*#__PURE__*/e(\"p\",{children:\"These provide a solid foundation for secure communication and data protection.\"}),/*#__PURE__*/e(\"h2\",{children:\"Choosing the Right Encryption Solution\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choosing the right encryption solution is key to protecting sensitive information. Cloud-based file-sharing services like Dropbox and Google Drive have strong encryption and access control features.\"}),\" Organizations must assess their needs and choose an encryption solution that has robust security features and is compliant with regulatory standards.\"]}),/*#__PURE__*/e(\"p\",{children:\"Good key management practices are key to secure data in transit. Encryption keys must be unique to each user and stored securely to prevent unauthorized access. AES (Advanced Encryption Standard) is recommended for data in transit, especially with high encryption key length. Proper key management ensures encryption keys are used to protect sensitive information.\"}),/*#__PURE__*/e(\"h3\",{children:\"Encryption Standards and Key Management\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption standards and key management are the foundation of data security. AES is recommended for data in transit because of its robustness and high encryption key length. Good key management is necessary to ensure encryption keys are unique to each user and are stored securely to prevent unauthorized access.\"}),/*#__PURE__*/e(\"p\",{children:\"The certificate signing process also adds security by ensuring the privacy and integrity of transmitted information.\"}),/*#__PURE__*/e(\"h3\",{children:\"User Access Controls and Audits\"}),/*#__PURE__*/e(\"p\",{children:\"User access controls and regular security audits are key to data security. Implementing access controls ensures that only authorized users can access sensitive data, reducing the risk of unauthorized access. Regular security audit helps identify vulnerabilities and ensure access controls are enforced.\"}),/*#__PURE__*/e(\"p\",{children:\"Checking data encryption providers for relevant certifications like SOC 2 and ISO 27001 ensures they meet high-security standards.\"}),/*#__PURE__*/e(\"h2\",{children:\"Advanced Technologies for Data in Transit\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Innovations in data security in transit include the use of advanced technologies like machine learning and blockchain which adds protection against cyber threats.\"}),\" These technologies provide new ways to secure data, provide additional layers of security, and make it harder for malicious actors to intercept or steal data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Machine learning can detect and mitigate data in transit threats by analyzing patterns and behavior to detect anomalies in real-time. Blockchain provides a secure and immutable record of data transfer and ensures the integrity and authenticity of transactions.\"}),/*#__PURE__*/e(\"p\",{children:\"Use these innovative solutions to boost your data security in transit.\"}),/*#__PURE__*/e(\"h3\",{children:\"Machine Learning for Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"Machine learning is changing the way we protect data by identifying patterns that indicate potential threats to data in transit. These algorithms analyze network behavior and traffic data to detect anomalies that suggest security threats. By using machine learning for threat detection, organizations can respond to potential breaches in real-time, reducing risks.\"}),/*#__PURE__*/e(\"h3\",{children:\"Blockchain for Transactions\"}),/*#__PURE__*/e(\"p\",{children:\"Blockchain provides a decentralized and secure way of transaction and ensures integrity and transparency of data transfer. Smart contracts on blockchain platforms will execute transactions when certain conditions are met, reducing human error.\"}),/*#__PURE__*/e(\"p\",{children:\"The immutable nature of blockchain records adds trust to data integrity, making it a solid solution for secure communication and data encryption.\"}),/*#__PURE__*/e(\"h2\",{children:\"Related Questions\"}),/*#__PURE__*/e(\"h3\",{children:\"What is data in transit?\"}),/*#__PURE__*/e(\"p\",{children:\"Data in transit is information being transferred across the network, it\u2019s vulnerable to security threats. We must protect this data during transmission.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why encrypt data in transit?\"}),/*#__PURE__*/e(\"p\",{children:\"Encrypting data in transit is to protect sensitive information from unauthorized access, ensure confidentiality, and prevent data breaches.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the key protocols for data encryption in transit?\"}),/*#__PURE__*/e(\"p\",{children:\"Key protocols for data encryption in transit are Transport Layer Security (TLS), Secure File Transfer Protocol (SFTP), and Hypertext Transfer Protocol Secure (HTTPS). Using these protocols will protect the data as it traverses the network.\"}),/*#__PURE__*/e(\"h3\",{children:\"How do access controls help data in transit?\"}),/*#__PURE__*/e(\"p\",{children:\"Access controls help data in transit by limiting access to sensitive information through user authentication, role-based access control, and two-factor authentication. This restriction reduces the risk of unauthorized access and data breaches during transmission.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the compliance requirements for data in transit?\"}),/*#__PURE__*/e(\"p\",{children:\"To be compliant for data in transit, you must comply with regulations like GDPR, HIPAA, and PCI DSS which require strong security to protect personal and sensitive information during transmission.\"}),/*#__PURE__*/e(\"h2\",{children:\"Wrapping up\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data security\"})}),\" in transit is key to protecting sensitive information from unauthorized access and data breaches. By understanding the vulnerability of data in transit and implementing encryption protocols like TLS, SFTP, and HTTPS, startups can boost their data protection. Also, use access controls, comply with regulatory requirements, and use advanced technology like machine learning and blockchain to further secure data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Startups must be always on the lookout and be proactive with data security, continuously assessing and improving their security. By following the tips and best practices in this article, businesses can ensure the confidentiality, integrity, and availability of their data during transmission, and protect their valuable information from potential threats.\"})]});export const richText3=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud \"}),/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"data security\"})})}),/*#__PURE__*/e(\"strong\",{children:\" involves protecting your data in the cloud from theft, loss, and unauthorized access. \"}),\"For VC-backed startups and tech companies, this becomes even more important. These businesses often manage sensitive customer information and proprietary data, which are key to their success.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Investors today are paying close attention to how startups handle data security, so having solid security measures in place is not just a best practice\u2014it's a must\"}),\". A strong approach to cloud data security can foster trust with customers and stakeholders, making the startup more appealing to potential investors and setting the stage for growth.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"However, many companies still fall short: data provided by Netgainit \",/*#__PURE__*/e(i,{href:\"https://www.netgainit.com/blogs/cloud-security-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"indicates\"})}),\" that 80% of companies experienced at least one issue or incident related to cloud security, so it\u2019s no wonder that the global market for cloud security is \",/*#__PURE__*/e(i,{href:\"https://edgedelta.com/company/blog/cloud-security-statistics\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"expected\"})}),\" to grow to $148.3 billion by 2032, according to Edgedelta.\"]}),/*#__PURE__*/e(\"p\",{children:\"Given these risks, it's essential to understand how to protect your data. In this article, we\u2019ll cover everything you need to know about cloud data security to help you stay protected.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is Cloud Data Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud data security is a strategic approach to prevent loss, leakage, misuse, or unauthorized access to data in the cloud.\"}),\" Nowadays, cloud data security is more critical than ever as malicious actors are targeting the cloud more frequently. Unlike traditional IT security which is based on on-premise data storage, cloud security is based on cloud data storage and requires new security strategies due to its network architecture and internet access.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The move to the cloud has changed cybersecurity practices for good, so companies need to re-evaluate \",/*#__PURE__*/e(i,{href:\"https://www.kaspersky.com/resource-center/definitions/what-is-cloud-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"how they manage\"})}),\" and execute data security.\"]}),/*#__PURE__*/t(\"p\",{children:[\"IBM \",/*#__PURE__*/e(i,{href:\"https://www.ibm.com/topics/cloud-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"states\"})}),' that \"Organizations need cloud security as they move toward their digital transformation strategy and incorporate cloud-based tools and services as part of their infrastructure.\"']}),/*#__PURE__*/e(\"h3\",{children:\"What is the Cloud?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The cloud is a network of servers that allows remote access to data, applications, and programs over the Internet.\"}),\" This network allows users to store and access data from anywhere making it a very useful tool for individuals and organizations. Gmail, Dropbox, and Facebook are common applications that use cloud services. These platforms use cloud technology for their features.\"]}),/*#__PURE__*/t(\"p\",{children:[\"There are two types of cloud environments: public and private. Public cloud services like Amazon Web Services (AWS) and Microsoft Azure are \",/*#__PURE__*/e(i,{href:\"https://aws.amazon.com/what-is/public-cloud/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"shared resources\"})}),\" for multiple users, like a shared office space. Private clouds are dedicated to a single organization, giving more control and security but often at a higher cost.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Shared Responsibility Model in Cloud Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The \"}),/*#__PURE__*/e(i,{href:\"https://aws.amazon.com/compliance/shared-responsibility-model/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"shared responsibility model\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is a framework that outlines the security responsibilities between cloud service providers (CSPs) and their customers.\"}),\" CSPs are responsible for the physical infrastructure, servers, storage, and networking while customers are responsible for their data, applications, and workloads in the cloud. This split of responsibilities varies depending on the service model \u2013 Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS).\"]}),/*#__PURE__*/e(\"p\",{children:\"For example in a SaaS offering, the vendor takes care of the platform security but the customer is responsible for their data from exposure and malware risks. This model is key to mitigating risks and compliance with security standards.\"}),/*#__PURE__*/e(\"h3\",{children:\"Legal and Regulatory Compliance\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legal compliance in cloud security means following the regulations that impact data protection and user privacy.\"}),\" Regulatory frameworks like the General Data Protection Regulation (\",/*#__PURE__*/e(i,{href:\"https://gdpr-info.eu/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"GDPR\"})}),\") and the Health Insurance Portability and Accountability Act (\",/*#__PURE__*/e(i,{href:\"https://www.hhs.gov/hipaa/index.html\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HIPAA\"})}),\") impose specific requirements on cloud data security for user information.\"]}),/*#__PURE__*/e(\"p\",{children:\"In the US, different types of data are explicitly protected by federal laws. This includes health data, financial data, and data from children. Organizations should consult with legal experts before choosing a cloud data provider to understand the specific laws related to cloud data security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Cloud Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud data security has many benefits. One of the biggest is cost savings, reducing the total cost of ownership and administrative effort.\"}),\" It also gives visibility into data assets so organizations can track data usage and access which is key to data integrity and security.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cloud data security also simplifies backup and recovery, so data and applications can be restored quickly in case of data loss incidents. Strong cloud data security is also for protecting sensitive information and compliance with regulations.\"}),/*#__PURE__*/t(\"p\",{children:[\"However, the need for strong cloud security became painfully clear in 2020 when Blackbaud, a well-known cloud services provider, experienced a serious \",/*#__PURE__*/e(i,{href:\"https://www.oit.edu/development/blackbaud-security-incident\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"security breach\"})}),\". Hackers managed to access sensitive data from many of their clients, including schools and healthcare organizations. This wasn't just about data being exposed; it resulted in legal issues and a significant loss of trust among those affected. This incident serves as a wake-up call for startups, reminding us that neglecting cloud security can have serious consequences. These companies must prioritize solid security practices\u2014not only to protect their data but also to maintain the trust and confidence of their customers and stakeholders.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Increased Accessibility and Scalability\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud services are scalable, organizations can increase their capacity as they grow. This flexibility means organizations can adjust their resources to meet changing demands without investing in physical infrastructure.\"}),/*#__PURE__*/e(\"p\",{children:\"Also, the cloud provides increased accessibility, users can access data from anywhere with an internet connection.\"}),/*#__PURE__*/e(\"h3\",{children:\"Cost Savings\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud data storage can lead to huge cost savings as cloud service providers manage the underlying infrastructure. Organizations can focus on their core business without the hassle of managing physical data centers and hardware.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enhanced Security\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud service providers have the latest tools to maintain and improve security for stored data. These advanced security features protect sensitive information and are compliant with data protection regulations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Cloud Data Security Threats\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tech startups must be aware of the various cybersecurity threats when storing data in the cloud. Common threats are data breaches, misconfigurations, insecure APIs, over-accessibility, and insider threats.\"}),\" The lack of a traditional security perimeter in a cloud environment increases the risk of these threats.\"]}),/*#__PURE__*/e(\"p\",{children:\"Weak devices within cloud-connected systems can be exploited and compromise the entire network. Also, organizations struggle to have visibility into where sensitive data is and who is using it in the cloud.\"}),/*#__PURE__*/e(\"p\",{children:\"The flexibility and scalability of cloud environments are good but it also increases the attack surface in cloud environments and increases the security risk.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's add some tailored icons at the left side of each one of these elements.\"}),/*#__PURE__*/e(\"h3\",{children:\"Data Breaches and Misconfigurations\"}),/*#__PURE__*/e(\"p\",{children:\"Misconfigurations can create vulnerabilities that expose the cloud environment to big data breaches. Common misconfiguration risks are overly permissive privileges and insufficient logging which can expose cloud environments to breaches. Data breaches are often caused by misconfigurations, inadequate access controls, or stolen credentials.\"}),/*#__PURE__*/t(\"p\",{children:[\"For example, in January 2024, \",/*#__PURE__*/e(i,{href:\"https://venturebeat.com/ai/anthropic-confirms-it-suffered-a-data-leak/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Anthropic\"})}),\", an AI startup, experienced a data leak when a contractor inadvertently shared customer names and account balances with an unauthorized third party. This incident underscores the risks startups face from seemingly small mistakes.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In October 2022, \",/*#__PURE__*/e(i,{href:\"https://www.fiercehealthcare.com/health-tech/digital-pharmacy-startup-truepill-confirms-hackers-accessed-health-data-23m-users\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Truepill\"})}),\", a digital pharmacy startup, confirmed that hackers accessed the personal health data of 3.2 million users, including names, birthdates, and medical information. The company identified the breach and notified affected individuals, emphasizing that no financial or payment information was compromised\u200B.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Insecure APIs\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.isc2.org/Insights/2021/10/the-threat-of-insecure-interfaces-and-apis\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Insecure APIs\"})}),\" can create entry points for data breaches and leaks if not properly protected. These insecure interfaces are common in cloud environments and can be vulnerable points of entry for attackers. Securing APIs is key to mitigating the risks of these vulnerabilities.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Over-Accessibility\"}),/*#__PURE__*/e(\"p\",{children:\"Over-accessibility in cloud storage environments can increase security risk due to a bigger attack surface. Organizations may struggle with inconsistent access permissions, making it harder to implement security controls. Compliance tools help organizations to manage regulatory requirements and monitor compliance status.\"}),/*#__PURE__*/e(\"h3\",{children:\"Insider Threats\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/insider-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Insider threats\"})}),\" can exploit privileged access and knowledge of the cloud environment to get unauthorized information or make unauthorized changes. These internal actors can commit cybercrimes like theft and fraud using their access to cloud data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cloud data is more accessible in cloud environments so insider threats can get unauthorized access and increase the risk of security breaches.\"}),/*#__PURE__*/e(\"h2\",{children:\"Cloud Service Providers and Data Security\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud service providers play a crucial role in ensuring the security of data stored in the cloud.\"}),\" While providers are responsible for securing the underlying infrastructure, customers are responsible for securing their data and applications.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Role of Providers in Data Security\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud service providers are tasked with securing the physical infrastructure, including servers, storage, and networking equipment. They must also ensure the security of the cloud environment, encompassing the hypervisor, operating system, and applications.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Providers implement robust security measures such as encryption, access controls, and continuous monitoring to safeguard customer data. These measures are essential to protect the cloud environment from potential threats and ensure the integrity and confidentiality of the data stored.\"}),/*#__PURE__*/e(\"h3\",{children:\"Evaluating Provider Security Measures\"}),/*#__PURE__*/e(\"p\",{children:\"When evaluating cloud service providers, customers should thoroughly assess the provider\u2019s security measures. The main aspects to consider include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Encryption:\"}),\" Does the provider offer encryption for data in transit and at rest? Encryption is vital for protecting sensitive data from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Controls:\"}),\" Are robust access controls in place, including multi-factor authentication and role-based access control? These controls help ensure that only authorized users can access sensitive data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Does the provider offer real-time monitoring and incident response capabilities? Continuous monitoring is crucial for detecting and responding to security incidents promptly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance:\"}),\" Does the provider comply with relevant regulations and standards, such as GDPR, SOC 2, ISO 27001, and HIPAA? Compliance with these regulations is essential for protecting user privacy and ensuring legal adherence.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Customers should also evaluate the provider\u2019s security certification, such as \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/the-ultimate-guide-to-soc-2-compliance-attestation\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"SOC 2 compliance\"})}),\" and ISO 27001, and review their security policies and procedures. These certifications and policies provide assurance that the provider adheres to industry best practices for data security.\"]}),/*#__PURE__*/t(\"p\",{children:[\"At \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Oneleet\"})})}),\", we streamline the process of securing cloud environments by offering services like \",/*#__PURE__*/e(\"strong\",{children:\"code security scanning\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"penetration testing\"}),\". With features such as \",/*#__PURE__*/e(\"strong\",{children:\"vCISO\"}),\" and compliance automation, we help companies efficiently meet regulatory requirements while maintaining a strong security posture. This all-in-one approach ensures both compliance and enhanced protection against emerging threats.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Cloud Data Security Best Practices\"}),/*#__PURE__*/t(\"p\",{children:[\"Implementing cloud data security best practices is key to protecting sensitive information. \",/*#__PURE__*/e(\"strong\",{children:\"Classify data to determine its type, sensitivity, regulations, and potential attack paths. Finding and locating sensitive data is the first step to securing it.\"}),\" To do data classification you need to know how the data is used and moved within the organization.\"]}),/*#__PURE__*/e(\"p\",{children:\"Strong encryption practices protect sensitive data during transfer and storage in the cloud. Limit access to sensitive data is key as unlimited access can compromise data security. Implement the principle of least privilege so users can protect sensitive data and access only what they need.\"}),/*#__PURE__*/e(\"p\",{children:\"Employee training on cloud security practices reduces human error that causes security vulnerabilities. Advanced cloud security solutions continuously monitor for vulnerabilities and automate responses. DSPM (Data Security Posture Management) tools assess an organization\u2019s data security posture and automate classification to ensure compliance. Integrating security through CNAPP (Cloud-Native Application Protection Platform) secures the application throughout its development lifecycle.\"}),/*#__PURE__*/e(\"h3\",{children:\"Encryption\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encrypting data at rest and in transit is key to cloud security\"}),\", so data is not readable by unauthorized parties without the decryption key. Encryption prevents unauthorized readability of sensitive data which is key to confidentiality.\"]}),/*#__PURE__*/e(\"p\",{children:\"Compliance requires data to be encrypted at rest and in transit to meet legal requirements.\"}),/*#__PURE__*/e(\"h3\",{children:\"Regular Backups\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Backups are essential in cloud security to prevent data loss and for business continuity\"}),\". Backups help organizations to recover from data loss incidents and ensure data integrity and availability. Cloud-to-cloud backups are part of a comprehensive cloud data security strategy.\"]}),/*#__PURE__*/t(\"p\",{children:[\"A clear example of why backups are so crucial came in 2021 with the ransomware attack on Colonial Pipeline. \",/*#__PURE__*/e(i,{href:\"https://www.worldpipelines.com/special-reports/07052023/colonial-pipeline-attack-2-year-anniversary/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Hackers encrypted vital data\"})}),\", throwing a wrench in operations and disrupting fuel supplies across the East Coast. In the face of this crisis, Colonial Pipeline felt they had no choice but to pay a ransom to regain access to their data.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This incident drives home the importance of having solid backup solutions in place. If they had done a better job at backing up their data, they might have been able to restore their systems quickly without resorting to a costly ransom. It\u2019s a powerful reminder that taking proactive steps to secure data can save companies from major headaches down the line.\"}),/*#__PURE__*/e(\"h3\",{children:\"Unified Visibility and Monitoring\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous monitoring of the cloud environment is key to quickly detect and respond to security threats.\"}),\" Unified visibility in a cloud environment is key to effective security management. Monitoring allows organizations to respond to vulnerabilities and improve data protection strategy.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Identity and Access Management (IAM) and Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity and Access Management (IAM) is key to managing user account authentication and authorization in cloud environments\"}),\". IAM policies should follow the principle of least privilege to minimize user access rights and reduce the risk of unauthorized access.\"]}),/*#__PURE__*/e(\"p\",{children:\"Implementing Multi-Factor Authentication (MFA) ensures that only authorized users can access sensitive data and adds an extra layer of security.\"}),/*#__PURE__*/e(\"h3\",{children:\"Using Data Loss Prevention (DLP) Tools\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DLP tools detect and prevent the unauthorized flow of sensitive data in cloud storage. \"}),\"These tools continuously monitor data interactions to ensure compliance with security policies and protect critical information.\"]}),/*#__PURE__*/e(\"p\",{children:\"Using DLP tools can reduce the risk of data breaches and overall data security posture.\"}),/*#__PURE__*/e(\"h2\",{children:\"Sensitive Data Discovery and Classification\"}),/*#__PURE__*/e(\"p\",{children:\"Sensitive data discovery and classification are critical components of cloud data security. Organizations must identify and classify sensitive data to ensure it is properly protected.\"}),/*#__PURE__*/e(\"h3\",{children:\"Identifying Sensitive Data\"}),/*#__PURE__*/t(\"p\",{children:[\"Sensitive data includes personally identifiable information (\",/*#__PURE__*/e(i,{href:\"https://www.investopedia.com/terms/p/personally-identifiable-information-pii.asp\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PII\"})}),\"), financial information, and confidential business data. Organizations must identify sensitive data across all cloud storage services, including cloud storage, databases, and applications.\"]}),/*#__PURE__*/e(\"p\",{children:\"To identify sensitive data, organizations can use data discovery tools, such as data loss prevention (DLP) solutions, to scan cloud storage services for sensitive data. These tools help organizations locate this data and classify it according to its sensitivity level.\"}),/*#__PURE__*/e(\"h2\",{children:\"Advanced Cloud Security Solutions\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advanced cloud security solutions are key to protecting sensitive data and keeping up with evolving threats. One example is CrowdStrike Falcon which has real-time attack indicators,\"}),\" threat intelligence, automated protection, elite threat hunting, and vulnerability observability.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Cloud-Native Application Protection Platforms (CNAPP)\"}),/*#__PURE__*/t(\"p\",{children:[\"A Cloud-Native Application Protection Platform (\",/*#__PURE__*/e(i,{href:\"https://www.zscaler.com/resources/security-terms-glossary/what-is-cloud-native-application-protection-platform-cnapp\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"CNAPP\"})}),\") is a combination of multiple security tools to provide cloud security. This integration secures applications throughout their development lifecycle to continuous protection against emerging threats.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Data Security Posture Management (DSPM)\"}),/*#__PURE__*/e(\"p\",{children:\"Data Security Posture Management (DSPM) is continuous monitoring, remediation, and documentation of data security posture. It helps to identify static risks in data access and integrates with other cloud security solutions to increase security management, agility, scalability, and visibility.\"}),/*#__PURE__*/e(\"h3\",{children:\"Automated Compliance Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Automated compliance software has tools for compliance workflow, assessments, corrective action planning, controls analysis, and testing. It improves security assessments by detecting regulatory violations, enables continuous updates, and replaces manual spot checks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Who is responsible for Cloud Data Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud data security is shared between cloud service providers (CSPs) and their customers.\"}),\" The cloud service provider is responsible for securing the cloud infrastructure, including physical components, networks, and underlying services. Customers are responsible for securing their data, applications, and workloads in the cloud, which includes encryption and access management.\"]}),/*#__PURE__*/e(\"p\",{children:\"Strong security policies are needed to enforce organization-wide restrictions in the cloud environment. Organizations must integrate data encryption into their existing cloud processes to avoid operational disruption.\"}),/*#__PURE__*/e(\"h2\",{children:\"Cloud Data Security FAQ\"}),/*#__PURE__*/e(\"h3\",{children:\"What is a shared responsibility model in cloud security?\"}),/*#__PURE__*/e(\"p\",{children:\"The shared responsibility model in cloud security defines the clear division of security responsibilities, where the cloud service provider (CSP) is responsible for securing the infrastructure, and customers are responsible for securing their data and applications. This collaborative approach secures everything across all layers of cloud services.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why is encryption important in cloud data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Encryption is important in cloud data security because it protects data from unauthorized access, for confidentiality and compliance. This is critical for trust and security in the cloud.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the common threats to cloud data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Common threats to cloud data security are data breaches, misconfigurations, insecure APIs, over accessibility, and insider threats. We must address these vulnerabilities to secure sensitive information.\"}),/*#__PURE__*/e(\"h3\",{children:\"How to improve cloud data security posture?\"}),/*#__PURE__*/e(\"p\",{children:\"To improve cloud data security posture organizations should prioritize encryption, regular backup, unified monitoring, IAM and MFA, and DLP tools. All these will strengthen data protection and reduce vulnerability.\"}),/*#__PURE__*/e(\"h2\",{children:\"Summary\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud data security is part of modern data management and has many benefits such as accessibility, scalability, cost efficiency, and improved security. By understanding the shared responsibility model and complying with legal and regulatory, startups can reduce risk and protect their sensitive data.\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices such as encryption, regular data backup, unified visibility, IAM, and MFA, and using DLP tools is key to a strong security posture. Advanced solutions like CNAPP, DSPM, and automated compliance tools will further secure the cloud and continuous protection against emerging threats.\"})]});export const richText4=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Data security doesn\u2019t just protect your secrets from prying eyes\u2014it\u2019s the foundation for securing your business\u2019s future. For VC-backed startups, it\u2019s not just about preventing breaches; it\u2019s about maintaining your users' confidence and scaling without roadblocks.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Startups that have raised significant capital and are growing fast are often prime targets for cyberattacks. With the pressure to expand quickly and close big deals, security can sometimes take a back seat. However, meeting critical standards like HIPAA, SOC 2, and ISO 27001 is crucial for building trust and staying competitive.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Consider this: \",/*#__PURE__*/e(i,{href:\"https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Forbes\"})}),\" reports a 72% increase in data breaches in 2023 compared to 2021, and with \",/*#__PURE__*/e(i,{href:\"https://www.nu.edu/blog/cybersecurity-statistics/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"93%\"})}),\" of organizations planning to boost their cybersecurity budgets, it\u2019s clear that companies recognize the escalating risks.\"]}),/*#__PURE__*/e(\"p\",{children:\"In this blog post, we will cover the key threats, solutions, and best practices for securing your data against evolving cyber risks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Quick Facts\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data security involves keeping digital information safe from unauthorized access and making sure to follow data privacy laws.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"CIA triad (Confidentiality, Integrity, Availability), data governance and encryption, and data loss prevention are must-haves for sensitive info.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Stay aware of new threats, adopt new tech, and be compliant to keep your data safe and your reputation intact.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Cybersecurity is key to preventing breaches and keeping data intact.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is Data Security?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security means keeping digital info safe. That means preventing unauthorized access, corruption, or theft.\"}),\" It\u2019s a bunch of processes and technologies to keep sensitive data confidential, intact, and available. With threats on the rise, data security is key for organizations to keep trust and protect their interests.\"]}),/*#__PURE__*/t(\"p\",{children:[\"IBM \",/*#__PURE__*/e(i,{href:\"https://www.ibm.com/topics/data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"defines\"})}),\" data security as \u201Cthe practice of protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle.\u201D\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security-compliance\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data governance\"})}),\" is part of data security by setting policies and procedures to manage data integrity, availability, and confidentiality.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data discovery is the first step in identifying, analyzing, and classifying data across environments to be compliant and formulate data security strategies.\"}),/*#__PURE__*/t(\"p\",{children:[\"Preventing data breaches is the essence of data security. A good strategy has multiple layers of defense against cyber-attacks, human error, and \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/insider-threats\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"insider threats\"})}),\". It protects data and is compliant with data privacy laws.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data security overlaps with data privacy and uses many of the same mechanisms to protect sensitive info. For example, data lakes (which are centralized repositories for structured and unstructured data) are part of the data security framework by providing a secure environment to manage big data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Data Security is Important\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data security isn\u2019t just about protecting sensitive information\u2014it\u2019s vital for maintaining a company\u2019s reputation and financial health.\"}),\" A data breach can lead to hefty fines, legal fees, and costly repairs. For instance, Robinhood \",/*#__PURE__*/e(i,{href:\"https://iapp.org/news/a/robinhood-settles-class-action-lawsuit-for-negligence-for-20-million/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"faced\"})}),\" legal scrutiny and reputational damage after a 2021 breach that exposed millions of users' data.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Similarly, in 2022, Epic Games was fined \",/*#__PURE__*/e(i,{href:\"https://iapp.org/news/a/robinhood-settles-class-action-lawsuit-for-negligence-for-20-million/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"$520 million\"})}),\" by the FTC for privacy violations related to deceptive data practices, particularly concerning children\u2019s privacy. Startups, especially VC-backed ones, are more vulnerable due to rapid growth and immature security practices, making compliance with standards like SOC 2 and HIPAA essential for avoiding costly consequences.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity is key to an organization\u2019s reputation and financial health by preventing breaches and keeping sensitive info intact.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-security-threats-solutions-and-best-practices\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Implementing full data security measures\"})}),\" is key to protecting sensitive info and being compliant with laws. These measures are critical to prevent unauthorized access, ensure confidentiality, integrity, and availability of data, and mitigate risks of data breaches including damage to brand reputation.\"]}),/*#__PURE__*/e(\"p\",{children:\"Organizations are mandated to protect customer data from unauthorized access. Poor security can drive customers to competitors with better data security. So data security is a competitive advantage by reducing data breach risks and customer distrust.\"}),/*#__PURE__*/e(\"p\",{children:\"The financial impact of data breaches is huge, often involving big fines, legal fees, and repair costs. So investing in data security is not just a regulatory requirement but also to protect valuable data and long-term success.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security CIA Triad\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"At the heart of data security is the CIA triad:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Confidentiality\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Integrity\"})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Availability\"})})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://online.utulsa.edu/blog/what-is-the-cia-triad/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"These three\"})}),\" are the building blocks of a \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/types-of-data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"good data security strategy\"})}),\".\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality means only authorized users can access sensitive info, keeping it from unauthorized exposure\"}),\". This is key to an individual's privacy and trust whose data is being protected.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data governance is part of data security by ensuring data management practices are aligned\"}),\" to organizational policies and compliance requirements.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integrity is about keeping info accurate and unaltered. \"}),\"This minimizes data corruption and errors which can be disastrous to decision making and operations. Availability means authorized users can always access the systems and data they need to do their job. This is for business continuity and efficiency.\"]}),/*#__PURE__*/e(\"p\",{children:\"These principles combined are a solid framework to protect data from threats. Focusing on the CIA triad allows organizations to create a strategy that covers all aspects of data protection.\"}),/*#__PURE__*/e(\"p\",{children:\"Data security solutions involve various technologies and practices to improve data security and be compliant with data privacy laws.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Threats\"}),/*#__PURE__*/t(\"p\",{children:[\"Phishing attacks, a \",/*#__PURE__*/e(i,{href:\"https://www.cloudflare.com/learning/access-management/phishing-attack/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"common\"})}),\" threat in VC-backed startups, often involve deceptive messages from a CEO, board member, or other executives. These social engineering tactics trick employees into revealing sensitive data or installing malware.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"For example, Parsley Health has a live banner warning (and a \",/*#__PURE__*/e(i,{href:\"https://www.parsleyhealth.com/phishing-scams/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"page\"})}),\") to potential employees about phishing scams. In 2023, DynaRisk revealed that \",/*#__PURE__*/e(i,{href:\"https://www.freelanceinformer.com/news/vc-backed-companies-could-have-uptick-in-cybersecurity-contractor-jobs-following-risk-report/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"65%\"})}),\" of venture capital-backed companies faced elevated cybersecurity risks, including phishing attacks. One fintech startup, for example, was hit by ransomware shortly after securing new funding.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity can mitigate these data security threats by implementing measures to detect and prevent phishing attacks.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malware (ransomware, spyware, trojans) is another big threat.\"}),\" Ransomware attacks encrypt a victim\u2019s data and demand payment for decryption. The consequences of such infections are data theft, extortion, and severe network damage.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"In 2024, EquiLend, a fintech startup, was \",/*#__PURE__*/e(i,{href:\"https://www.bleepingcomputer.com/news/security/equilend-warns-employees-their-data-was-stolen-by-ransomware-gang/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"attacked\"})}),\" by the LockBit ransomware group, compromising employee data such as Social Security numbers.\\xa0 Around the same time, EvolveBank \",/*#__PURE__*/e(i,{href:\"https://techcrunch.com/2024/07/09/evolve-bank-says-ransomware-gang-stole-personal-data-on-millions-of-customers/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"suffered\"})}),\" a ransomware attack that exposed the personal data of 7.6 million customers. These incidents highlight the growing ransomware threat to tech startups.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Insider threats from current or former employees also pose big risks as they can misuse their access to sensitive data\"}),\". Accidental data exposure is often due to employee negligence or lack of understanding of security protocols.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"With the rise of IoT devices and mobile devices, we are more exposed to attacks as compromised devices can be used to launch bigger attacks\"}),\". Knowing these threats is key to creating a good data security strategy to protect sensitive info.\"]}),/*#__PURE__*/e(\"p\",{children:\"Protecting data is part of data security and privacy. Data security involves strict controls over access to sensitive information, while data privacy focuses on strategic decisions about who can access certain types of data. Effective data protection strategies must adapt to business goals, regulatory requirements, and the evolving IT landscape. This includes aligning with governance frameworks such as ISO 27001 and SOC 2, which set standards for data security controls and help ensure compliance with regulations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Methods and Tools\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/data-encryption\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"Data encryption\"})})}),/*#__PURE__*/e(\"strong\",{children:\" is a data security method that converts readable data to unreadable format\"}),\", protecting sensitive info from unauthorized access. This means that even if data is intercepted it\u2019s unreadable to unauthorized parties. Data masking is another method that hides sensitive info making it useless to unauthorized users.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is also important as it involves managing the availability, usability, integrity, and security of data used in an organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Data erasure is a method of permanently removing data that\u2019s no longer needed to reduce the risk of breaches. Data resiliency is creating backups to protect against accidental loss or destruction of data. Access controls limit who can view or interact with sensitive data to overall data security. Data Loss Prevention (DLP) tools detect and prevent unauthorized data sharing to improve visibility and security.\"}),/*#__PURE__*/e(\"p\",{children:\"These methods and tools are the key to building a solid data security solution. Combining these with other security controls makes an organization more secure in its sensitive data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Good Data Security Practices\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/what-is-data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"A holistic approach to data security\"})})}),/*#__PURE__*/e(\"strong\",{children:\" involves various technologies and strategies to protect sensitive information from unauthorized access and breaches\"}),\". This includes:\"]}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Preventive measures like encryption\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Active measures like data loss prevention\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Data masking hides data by obscuring and replacing specific characters or numbers so sensitive information is protected even if accessed by unauthorized users.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is key to good data security practices by defining policies and procedures for data management.\"}),/*#__PURE__*/e(\"p\",{children:\"Tokenization is a method of replacing sensitive data with non-sensitive tokens to add security. Data erasure makes sure information is unrecoverable to protect it from unauthorized access. Data Loss Prevention (DLP) solutions monitor data movement and ensure sensitive information doesn\u2019t leave the organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Using these will allow organizations to build a layered defense to reduce the risk of data breaches and protect sensitive info.\"}),/*#__PURE__*/e(\"h2\",{children:\"Encryption Methods\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption converts normal text into unreadable format using algorithms. This ensures that even if data is intercepted it\u2019s unreadable to unauthorized parties.\"}),\" Symmetric encryption uses one key for encryption and decryption, it\u2019s faster but requires secure key storage. Asymmetric encryption uses a pair of keys, the public key for encryption and the private key for decryption.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity is key to the effectiveness of encryption by protecting the keys and algorithms from being compromised.\"}),/*#__PURE__*/e(\"p\",{children:\"AES is used by governments for its high security and speed. Blowfish is fast and flexible and is used in e-commerce. Homomorphic encryption allows computation on encrypted data without decryption to add security during processing.\"}),/*#__PURE__*/e(\"p\",{children:\"With the rise of quantum computing traditional cryptographic methods may be broken, and is necessary to develop post-quantum cryptography that is secure against quantum attacks. Encrypting data in the cloud and during transit adds more security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Loss Prevention (DLP)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Loss Prevention (DLP) is part of data security that protects info from theft or loss.\"}),\" DLP allows organizations to detect and prevent data breaches and unauthorized sharing to improve the visibility of info. By using DLP solutions organizations can protect sensitive data and comply with data protection regulations.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is key to DLP by defining policies and procedures to manage data access and usage.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key components of DLP solutions are policy enforcement, posture control, data lifecycle management, and data privacy.\"}),\" These components monitor and control data movement to ensure sensitive info doesn\u2019t leave the organization's boundaries. DLP is the key to identifying, monitoring, and protecting sensitive data from unauthorized access or leakage.\"]}),/*#__PURE__*/e(\"p\",{children:\"DLP is needed to maintain data security and prevent data breaches. It gives organizations the tools and visibility to protect their sensitive info.\"}),/*#__PURE__*/e(\"h2\",{children:\"Access Controls and Identity Management\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity and Access Management (IAM) provides a framework for managing digital identities, which is required to secure sensitive data.\"}),\" IAM includes the management of user identities, policies, and credentials to prevent unauthorized access. Data access governance is about assessing, managing, and monitoring access to sensitive data to protect data.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is a must to access controls by defining policies and procedures to ensure data is accessed correctly and securely.\"}),/*#__PURE__*/e(\"p\",{children:\"Access controls restrict data access to authorized users to reduce the risk of both accidental and malicious data loss. Combining Role-Based Access Control (RBAC) with Attribute-Based Access Control (ABAC) can add more data protection by tailoring permissions based on roles and attributes. Advanced practices like Just-in-Time access and the Zero Trust security model add security by limiting resource access to only authorized users and continuously verifying user identities.\"}),/*#__PURE__*/e(\"p\",{children:\"Auditing access permissions regularly ensures users only have access to sensitive data. Monitoring user activity through centralized logs helps in compliance tracking and quick response to security incidents.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Posture Management (DSPM)\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Security Posture Management (DSPM) frameworks help organizations identify data exposure, vulnerabilities, and risks.\"}),\" These tools are used for:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Discovery of shadow data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Discovery of vulnerabilities\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Prioritization of risks\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Reduction of exposure\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is essential to DSPM by ensuring data policies and procedures are applied consistently across the organization.\"}),/*#__PURE__*/e(\"p\",{children:\"Continuous assessment and improvement of secure data posture allows organizations to protect sensitive info better.\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Zero Trust security is key to continuous user verification and minimizing access risks. Zero Trust Security continuously authenticates and validates user access to prevent unauthorized data access. This removes the inherent trust from traditional security models and adds overall security.\"}),/*#__PURE__*/e(\"p\",{children:\"In the cloud, Cloud Security Posture Management (CSPM) tools help in assessing and maintaining security compliance. Creating cloud security policies can enforce organization-wide security standards and compliance. Effective DSPM requires continuous configuration tuning and policy framework planning to keep security up to date.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Best Practices\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity training for employees plays a huge role in data security.\"}),\" Training staff on security practices reduces the risk of human error. Users should be trained to identify and avoid suspicious links to prevent cyber threats. Regular audits should be conducted by third-party experts or in-house professionals to assess an organization\u2019s data security and identify areas for improvement.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is essential to best practices by ensuring data is managed and used within the organization.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"An incident response plan outlines the steps to take when a data breach happens to minimize damage\"}),\". Regular backups and outage prevention are key to data availability. Using multiple security controls like multi-factor authentication and email security solutions adds more to the security posture.\"]}),/*#__PURE__*/e(\"p\",{children:\"Having policies and procedures for data handling reduces human error and misuse. Prioritizing data risks allows security teams to focus on remediation. Having a tailored cybersecurity plan allows organizations to protect their business and sensitive data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security in Cloud\"}),/*#__PURE__*/t(\"p\",{children:[\"Migrating to the cloud \",/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/cloud-data-security\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"requires organizations to shift their security strategies\"})}),\", as traditional methods often fall short. The cloud introduces unique risks like unauthorized access and the accidental or malicious sharing of sensitive data.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Platforms like AWS and GCP also pose specific challenges, such as misconfigured storage (e.g., open S3 buckets), which can lead to significant data breaches. Therefore, ensuring proper configuration from the start is crucial to securing cloud environments.\"}),/*#__PURE__*/t(\"p\",{children:[\"While regular software and system updates are essential for addressing vulnerabilities and maintaining a secure cloud environment, updates alone are not sufficient. Data governance plays a crucial role in cloud security by ensuring that policies and procedures are consistently applied and monitored. To enhance these efforts, cloud-native tools like \",/*#__PURE__*/e(i,{href:\"https://aws.amazon.com/cloudtrail/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"AWS CloudTrail\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://cloud.google.com/security/products/security-command-center\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"GCP\u2019s Security Command Center\"})}),\" offer real-time monitoring and alerting, helping organizations quickly identify and address potential threats.\"]}),/*#__PURE__*/e(\"p\",{children:\"Misconfigurations, such as granting overly permissive access in cloud environments, are a common cause of security breaches. Continuous monitoring is vital to prevent these incidents.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Key security tools like Identity and Access Management (IAM), Data Loss Prevention (DLP), and Web Application Firewalls (WAFs) are crucial for safeguarding cloud data. Regular IAM audits are especially important to minimize unauthorized access, one of the most common vulnerabilities in cloud setups.\"}),/*#__PURE__*/t(\"p\",{children:[\"Under the \",/*#__PURE__*/e(i,{href:\"https://aws.amazon.com/compliance/shared-responsibility-model/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"shared responsibility model\"})}),\", cloud providers secure the infrastructure, while organizations are responsible for securing their data and workloads.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"A comprehensive cybersecurity solution should cover security across multiple cloud platforms to ensure consistent protection. By leveraging built-in features in AWS and GCP and addressing their specific risks, businesses can better safeguard their sensitive data in the cloud.\"}),/*#__PURE__*/e(\"h2\",{children:\"Regulatory Compliance and Data Security\"}),/*#__PURE__*/e(\"p\",{children:\"Key data privacy regulations are:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GDPR\"}),\": Protects personal data of European citizens and requires consent before data collection.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HIPAA\"}),\": Safeguards individual health records and ensures health information is shared properly while protecting privacy.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"PCI DSS\"}),\": Protects sensitive payment card data and is an industry standard.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CCPA\"}),\": Gives consumers the right to know and delete their data and to opt out of its sale.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://www.oneleet.com/blog/the-ultimate-guide-to-soc-2-compliance-attestation\",nodeId:\"QzvdGLN4s\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:/*#__PURE__*/e(\"strong\",{children:\"SOC 2\"})})}),/*#__PURE__*/e(\"strong\",{children:\": \"}),\"Ensures that organizations manage customer data securely by following key trust principles like security and privacy.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ISO 27001: \"}),\"Establishes a framework for protecting data by managing information security processes systematically.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Following data security regulations like GDPR and HIPAA can help organizations avoid legal fines and build customer trust\"}),\". Non-compliance can result in heavy penalties including fines and legal action and can damage an organization\u2019s reputation. Continuous monitoring of data and securing sensitive info is key to compliance and breach reduction.\"]}),/*#__PURE__*/e(\"p\",{children:\"Data governance is fundamental to maintaining compliance with these regulations by establishing policies and procedures for data management and protection.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations must know the specific requirements of the relevant data privacy regulations and implement the necessary security controls to comply. By doing so they can protect sensitive info, and customer trust and avoid legal consequences.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"CCPA Lawsuits Targeting Startups\"})}),/*#__PURE__*/t(\"p\",{children:[\"Tech startups have increasingly become targets of \",/*#__PURE__*/e(i,{href:\"https://ogletree.com/insights-resources/blog-posts/businesses-beware-california-trap-trace-lawsuits-target-common-website-tools/\",nodeId:\"QzvdGLN4s\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"lawsuits\"})}),\" under California\u2019s CCPA. These lawsuits often hinge on small compliance issues, such as the improper use of tracking tools like Facebook and Google pixels, which may breach data collection regulations. Startups are particularly susceptible to these lawsuits due to their limited resources and the complexity of CCPA compliance.\"]}),/*#__PURE__*/e(\"p\",{children:\"Lawyers are filing class-action lawsuits over inadvertent CCPA violations, which can result in significant financial penalties, even when no direct consumer harm is evident. To avoid costly litigation, it\u2019s essential for startups to carefully monitor the use of third-party tracking technologies and ensure full compliance with CCPA rules.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Security Trends\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI powers data security systems by processing massive amounts of data and enables fast decision-making.\"}),\" Recent trends in data security are AI, multi-cloud security, and quantum computing. Zero Trust is a must in cloud security to eliminate trust between services.\"]}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity is key to keeping up with data security trends so organizations can protect their sensitive info.\"}),/*#__PURE__*/e(\"p\",{children:\"Quantum technology, in particular, will have more complex and secure encryption algorithms hence more data security. Multi-cloud security requires complex tools to protect data across public and private clouds. These trends mean organizations must keep up with the latest in data security to protect their sensitive info.\"}),/*#__PURE__*/t(\"p\",{children:[\"By using these new technologies and approaches organizations can fortify their data security and stay one step ahead of the threats. Continuous innovation is essential to data security in a digital world.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"FAQs\"]}),/*#__PURE__*/e(\"h3\",{children:\"What is the purpose of data security?\"}),/*#__PURE__*/e(\"p\",{children:\"The purpose of data security is to protect digital information from unauthorized access, corruption, or theft, and to ensure confidentiality, integrity, and availability. This is key to protecting sensitive info in this digital age.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why is data security important for organizations?\"}),/*#__PURE__*/e(\"p\",{children:\"Data security is vital to protect sensitive info and customer trust as it prevents financial loss and reputational damage from data breaches. Data security protects an organization\u2019s assets.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the data security threats?\"}),/*#__PURE__*/e(\"p\",{children:\"Data security threats are phishing attacks, malware like ransomware, insider threats, and accidental data exposure. Be aware and implement security controls to mitigate these risks.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are the components of a data security strategy?\"}),/*#__PURE__*/e(\"p\",{children:\"A data security strategy has encryption, data masking, access controls, data loss prevention (DLP), and regular security audits to secure sensitive info. Each one is key to mitigating risks and data integrity.\"}),/*#__PURE__*/e(\"h3\",{children:\"How does compliance impact data security?\"}),/*#__PURE__*/e(\"p\",{children:\"Compliance helps in data security by requiring organizations to implement security controls to protect sensitive info and continuous monitoring. Follow regulations like GDPR and HIPAA to avoid legal fines and customer trust.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Data security is a complex process that protects sensitive information, customer trust, and reputation. From basic data security to advanced techniques and trends, we have covered everything you need to secure your data. Implementing data security controls, complying with regulations, and keeping up with the latest technology are the ways to protect your organization from data breaches.\"}),/*#__PURE__*/e(\"p\",{children:\"We live in a data-driven world so data security can\u2019t be overstated. By having a data security strategy and following best practices organizations can mitigate risks, comply, and customer trust. Remember the cost of a data breach far outweighs the cost of securing your data. Stay safe!\"})]});export const richText5=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Hi my name is Koby \uD83D\uDC4B and for more than a decade I\u2019ve been helping startups invest money into marketing, sales, product, and yes, cybersecurity, to help them grow their revenue.\"}),/*#__PURE__*/t(\"p\",{children:[\"My official title in my last two roles has been \u201Chead of growth\u201D which is just a nice way of saying I do \",/*#__PURE__*/e(\"strong\",{children:\"whatever\"}),\" is necessary to help a startup grow.\"]}),/*#__PURE__*/e(\"p\",{children:\"I don\u2019t normally start posts about myself but I wanted to share just a little bit for credibility here, because I\u2019m very very good at something that I think will help a lot of you - I\u2019m S-tier at getting executives to invest money into valuable initiatives.\"}),/*#__PURE__*/e(\"p\",{children:\"I think this is something that most humans responsible for the security of their organization really struggle with.\"}),/*#__PURE__*/e(\"p\",{children:\"Often cybersecurity & compliance is seen as an afterthought.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CDo we really need to do this?\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CIs there actually a value to this penetration test?\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CWhat\u2019s the easiest way for us to get this done?\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity departments at startups & large organizations are notoriously one of the most under-resourced teams. CISO\u2019s begging for headcount, CFO\u2019s trying to squeeze \u201Cefficiency\u201D by citing miserable industry benchmarks.\"}),/*#__PURE__*/e(\"p\",{children:\"To make matters worse, cybersecurity can seem to be an infinite money pit, where even if you DO throw millions of dollars at the problem of trying to become secure, there is STILL a chance that you will get compromised.\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019re responsible for the data security of your organization, this post is to help you get the resources you need to be successful.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The most important rule of winning internal resources for cybersecurity is this:\"}),\" there are only three reasons startups invest in cybersecurity, they\u2019ve been compromised before, it\u2019s blocking a deal, or they are required to by law.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Recovering from a data breach: They\u2019ve been compromised before.\"}),/*#__PURE__*/e(\"p\",{children:\"I like to start with the \u201Cthey\u2019ve been compromised before\u201D because this is the source of the business need for investing into cybersecurity. Even legal regulations are simply based on the key concept that \u201Ccompanies are getting hacked\u201D.\"}),/*#__PURE__*/t(\"p\",{children:[\"There\u2019s a rule called Murphy\u2019s Law that states \u201Canything that can go wrong, \",/*#__PURE__*/e(\"strong\",{children:\"will\"}),\" go wrong.\u201D\"]}),/*#__PURE__*/t(\"p\",{children:[\"If you work in cybersecurity, this is probably one of the most important principles for you to understand. It pays for your salary, it\u2019s what will get you promoted (or fired), this is the \",/*#__PURE__*/e(\"strong\",{children:\"driving force\"}),\" behind the business need of cybersecurity.\"]}),/*#__PURE__*/e(\"p\",{children:\"Imagine for a moment if 5 people go to a work event and get really drunk. There\u2019s a non-zero chance that one of them does something stupid and needs to get fired. But also there\u2019s a really strong chance, probably 80-95%, that nothing bad is going to happen.\"}),/*#__PURE__*/e(\"p\",{children:\"This is fine.\"}),/*#__PURE__*/e(\"p\",{children:\"Now imagine that there\u2019s 50 people who go to a work event and get really drunk. Much bigger chance something bad happens.\"}),/*#__PURE__*/e(\"p\",{children:\"Now imagine 500. Now imagine 5,000. Now imagine 50,000.\"}),/*#__PURE__*/t(\"p\",{children:[\"The more surface area you have, what used to be a \u201Csmall team grabbing drinks\u201D turns into \u201C\",/*#__PURE__*/e(\"strong\",{children:\"something\"}),\" bad will absolutely happen.\u201D\"]}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity is like this.\"}),/*#__PURE__*/e(\"p\",{children:\"When you are small, your surface area is much smaller. Sure you\u2019re still a target, but you\u2019re flying under the radar, there\u2019s a much smaller chance you are going to be compromised.\"}),/*#__PURE__*/e(\"p\",{children:\"But as you scale?\"}),/*#__PURE__*/t(\"p\",{children:[\"You introduce more humans, your product surface area increases, you launch multiple products, you have old legacy code nobody actually understands anymore, you enter more geographies. You also launch or Product Hunt, Hackernews, you get PR on Forbes. \",/*#__PURE__*/e(\"strong\",{children:\"You raise more money, you make more money, you hold more sensitive data.\"})]}),/*#__PURE__*/e(\"p\",{children:\"Your likelihood of having a data leak or becoming compromised scales exponentially as the organization grows, your value as a target grows right alongside your attack surface area.\"}),/*#__PURE__*/t(\"p\",{children:[\"And eventually \u2026 anything bad that can happen, \",/*#__PURE__*/e(\"strong\",{children:\"does\"}),\" happen.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"This is why large organizations are basically forced to invest in cybersecurity.\"}),\" At a certain scale and surface area it\u2019s basically a guarantee to become compromised. You are almost promised to become compromised if you do not invest in a certain level of security.\"]}),/*#__PURE__*/e(\"p\",{children:\"Some organizations absolutely begin to implement strong controls long before this happens, but also many don\u2019t.\"}),/*#__PURE__*/e(\"p\",{children:\"I\u2019m just going to be really transparent, trying to convince a CEO or a Chief Product Officer to invest in cybersecurity before they\u2019ve been hacked and personally feel the pain is going to be really really hard.\"}),/*#__PURE__*/e(\"p\",{children:\"You can try to show them personal stories of similar companies, industry stats, bring in consultants to give an outside view - but it\u2019s going to be hard.\"}),/*#__PURE__*/e(\"p\",{children:\"The secret cheat code? Help them see security as a way to increase revenue, not simply prevent threats.\"}),/*#__PURE__*/e(\"h2\",{children:\"Security gaps costing millions: It\u2019s blocking a deal.\"}),/*#__PURE__*/e(\"p\",{children:\"Because large startups are basically forced under a near inevitability of being compromised, to start investing in cybersecurity, they will begin to require that anyone who provides services or integrations to them are ALSO secure.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"This is your secret weapon\"}),\" if you are in an early stage company who has not yet experienced the pain of a security breach.\"]}),/*#__PURE__*/e(\"p\",{children:\"A strong security posture doesn\u2019t just help you prevent your organization from being compromised, it can be a critical tool and a strong value prop to your marketing & sales team.\"}),/*#__PURE__*/e(\"p\",{children:\"The dirty secret of a SOC 2 report is that it\u2019s for your marketers and sales reps, not necessarily your security team.\"}),/*#__PURE__*/t(\"p\",{children:[\"Your security team knows whether or not you are secure. The SOC 2 report is so \",/*#__PURE__*/e(\"strong\",{children:\"other people\"}),\" know you are secure.\"]}),/*#__PURE__*/e(\"p\",{children:\"When your organization is selling into a company that cares about security, actually becoming secure can help you unlock a LOT more business. Maybe it\u2019s only 5% of your business. But maybe 50% or more of your business has the potential of coming from enterprise organizations.\"}),/*#__PURE__*/e(\"p\",{children:\"A strong security posture helps you not only unblock these deals, but to maximize your revenue.\"}),/*#__PURE__*/e(\"p\",{children:\"Even 5% on a business that\u2019s doing $100M a year, is a $5M a year unlock. If half the business is enterprise? Then that\u2019s $50M a year that\u2019s being assisted and empowered through your security efforts.\"}),/*#__PURE__*/t(\"p\",{children:[\"A strong security posture is not only going to be a binary requirement for closing these deals, it\u2019s going to help you get through the process faster, \",/*#__PURE__*/e(\"strong\",{children:\"it\u2019s going to help you increase the speed of your buying cycles.\"})]}),/*#__PURE__*/e(\"p\",{children:\"You know what sales reps, CEO\u2019s, and CFO\u2019s all hate? Having a $1,000,000 deal held up for 3-4 weeks because the CISO is unhappy with one of your security controls.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Here\u2019s a few tricks to talk about the value of your security as it relates to revenue:\"})}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[\"Go into Hubspot or Salesforce, pull the account information, and \",/*#__PURE__*/e(\"strong\",{children:\"show the historic information\"}),\" of how many deals have been assisted by your security posture.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[\"Estimate the market size that can be unblocked by obtaining a strong security posture. \",/*#__PURE__*/e(\"strong\",{children:\"Show confidence intervals,\"}),\" \u201CIf we close 5 deals worth $100,000 each, that\u2019s $500k. If we close 20 deals worth $1,000,000 each that\u2019s $20M. In each case, our security expense is x% of this potential revenue.\u201D\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pull in quotes & feedback from the sales reps.\"}),\" How are they being impacted by CISO\u2019s and IT Managers asking about security? How often does this come up? \",/*#__PURE__*/e(\"strong\",{children:\"How long do deals get stuck in security review?\"})]})})]}),/*#__PURE__*/t(\"p\",{children:[\"If your business is selling into organizations that care about security, you should be able to turn your security posture not just into an operating cost that we want to keep as small as possible, but a value prop that people will want to invest into, \",/*#__PURE__*/e(\"strong\",{children:\"because it will help drive more revenue\"}),\" and speed up sales cycles.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Avoiding fines: It\u2019s required by law.\"}),/*#__PURE__*/e(\"p\",{children:\"The final reason that people invest into cybersecurity is that it\u2019s being required by law.\"}),/*#__PURE__*/t(\"p\",{children:[\"If this is you, I want to give a sincere plea to \",/*#__PURE__*/e(\"strong\",{children:\"please take this seriously\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"I get how hard it is to create a startup, to simply build something that somebody wants, to get to ramen profitability. Needing to comply with regulations like HIPAA or GDPR can seem like a colossal waste of time that\u2019s just getting in your way of driving revenue.\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019re being required by law to implement cybersecurity, you need to realize that this is only happening because you are handling some of the most sensitive data on the planet that governments have felt the need to regulate.\"}),/*#__PURE__*/t(\"p\",{children:[\"So take a deep breath, and meditate for a moment on what it \",/*#__PURE__*/e(\"strong\",{children:\"really means\"}),\" to protect your users privacy. That you are being entrusted with something sacred, your users trust.\"]}),/*#__PURE__*/e(\"p\",{children:\"Don\u2019t take this simply as a box that needs to be checked, and a list of bare minimum requirements we need to dance through, but a warning sign.\"}),/*#__PURE__*/e(\"p\",{children:\"You are holding sensitive data. People are very likely going to try and get this data from you. You need to protect it.\"}),/*#__PURE__*/e(\"p\",{children:\"\u2026 And there will be consequences if you do not protect.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"HIPAA violations have a four tiered system for fines & penalties:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Tier 1: Lack of knowledge: The lowest tier, with a minimum penalty of $127 and a maximum penalty of $30,487.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Tier 2: Reasonable cause and not willful neglect: A minimum penalty of $1,280 and a maximum penalty of $60,973.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Tier 3: Willful neglect, corrected within 30 days: A minimum penalty of $12,794 and a maximum penalty of $60,973.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Tier 4: Willful neglect, not timely corrected: A minimum penalty of $50,000 and a maximum penalty of $1,500,000.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"On top of all of the consequences of simply having a data breach or becoming compromised, depending on the regulation type there are additional imposed penalties for becoming compromised.\"}),/*#__PURE__*/t(\"p\",{children:[\"While these increase the negatives and risks of a data leak, it\u2019s all still important to remember that if you\u2019re in a regulated industry that likely means that the people you are selling into are going to care about security even more - \",/*#__PURE__*/e(\"strong\",{children:\"and that\u2019s an opportunity to drive more revenue\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Don\u2019t just become HIPAA compliant.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use it to differentiate yourself.\"}),\" Get a 3rd party attestation, implement strong controls, talk about it in your messaging.\"]}),/*#__PURE__*/e(\"p\",{children:\"The most boring brand advice about healthcare is \u201Cblue is the color of trust\u201D. It\u2019s boring but there\u2019s wisdom in this. In healthcare you should be baking trust into even the colors you display to your users.\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019re going to that level of extremes to convince potential users to use you, then going beyond simply checking boxes to actually building a strong real-world security posture is going to help you unlock more revenue.\"}),/*#__PURE__*/e(\"h2\",{children:\"TLDR on how to get CEO\u2019s to spend money on cybersecurity & compliance\"}),/*#__PURE__*/e(\"p\",{children:\"There\u2019s a great book called \u201Call marketers are liars\u201D and the moral of the story is that you can never get people to believe something new. You can only tell them what they already believe.\"}),/*#__PURE__*/e(\"p\",{children:\"I spend most of my days talking to CEO\u2019s & founders about spending money on cybersecurity, SOC 2, ISO 27001, HIPAA, GDPR, and more.\"}),/*#__PURE__*/t(\"p\",{children:[\"I\u2019ll tell you a secret - I\u2019ve never been able to get someone to change their mind. If they see security as a way to prevent threats, excellent. \",/*#__PURE__*/e(\"strong\",{children:\"I love those conversations.\"})]}),/*#__PURE__*/e(\"p\",{children:\"But if they are focused on \u201Cwhere do I invest my time, effort, and money to grow asap\u201D which in fairness is the #1 priority of most CEO\u2019s, then positioning cybersecurity as a tool to help maximize that revenue has been one of the most impactful ways to talk about investing in security.\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019re responsible for the security or compliance of your organization, I hope something in here was useful. \uD83D\uDE4F\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "2JAA+G,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sLAA4K,CAAC,EAAE,8TAA8T,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAAkIE,EAAEC,EAAE,CAAC,KAAK,iFAAiF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,wLAAqMA,EAAEC,EAAE,CAAC,KAAK,wEAAwE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAA0O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyHE,EAAEC,EAAE,CAAC,KAAK,gFAAgF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,iBAAiB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uEAAuE,CAAC,EAAE,qQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6CAA6C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8HAA8H,CAAC,EAAE,0JAA0J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gHAAgH,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyBE,EAAEC,EAAE,CAAC,KAAK,4EAA4E,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,wKAA8J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2cAA2c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sIAAsI,CAAC,EAAE,+HAA+H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAAqU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yMAAyM,CAAC,EAAE,aAA0BA,EAAEC,EAAE,CAAC,KAAK,4FAA4F,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,iTAAuS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+KAA+K,CAAC,EAAE,mDAAgEA,EAAEC,EAAE,CAAC,KAAK,oJAAoJ,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,kVAAkV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4HAA4H,CAAC,EAAE,uOAAuO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8HAA8H,CAAC,EAAE,iBAAiB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAA0W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iBAA8BE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,iFAA8FA,EAAEC,EAAE,CAAC,KAAK,kFAAkF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,6HAAwH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qMAAqM,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uNAAuN,CAAC,EAAE,IAAiBA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uGAAuG,CAAC,EAAE,8NAA8N,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAAsP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAuX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wHAAmH,CAAC,EAAE,qPAAqP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6ZAAmZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+FAA+F,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAAmS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,gFAAwFA,EAAEC,EAAE,CAAC,KAAK,mEAAmE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,wFAAwF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2OAA2O,CAAC,EAAE,8PAA8P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2DAAmEE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,2IAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mGAAmG,CAAC,EAAE,0NAA0N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2DAAwEE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,mWAAmW,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8ZAA8Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mLAAmL,CAAC,EAAE,2HAA2H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,mEAAmE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,mGAAmG,CAAC,EAAE,iQAAiQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uWAAkW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qLAAqL,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAAwS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gHAAgH,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4aAAua,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gLAAgL,CAAC,EAAE,uDAAuD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yMAAsNE,EAAE,SAAS,CAAC,SAAS,kHAAkH,CAAC,EAAE,iHAAiH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8IAA8I,CAAC,EAAE,2HAA2H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8FAA8F,CAAC,EAAE,yMAAoM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2FAA2F,CAAC,EAAE,0FAA0F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gHAAgH,CAAC,EAAE,sPAAiP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+HAA+H,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oIAAoI,CAAC,EAAE,0PAAqP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0HAA0H,CAAC,EAAE,sLAAsL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,EAAE,yNAAoN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kCAAkC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,EAAE,0TAA0T,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sGAAsG,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mNAA8M,CAAC,EAAE,wGAAwG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAmK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAoO,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mOAAmO,CAAC,EAAE,qUAA2T,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iKAAyKE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,sOAAmPA,EAAEC,EAAE,CAAC,KAAK,4CAA4C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,sLAAsL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uJAAuJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+FAA+F,CAAC,EAAE,yTAA+S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuCE,EAAEC,EAAE,CAAC,KAAK,qGAAqG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,0KAA2J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iXAAuW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0YAA2X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qHAAqH,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wOAAqPE,EAAEC,EAAE,CAAC,KAAK,8IAA8I,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,iXAA8XA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,6GAA6G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yMAAyM,CAAC,EAAE,iBAA8BA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,uJAAuJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kZAAkZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iZAAiZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,uTAAkT,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kOAAkO,CAAC,EAAE,yGAAyG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,sDAAsD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,0KAA0K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAEC,EAAE,CAAC,KAAK,sFAAsF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,mPAAmP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAEC,EAAE,CAAC,KAAK,iCAAiC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,+QAA+Q,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0FAA0F,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,wBAAwB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,0EAA0E,CAAC,EAAE,0QAA0Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyEE,EAAEC,EAAE,CAAC,KAAK,kFAAkF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,QAAqBA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,+MAA+M,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAEC,EAAE,CAAC,KAAK,uBAAuB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,kPAAkP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wDAAqEE,EAAEC,EAAE,CAAC,KAAK,uCAAuC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,mOAAmO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iDAA8DE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,mMAAmM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0LAA0L,CAAC,EAAE,8MAA8M,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wMAAwM,CAAC,EAAE,wJAAwJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8WAA8W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oKAAoK,CAAC,EAAE,iKAAiK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8WAA8W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,8ZAA8Z,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAqW,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6CAA6C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yFAAyF,CAAC,EAAE,qMAAqM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0KAAqK,CAAC,EAAE,6LAA6L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,oKAA4KA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,6DAA6D,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4HAA4H,CAAC,EAAE,0UAA0U,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wGAAqHE,EAAEC,EAAE,CAAC,KAAK,+EAA+E,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,6BAA6B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,qLAAqL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oHAAoH,CAAC,EAAE,0QAA0Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+IAA4JE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,sKAAsK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iEAAiE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yHAAyH,CAAC,EAAE,kWAA6V,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kHAAkH,CAAC,EAAE,uEAAoFA,EAAEC,EAAE,CAAC,KAAK,wBAAwB,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,kEAA+EA,EAAEC,EAAE,CAAC,KAAK,uCAAuC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,6EAA6E,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4IAA4I,CAAC,EAAE,0IAA0I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0JAAuKE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,qiBAAgiB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+MAA+M,CAAC,EAAE,2GAA2G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8CE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,wOAAwO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,iIAAiI,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,qTAAgT,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,mFAAmF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,yOAAyO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mGAAmG,CAAC,EAAE,kJAAkJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAAqJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kJAAkJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6LAA6L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iLAAiL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wNAAwN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAA8FE,EAAEC,EAAE,CAAC,KAAK,kFAAkF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,gMAAgM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,wFAAqGA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,2BAAwCA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,wOAAwO,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4GE,EAAE,SAAS,CAAC,SAAS,kKAAkK,CAAC,EAAE,qGAAqG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gfAA2e,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,EAAE,+KAA+K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0FAA0F,CAAC,EAAE,+LAA+L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+GAA4HE,EAAEC,EAAE,CAAC,KAAK,uGAAuG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qNAAqN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8WAAyW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0GAA0G,CAAC,EAAE,yLAAyL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4EAA4E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6HAA6H,CAAC,EAAE,0IAA0I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yFAAyF,CAAC,EAAE,kIAAkI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6EE,EAAEC,EAAE,CAAC,KAAK,mFAAmF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,+LAA+L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uLAAuL,CAAC,EAAE,oGAAoG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAEC,EAAE,CAAC,KAAK,uHAAuH,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,0MAA0M,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2FAA2F,CAAC,EAAE,mSAAmS,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,SAAS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4SAA8Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6UAA0VE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,kBAA+BA,EAAEC,EAAE,CAAC,KAAK,iFAAiF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,+EAA4FA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,iIAA4H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iHAAiH,CAAC,EAAE,0NAAqN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,6JAAmJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,2HAA2H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oJAAiKE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,6DAA6D,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6JAAyI,CAAC,EAAE,mGAAgHA,EAAEC,EAAE,CAAC,KAAK,gGAAgG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,uGAAuG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAyDE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,0UAAqU,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAAqI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kFAAkF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,wQAAwQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,iCAA8CA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8GAA8G,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4FAA4F,CAAC,EAAE,0DAA0D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,EAAE,4PAA4P,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoCE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,0NAA0N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6EE,EAAEC,EAAE,CAAC,KAAK,gDAAgD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,kFAA+FA,EAAEC,EAAE,CAAC,KAAK,uIAAuI,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,kMAAkM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,EAAE,mLAA8K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAEC,EAAE,CAAC,KAAK,oHAAoH,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,sIAAmJA,EAAEC,EAAE,CAAC,KAAK,mHAAmH,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wHAAwH,CAAC,EAAE,gHAAgH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6IAA6I,CAAC,EAAE,qGAAqG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wgBAAwgB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,6EAA6E,CAAC,EAAE,mPAA8O,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kaAA6Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,qDAAqD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sHAAsH,CAAC,EAAE,kBAAkB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sKAAiK,CAAC,EAAE,kOAA6N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4FAA4F,CAAC,EAAE,wOAAwO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uHAAuH,CAAC,EAAE,8OAAyO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wIAAwI,CAAC,EAAE,0NAA0N,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,geAAge,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2HAA2H,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0EAA0E,CAAC,EAAE,wUAAmU,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oGAAoG,CAAC,EAAE,yMAAyM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuCE,EAAEC,EAAE,CAAC,KAAK,mDAAmD,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAE,sKAAsK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kWAA+WE,EAAEC,EAAE,CAAC,KAAK,qCAAqC,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,QAAqBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,oCAA+B,CAAC,CAAC,CAAC,EAAE,iHAAiH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAEC,EAAE,CAAC,KAAK,iEAAiE,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,6HAA6H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,oHAAoH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kFAAkF,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,uHAAuH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2HAA2H,CAAC,EAAE,wOAAmO,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkEE,EAAEC,EAAE,CAAC,KAAK,mIAAmI,OAAO,YAAY,aAAa,GAAG,aAAa,GAAG,SAAsBD,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,+UAA0U,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAAqV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yGAAyG,CAAC,EAAE,kKAAkK,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAAmU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+MAA4NE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAuY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAgS,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+LAAmL,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAAyHE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAAyI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kFAAkF,CAAC,EAAE,kKAAwJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sEAAiE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAA8O,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8FAA4FE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,kBAAa,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oMAA4ME,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6CAA6C,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAA2H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA2GE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,oCAA+B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAsL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8PAA2QE,EAAE,SAAS,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uDAA+DE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,UAAU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kFAAkF,CAAC,EAAE,gMAA2L,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAiH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,kGAAkG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAAqL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAAwH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,uBAAuB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAyM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAAuKE,EAAE,SAAS,CAAC,SAAS,uEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6FAAwF,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuGE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,2MAAuL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,mHAA2HA,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+PAA4QE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,6BAA6B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAA4F,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oDAAiEE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA0Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAAqO,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+DAA4EE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,uGAAuG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8DAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0PAA6PE,EAAE,SAAS,CAAC,SAAS,sDAAiD,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,2FAA2F,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAA+N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4EAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAAqI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6JAAgKE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAAgS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAoH,CAAC,CAAC,CAAC,CAAC,EAC7+jJO,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "richText1", "richText2", "richText3", "richText4", "richText5", "__FramerMetadata__"]
}
