{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/kr2doaIOZPTF1mqTSKPc/iU1YGIb03wtFnQrPLD57/hJmV95wY7.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{addPropertyControls as n,ControlType as i}from\"framer\";import*as a from\"react\";let s=\"OpICLiqiX\",r=\"t3TCWJPLf\",o=\"DGA71kQjj\",c=\"jsvXl1sgu\",d=\"o5sEszVRE\",l=\"iCkErdp4p\",u=\"H4Nl31AH4\",h=\"bIQm9YpTZ\",p=\"LRl4pxAhv\",m=(e,t)=>{if(e&&\"object\"==typeof e)return{...e,alt:t};},g=[{index:0,id:\"OcrhgcIQe\",[s]:!0,[r]:\"The Evolution of Cloud Security: From Basic Measures to Hardened VMs\",[o]:\"The evolution of cloud security from basic measures to Hardened VMs marks a significant advancement in protecting digital assets against increasingly threats.\",[c]:\"evolution-of-cloud\",[d]:\"2022-02-28T00:00:00.000Z\",[l]:m({src:\"https://framerusercontent.com/images/5TuC8dag5g29D54MoXnUDLODdm4.jpg?scale-down-to=1024\"},\"Pink Flower\"),[u]:\"bp8rGNRsM\",[h]:\"GPItfVKF1\",[p]:/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The evolution of cloud security has been a journey marked by rapid technological advancements and shifting paradigms in data protection. Initially, organizations migrating to the cloud relied on basic security measures\u2014firewalls, antivirus software, and simple encryption methods. These were designed to guard against the most common threats of the time but, as the digital landscape evolved, so too did the complexity and sophistication of cyber attacks. This shift necessitated a revolution in cloud security strategies, leading to the development of Hardened Virtual Machines (VMs).\"}),/*#__PURE__*/e(\"p\",{children:\"Hardened VMs represent a quantum leap in cloud security, offering a multi-layered defense strategy that is both comprehensive and adaptable. Developed by North Security, these VMs are not just about fortifying the cloud environment; they're about transforming it into a fortress that can withstand the most advanced cyber threats. The hardening process involves a series of enhancements and configurations tailored to minimize vulnerabilities and reduce the attack surface. This includes everything from system and application-level configurations to the implementation of strict access controls and the latest in encryption technologies.\"}),/*#__PURE__*/e(\"p\",{children:\"One of the critical features of Hardened VMs is their ability to ensure compliance with regulatory standards. As organizations across various sectors move sensitive data into the cloud, adherence to compliance frameworks becomes a paramount concern. Hardened VMs are designed with this in mind, embedding compliance into their architecture. This not only helps organizations meet their regulatory obligations but also builds trust with customers and stakeholders.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, Hardened VMs by North Security are built to be future-proof. Recognizing that the threat landscape is constantly evolving, these VMs are designed for easy updates and scalability. This ensures that organizations can adapt to new threats as they arise, without having to overhaul their cloud infrastructure. The flexibility and resilience of Hardened VMs make them a critical asset for any organization looking to secure its cloud operations against both current and future cyber threats.\"}),/*#__PURE__*/e(\"p\",{children:\"The transition from basic security measures to Hardened VMs reflects a broader shift in how organizations approach data protection in the cloud. No longer is it sufficient to rely on perimeter defenses or basic encryption. Today's cloud environments require a dynamic, holistic approach to security\u2014one that Hardened VMs provide. By offering advanced protection, compliance, and adaptability, Hardened VMs are setting a new standard in cloud security.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, the evolution of cloud security from basic measures to the sophisticated defense mechanisms of Hardened VMs is a testament to the ongoing efforts to safeguard digital assets in an increasingly complex cyber environment. North Security's Hardened VMs stand at the forefront of this evolution, offering organizations the tools they need to protect their cloud environments against the myriad threats of the digital age. As we look to the future, the continued development and adoption of Hardened VMs will be pivotal in ensuring that the cloud remains a safe, reliable platform for business operations and data storage.\"})]})},{index:1,id:\"CKF9Sm_Yr\",[s]:!1,[r]:\"Why Hardened VMs are Essential for Meeting Compliance Standards in the Cloud\",[o]:\"Hardened VMs are crucial for cloud compliance, offering pre-configured security to meet regulatory standards efficiently.\",[c]:\"hardened-vms-essential\",[d]:\"2022-02-28T00:00:00.000Z\",[l]:m({src:\"https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/cMTWGqnm2evFQf0bomhy4i5VVs.jpg 6016w\"},\"Pink Flower\"),[u]:\"bp8rGNRsM\",[h]:\"UeTgu98Tw\",[p]:/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's digital era, where cloud computing has become the backbone of the global economy, maintaining the integrity, confidentiality, and availability of data has never been more crucial. As businesses continue to migrate their operations to the cloud, the complexity of regulatory compliance has significantly increased. This is where Hardened Virtual Machines (VMs) come into play, serving as an essential component for organizations aiming to meet and exceed compliance standards in the cloud.\"}),/*#__PURE__*/e(\"p\",{children:\"Hardened VMs are specially configured virtual machines that are optimized for security and compliance right out of the box. Unlike standard VMs, which may require extensive manual configuration to meet specific security standards, Hardened VMs are pre-configured with a host of security enhancements. These enhancements include advanced encryption, stricter access controls, reduced unnecessary services, and the latest security patches. By integrating these features, Hardened VMs provide a robust foundation for securing sensitive data and ensuring that cloud environments comply with stringent regulatory frameworks.\"}),/*#__PURE__*/e(\"p\",{children:\"One of the key benefits of utilizing Hardened VMs is their ability to streamline the compliance process. Regulatory standards, such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and the Payment Card Industry Data Security Standard (PCI DSS) globally, impose rigorous requirements on data protection. Hardened VMs are designed with these regulations in mind, ensuring that organizations can achieve compliance more efficiently and effectively. This not only reduces the risk of non-compliance penalties but also enhances trust among customers and partners.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, Hardened VMs play a pivotal role in minimizing the attack surface of cloud environments. By eliminating unnecessary services and applying strict access controls, these VMs reduce the potential entry points for cyber attackers. This is particularly important in an era where data breaches and cyber-attacks are becoming increasingly sophisticated and can have devastating consequences on an organization's reputation and financial health. Hardened VMs provide a critical layer of defense, safeguarding sensitive data against external and internal threats.\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to security and compliance, Hardened VMs offer scalability and flexibility. As organizations grow and their data processing needs evolve, the cloud environment must adapt quickly. Hardened VMs are designed to scale seamlessly, allowing businesses to expand their cloud infrastructure while maintaining compliance and security standards. This adaptability ensures that organizations can continue to innovate and pursue their business objectives without compromising on data protection.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, Hardened VMs are not just a luxury; they are a necessity for organizations looking to secure their cloud environments and meet compliance standards. With their pre-configured security enhancements, streamlined compliance capabilities, and scalability, Hardened VMs offer a comprehensive solution to the complex challenges of cloud security and regulatory compliance. As the cloud continues to play a crucial role in the digital economy, adopting Hardened VMs will be key to ensuring the integrity, confidentiality, and availability of data in the cloud.\"})]})},{index:2,id:\"gyNpCwNA1\",[s]:!1,[r]:\"Top 5 Risks in Cloud Computing and How North Security's Hardened VMs Mitigate Them\",[o]:\"North Security's Hardened VMs mitigate top cloud risks, ensuring secure, reliable cloud computing environments.\",[c]:\"risks-of-cloud\",[d]:\"2022-02-28T00:00:00.000Z\",[l]:m({src:\"https://framerusercontent.com/images/G8jFkagsHda8RIhPnOTGVgmc8hw.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/G8jFkagsHda8RIhPnOTGVgmc8hw.jpg?scale-down-to=1024 819w, https://framerusercontent.com/images/G8jFkagsHda8RIhPnOTGVgmc8hw.jpg?scale-down-to=2048 1638w, https://framerusercontent.com/images/G8jFkagsHda8RIhPnOTGVgmc8hw.jpg?scale-down-to=4096 3276w, https://framerusercontent.com/images/G8jFkagsHda8RIhPnOTGVgmc8hw.jpg 4000w\"},\"Pink Flower\"),[u]:\"bp8rGNRsM\",[h]:\"m9wP5aKYn\",[p]:/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this technological advancement comes with its share of risks. Understanding these risks is the first step toward mitigating them, and North Security's Hardened VMs play a crucial role in this process. Here, we explore the top five risks in cloud computing and how North Security's Hardened VMs address these challenges.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Breaches\"}),\": Perhaps the most significant risk associated with cloud computing is the potential for data breaches. Such breaches can lead to substantial financial losses and damage to an organization's reputation. North Security's Hardened VMs tackle this risk head-on with advanced encryption methods and secure data storage solutions, ensuring that sensitive information is protected at all times, even in the event of a breach.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Insufficient Identity, Credential, and Access Management\"}),\": Weak identity and access management can provide attackers with easy access to your systems. North Security combats this by implementing robust authentication mechanisms within their Hardened VMs, including multi-factor authentication and strict access controls, thus ensuring that only authorized personnel can access critical data.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Insecure Interfaces and APIs\"}),\": Interfaces and APIs provide essential points of interaction with cloud services, but they also present potential vulnerabilities if not properly secured. North Security's Hardened VMs come with securely designed APIs, which are regularly updated to prevent unauthorized access, ensuring a secure interface for users and administrators.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Vulnerabilities\"}),\": Cloud systems, like any other technology, can be susceptible to vulnerabilities. These can be exploited by cybercriminals to infiltrate the network. North Security addresses this by ensuring their Hardened VMs are always equipped with the latest security patches and by conducting regular vulnerability assessments to identify and remediate potential security gaps promptly.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account Hijacking\"}),\": Account or service hijacking remains a significant threat in cloud computing. Attackers may use phishing attacks or exploit software vulnerabilities to gain access to users' accounts. By leveraging Hardened VMs, North Security enhances security with continuous monitoring and anomaly detection tools, significantly reducing the risk of account hijacking.\"]}),/*#__PURE__*/e(\"p\",{children:\"North Security's Hardened VMs not only address these risks but also provide a foundation for a secure and compliant cloud computing environment. They are designed from the ground up with security in mind,incorporating a layered defense strategy that includes physical security, network security, and application security. This comprehensive approach ensures that all aspects of the cloud environment are fortified against potential threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, North Security understands that security is not just about technology but also about processes and people. To this end, their Hardened VMs are accompanied by best practices and training for users and administrators, fostering a culture of security awareness within organizations. This holistic approach ensures that security measures are effectively implemented and maintained, further mitigating the risks associated with cloud computing.\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to the direct security benefits, North Security's Hardened VMs also offer peace of mind. Knowing that your cloud infrastructure is built on a secure, reliable foundation allows businesses to focus on innovation and growth, without the constant worry of cybersecurity threats. This security assurance is invaluable in today's digital landscape, where trust and reliability are paramount.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, while cloud computing offers numerous benefits, it also introduces a range of security risks. However, with North Security's Hardened VMs, organizations can navigate the cloud confidently, knowing that their data and systems are protected against the top risks in cloud computing. By prioritizing security and compliance, North Security's Hardened VMs provide a robust solution that supports the safe and efficient use of cloud technology.\"})]})},{index:3,id:\"NiKbmob2S\",[s]:!1,[r]:\"How to Seamlessly Transition to Hardened VMs for Enhanced Cloud Security\",[o]:\"Seamlessly transition to Hardened VMs with strategic planning, training, and optimization for superior cloud security.\",[c]:\"seemless-transition\",[d]:\"2022-02-28T00:00:00.000Z\",[l]:m({src:\"https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/Ac5CcNxC2TIhwCPM0E6wayau964.jpg 6720w\"},\"Pink Flower\"),[u]:\"bp8rGNRsM\",[h]:\"m9wP5aKYn\",[p]:/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Transitioning to Hardened Virtual Machines (VMs) is a strategic move for businesses seeking to bolster their cloud security. This process, while crucial, can be complex and requires careful planning and execution. North Security's Hardened VMs offer a pathway to enhanced cloud security, ensuring that businesses can make the switch smoothly and effectively. Here's how to seamlessly transition to Hardened VMs for improved protection of your digital assets.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 1: Assess Your Current Infrastructure\"}),\" Begin by conducting a thorough assessment of your existing cloud infrastructure. Identify the virtual machines currently in use, understand their configurations, and evaluate the data and applications they host. This assessment will highlight the specific security needs of your organization and how Hardened VMs can meet them.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 2: Understand Hardened VM Capabilities\"}),\" Before transitioning, it's crucial to understand what Hardened VMs offer. North Security's Hardened VMs are designed with built-in security features such as advanced encryption, intrusion detection systems, and automated compliance checks. Familiarize yourself with these capabilities and how they align with your security requirements.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 3: Plan Your Transition\"}),\" With a clear understanding of your current setup and the benefits of Hardened VMs, develop a transition plan. This plan should include timelines, resource allocation, and a detailed process for migrating your data and applications. Consider starting with a pilot project to transition a small, non-critical section of your infrastructure to Hardened VMs. This allows you to address any challenges on a smaller scale before a full rollout.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 4: Train Your Team\"}),\" Ensure your team is prepared for the transition by providing training on the new systems. This includes security best practices, management of Hardened VMs, and how to respond to security incidents. An informed and prepared team is crucial for a successful transition.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 5: Implement and Migrate\"}),\" With the plan in place and your team ready, begin the implementation of Hardened VMs. Migrate your data and applications according to the plan, ensuring that there is minimal disruption to your operations. Utilize the security features of Hardened VMs to their full extent, configuring them to meet your specific needs.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 6: Monitor and Optimize\"}),\" After the transition, continuously monitor the performance and security of your Hardened VMs. Be proactive in identifying and addressing any issues. Regularly review and optimize the configurations to ensure that your cloud environment remains secure against evolving threats.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Step 7: Maintain Compliance\"}),\" Lastly, leverage the automated compliance features of Hardened VMs to ensure your cloud infrastructure adheres to relevant regulations and standards. Regular compliance checks will help avoid potential legal and financial penalties.\"]}),/*#__PURE__*/e(\"p\",{children:\"Transitioning to North Security's Hardened VMs represents a significant upgrade in cloud security. By following these steps, businesses can ensure a smooth and effective transition, significantly enhancing their defense against cyber threats. The shift not only secures your digital assets but also instills confidence among stakeholders, demonstrating a commitment to maintaining a secure and reliable cloud environment.\"})]})},{index:4,id:\"tpAMq4f9t\",[s]:!1,[r]:\"The Role of AI in Strengthening Cloud VMs: Inside North Security's Approach\",[o]:\"AI elevates cloud VM security with predictive analytics, automated responses, and compliance monitoring.\",[c]:\"ai-strength\",[d]:\"2022-04-08T00:00:00.000Z\",[l]:m({src:\"https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg?scale-down-to=4096\",srcSet:\"https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg?scale-down-to=512 512w, https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg?scale-down-to=1024 1024w, https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg?scale-down-to=2048 2048w, https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg?scale-down-to=4096 4096w, https://framerusercontent.com/images/Uo4kHKvmrD87exvy5Z2rMEpvts.jpg 5300w\"},\"Blue Flower\"),[u]:\"bp8rGNRsM\",[h]:\"GPItfVKF1\",[p]:/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The integration of Artificial Intelligence (AI) into cloud security represents a groundbreaking shift in how businesses protect their virtual environments. North Security is at the forefront of this evolution, leveraging AI to significantly enhance the security capabilities of their cloud Virtual Machines (VMs). This post delves into the pivotal role AI plays in strengthening cloud VMs and provides an inside look at North Security's innovative approach.\"}),/*#__PURE__*/e(\"p\",{children:\"AI transforms cloud security by bringing advanced analytics, predictive capabilities, and automated response actions to the table. This technology allows for the continuous monitoring of cloud environments, detecting anomalies that could indicate potential security threats. North Security's Hardened VMs integrate AI to offer a proactive defense mechanism, identifying and mitigating risks before they can impact the business.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Predictive Threat Detection\"})}),/*#__PURE__*/e(\"p\",{children:\"One of the most significant advantages of incorporating AI into cloud VMs is the ability to predict and identify potential threats based on patterns and behaviors. North Security utilizes machine learning algorithms to analyze vast amounts of data, learning from past incidents to identify potential future attacks. This predictive capability enables businesses to stay one step ahead of cybercriminals, ensuring that their cloud environments are safeguarded against both known and emerging threats.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Automated Incident Response\"})}),/*#__PURE__*/e(\"p\",{children:\"AI's ability to automate responses to detected threats is another game-changer. In the event of a security breach or anomaly, North Security's AI-powered Hardened VMs can automatically implement countermeasures to isolate and neutralize the threat. This rapid response capability significantly reduces the window of opportunity for attackers, minimizing potential damage and ensuring business continuity.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Enhanced Compliance Monitoring\"})}),/*#__PURE__*/e(\"p\",{children:\"Compliance with regulatory standards is a critical concern for businesses operating in the cloud. North Security's AI-driven approach includes automated compliance monitoring, ensuring that cloud VMs adhere to industry regulations and standards. AI algorithms continuously scan the cloud environment, identifying non-compliance issues and automating corrective actions. This not only ensures ongoing compliance but also simplifies the compliance management process for businesses.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Optimizing Security Operations\"})}),/*#__PURE__*/e(\"p\",{children:\"Beyond threat detection and response, AI plays a crucial role in optimizing the overall security operations of cloud VMs. North Security leverages AI to analyze security logs and data, identifying trends and insights that can improve security strategies. This analytical capability enables businesses to fine-tune their security posture, ensuring that resources are allocated effectively and vulnerabilities are addressed promptly.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Continuous Learning and Adaptation\"})}),/*#__PURE__*/e(\"p\",{children:\"Perhaps the most compelling aspect of AI in cloud security is its ability to learn and adapt over time. As new threats emerge and the digital landscape evolves, AI algorithms adjust and evolve, ensuring that North Security's Hardened VMs remain at the cutting edge of cloud security. This continuous learning process ensures that businesses are equipped with a dynamic and resilient defense mechanism against cyber threats.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, the role of AI in strengthening cloud VMs is transformative, offering businesses unprecedented levels of security and protection. North Security's approach, which integrates AI into their Hardened VMs, represents a significant advancement in cloud security technology. By harnessing the power of AI, North Security provides businesses with a proactive, intelligent, and adaptive security solution that is equipped to meet the challenges of the digital age.\"})]})}];for(let e of g)Object.freeze(e);n(g,{OpICLiqiX:{defaultValue:!1,title:\"Featured\",type:i.Boolean},t3TCWJPLf:{defaultValue:\"\",title:\"Title\",type:i.String},DGA71kQjj:{defaultValue:\"\",maxLength:160,title:\"Short Text\",type:i.String},jsvXl1sgu:{title:\"Slug\",type:i.String},o5sEszVRE:{defaultValue:\"\",title:\"Date\",type:i.Date},iCkErdp4p:{title:\"Image\",type:i.ResponsiveImage},H4Nl31AH4:{defaultValue:\"bp8rGNRsM\",options:[\"bp8rGNRsM\",\"bOJnXnCqQ\",\"ekQdcg_G4\"],optionTitles:[\"Business\",\"Finance\",\"Life\"],title:\"Category\",type:i.Enum},bIQm9YpTZ:{defaultValue:\"GPItfVKF1\",options:[\"GPItfVKF1\",\"UeTgu98Tw\",\"m9wP5aKYn\"],optionTitles:[\"Alexi Vandermere\",\"Isadora Quinlan\",\"Rowan Thatch\"],title:\"Author\",type:i.Enum},LRl4pxAhv:{defaultValue:\"\",title:\"Content\",type:i.RichText}}),g.displayName=\"Articles\";export default g;export const H4Nl31AH4ToDisplayName=(e,t)=>{switch(null==t||t.fallback,e){case\"bp8rGNRsM\":return\"Business\";case\"bOJnXnCqQ\":return\"Finance\";case\"ekQdcg_G4\":return\"Life\";default:return\"\";}};export const bIQm9YpTZToDisplayName=(e,t)=>{switch(null==t||t.fallback,e){case\"GPItfVKF1\":return\"Alexi Vandermere\";case\"UeTgu98Tw\":return\"Isadora Quinlan\";case\"m9wP5aKYn\":return\"Rowan Thatch\";default:return\"\";}};export const enumToDisplayNameFunctions={bIQm9YpTZ:bIQm9YpTZToDisplayName,H4Nl31AH4:H4Nl31AH4ToDisplayName};export const utils={async getSlugByRecordId(e,t){var n;return null===(n=g.find(t=>t.id===e))||void 0===n?void 0:n[c];},async getRecordIdBySlug(e,t){var n;return null===(n=g.find(t=>t[c]===e))||void 0===n?void 0:n.id;}};\nexport const __FramerMetadata__ = {\"exports\":{\"bIQm9YpTZToDisplayName\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"H4Nl31AH4ToDisplayName\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"enumToDisplayNameFunctions\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"default\":{\"type\":\"data\",\"name\":\"data\",\"annotations\":{\"framerContractVersion\":\"1\",\"framerRecordIndexKey\":\"index\",\"framerRecordIncludedLocalesKey\":\"includedLocales\",\"framerCollectionUtils\":\"1\",\"framerData\":\"\",\"framerRecordIdKey\":\"id\",\"framerCollectionId\":\"hJmV95wY7\",\"framerSlug\":\"jsvXl1sgu\",\"framerEnumToDisplayNameUtils\":\"2\"}},\"utils\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "uGAAwI,IAAIA,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,YAAYC,EAAE,CAACC,EAAEC,IAAI,CAAC,GAAGD,GAAa,OAAOA,GAAjB,SAAmB,MAAM,CAAC,GAAGA,EAAE,IAAIC,CAAC,CAAE,EAAEC,EAAE,CAAC,CAAC,MAAM,EAAE,GAAG,YAAY,CAACZ,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,uEAAuE,CAACC,CAAC,EAAE,iKAAiK,CAACC,CAAC,EAAE,qBAAqB,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEI,EAAE,CAAC,IAAI,yFAAyF,EAAE,aAAa,EAAE,CAACH,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAeF,EAAIO,EAAS,CAAC,SAAS,CAAcL,EAAE,IAAI,CAAC,SAAS,glBAA2kB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,goBAAgoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,idAAid,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mfAAmf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAAqc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0nBAA0nB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACR,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,+EAA+E,CAACC,CAAC,EAAE,4HAA4H,CAACC,CAAC,EAAE,yBAAyB,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEI,EAAE,CAAC,IAAI,yFAAyF,OAAO,icAAic,EAAE,aAAa,EAAE,CAACH,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAeF,EAAIO,EAAS,CAAC,SAAS,CAAcL,EAAE,IAAI,CAAC,SAAS,qfAAqf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6mBAA6mB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ipBAAipB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sjBAAsjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kfAAkf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0jBAA0jB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACR,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,qFAAqF,CAACC,CAAC,EAAE,kHAAkH,CAACC,CAAC,EAAE,iBAAiB,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEI,EAAE,CAAC,IAAI,0FAA0F,OAAO,wWAAwW,EAAE,aAAa,EAAE,CAACH,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAeF,EAAIO,EAAS,CAAC,SAAS,CAAcL,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,qaAAqa,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,EAAE,gVAAgV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,mVAAmV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0XAA0X,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sWAAsW,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mcAAmc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gZAAgZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wcAAwc,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACR,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,2EAA2E,CAACC,CAAC,EAAE,yHAAyH,CAACC,CAAC,EAAE,sBAAsB,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEI,EAAE,CAAC,IAAI,0FAA0F,OAAO,scAAsc,EAAE,aAAa,EAAE,CAACH,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAeF,EAAIO,EAAS,CAAC,SAAS,CAAcL,EAAE,IAAI,CAAC,SAAS,4cAA4c,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,0UAA0U,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,mVAAmV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,ybAAyb,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,+QAA+Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,kUAAkU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,uRAAuR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,2OAA2O,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uaAAua,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,YAAY,CAACR,CAAC,EAAE,GAAG,CAACC,CAAC,EAAE,8EAA8E,CAACC,CAAC,EAAE,2GAA2G,CAACC,CAAC,EAAE,cAAc,CAACC,CAAC,EAAE,2BAA2B,CAACC,CAAC,EAAEI,EAAE,CAAC,IAAI,yFAAyF,OAAO,icAAic,EAAE,aAAa,EAAE,CAACH,CAAC,EAAE,YAAY,CAACC,CAAC,EAAE,YAAY,CAACC,CAAC,EAAeF,EAAIO,EAAS,CAAC,SAAS,CAAcL,EAAE,IAAI,CAAC,SAAS,2cAA2c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qfAAqf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sZAAsZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,keAAke,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ibAAib,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAAya,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ydAAyd,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,QAAQE,KAAKE,EAAE,OAAO,OAAOF,CAAC,EAAEI,EAAEF,EAAE,CAAC,UAAU,CAAC,aAAa,GAAG,MAAM,WAAW,KAAKG,EAAE,OAAO,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,QAAQ,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,aAAa,GAAG,UAAU,IAAI,MAAM,aAAa,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,MAAM,OAAO,KAAKA,EAAE,MAAM,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,OAAO,KAAKA,EAAE,IAAI,EAAE,UAAU,CAAC,MAAM,QAAQ,KAAKA,EAAE,eAAe,EAAE,UAAU,CAAC,aAAa,YAAY,QAAQ,CAAC,YAAY,YAAY,WAAW,EAAE,aAAa,CAAC,WAAW,UAAU,MAAM,EAAE,MAAM,WAAW,KAAKA,EAAE,IAAI,EAAE,UAAU,CAAC,aAAa,YAAY,QAAQ,CAAC,YAAY,YAAY,WAAW,EAAE,aAAa,CAAC,mBAAmB,kBAAkB,cAAc,EAAE,MAAM,SAAS,KAAKA,EAAE,IAAI,EAAE,UAAU,CAAC,aAAa,GAAG,MAAM,UAAU,KAAKA,EAAE,QAAQ,CAAC,CAAC,EAAEH,EAAE,YAAY,WAAW,IAAOI,EAAQJ,EAAeK,EAAuB,CAACP,EAAEC,IAAI,CAAC,OAAgBA,GAAE,SAASD,EAAE,CAAC,IAAI,YAAY,MAAM,WAAW,IAAI,YAAY,MAAM,UAAU,IAAI,YAAY,MAAM,OAAO,QAAQ,MAAM,EAAG,CAAC,EAAeQ,EAAuB,CAACR,EAAEC,IAAI,CAAC,OAAgBA,GAAE,SAASD,EAAE,CAAC,IAAI,YAAY,MAAM,mBAAmB,IAAI,YAAY,MAAM,kBAAkB,IAAI,YAAY,MAAM,eAAe,QAAQ,MAAM,EAAG,CAAC,EAAeS,EAA2B,CAAC,UAAUD,EAAuB,UAAUD,CAAsB,EAAeG,EAAM,CAAC,MAAM,kBAAkBV,EAAEC,EAAE,CAAC,IAAIU,EAAE,OAAeA,EAAET,EAAE,KAAKD,GAAGA,EAAE,KAAKD,CAAC,KAA5B,MAAyCW,IAAT,OAAW,OAAOA,EAAElB,CAAC,CAAE,EAAE,MAAM,kBAAkBO,EAAEC,EAAE,CAAC,IAAIU,EAAE,OAAeA,EAAET,EAAE,KAAKD,GAAGA,EAAER,CAAC,IAAIO,CAAC,KAA5B,MAAyCW,IAAT,OAAW,OAAOA,EAAE,EAAG,CAAC,EAC98yBC,EAAqB,CAAC,QAAU,CAAC,uBAAyB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,uBAAyB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,2BAA6B,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,QAAU,CAAC,KAAO,OAAO,KAAO,OAAO,YAAc,CAAC,sBAAwB,IAAI,qBAAuB,QAAQ,+BAAiC,kBAAkB,sBAAwB,IAAI,WAAa,GAAG,kBAAoB,KAAK,mBAAqB,YAAY,WAAa,YAAY,6BAA+B,GAAG,CAAC,EAAE,MAAQ,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["s", "r", "o", "c", "d", "l", "u", "h", "p", "m", "e", "t", "g", "x", "addPropertyControls", "ControlType", "hJmV95wY7_default", "H4Nl31AH4ToDisplayName", "bIQm9YpTZToDisplayName", "enumToDisplayNameFunctions", "utils", "n", "__FramerMetadata__"]
}
