{"id":1842,"date":"2021-10-27T09:14:30","date_gmt":"2021-10-27T16:14:30","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=1842"},"modified":"2021-11-03T08:17:51","modified_gmt":"2021-11-03T15:17:51","slug":"2021-cyberattack-developments","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/","title":{"rendered":"2021 Cyberattack Developments"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Malware, Ransomware, and spyware are just a few examples of threats that are designed to infiltrate vulnerable software. As a result, hackers can steal personal information such as social security numbers or bank passwords. The Microsoft Digital Defense Report shared that while hackers are hitting hard, cybersecurity is hitting harder.<\/p>\n\n\n\n<p>As governments perceive cybercrime as a danger to national security, they are enacting new laws and investing more resources.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Earlier this month, Microsoft published the&nbsp;<a class=\"\" href=\"https:\/\/aka.ms\/microsoftdigitaldefensereport\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Microsoft Digital Defense Report<\/a>&nbsp;(MDDR). Drawing upon over 24 trillion daily security signals across the Microsoft cloud, endpoints, and the intelligent edge, the 2021 MDDR expands upon last year\u2019s&nbsp;<a href=\"https:\/\/go.microsoft.com\/fwlink\/p\/?LinkID=2173968&amp;clcid=0x409&amp;culture=en-us&amp;country=US\" target=\"_blank\" rel=\"noreferrer noopener\">inaugural report<\/a>&nbsp;and contains input from more than 8,500 security experts spanning 77 countries\u2014including insights on the evolving state of ransomware, malicious email, malware, and more.<\/p><cite>Source: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/10\/11\/how-cyberattacks-are-changing-according-to-new-microsoft-digital-defense-report\/\">Microsoft<\/a><\/cite><\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"323\" src=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-1024x323.png\" alt=\"\" class=\"wp-image-1843\" srcset=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-1024x323.png 1024w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-300x95.png 300w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-768x242.png 768w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-1536x484.png 1536w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-2048x645.png 2048w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-10.07.18-AM-624x197.png 624w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Source: Microsoft Digital Defense Report<\/figcaption><\/figure>\n\n\n\n<p>To avoid dangerous cyber assaults, make sure your antivirus software is up to date on your computer. Windows 10 has Ransomware protection as part of its operating system.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>In the Settings app, you\u2019ll find a plethora of protection settings, including&nbsp;<strong>Firewall &amp; network protection<\/strong>. You\u2019ll also notice&nbsp;<strong>Virus &amp; threat protection<\/strong>, which easily scans your device to search for any possible attacks.<\/p><cite>Source:&nbsp;<a href=\"https:\/\/www.gilbertcomputerrepairservice.net\/blog\/ransomware-defense-on-windows-10\/\">Gilbert Computer Repair Service<\/a><\/cite><\/blockquote>\n\n\n\n<p>Ransomware protection is provided if you scroll to the bottom of the Virus &amp; threat prevention section. Simply click on Manage ransomware protection to enable this useful tool. You may then flip the toggle On to safeguard your data on your PC. In the event that danger arises, recovering files becomes an extra option.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p>If you have any questions regarding ransomware, call us at\u00a0<a href=\"tel:1-800-620-5285\">1-800-620-5285<\/a>. \u00a0Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you by our staff at the\u00a0<strong><a href=\"https:\/\/www.stpetersburgcomputerrepairservice.com\/\">St. Petersburg Computer Repair Service<\/a><\/strong>. If you need\u00a0computer repair in St. Petersburg, FL\u00a0please call our local office at\u00a0<a href=\"tel:727-350-1090\">(727) 350-1090<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware, Ransomware, and spyware are just a few examples of threats that are designed to infiltrate vulnerable software. As a result, hackers can steal personal information such as social security numbers or bank passwords. The Microsoft Digital Defense Report shared that while hackers are hitting hard, cybersecurity is hitting harder. As governments perceive cybercrime as [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":1045,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[11],"class_list":["post-1842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2021 Cyberattack Developments - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2021 Cyberattack Developments - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"Malware, Ransomware, and spyware are just a few examples of threats that are designed to infiltrate vulnerable software. As a result, hackers can steal personal information such as social security numbers or bank passwords. The Microsoft Digital Defense Report shared that while hackers are hitting hard, cybersecurity is hitting harder. As governments perceive cybercrime as [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-27T16:14:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-03T15:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"2021 Cyberattack Developments\",\"datePublished\":\"2021-10-27T16:14:30+00:00\",\"dateModified\":\"2021-11-03T15:17:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\"},\"wordCount\":326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg\",\"keywords\":[\"Windows 10\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\",\"name\":\"2021 Cyberattack Developments - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg\",\"datePublished\":\"2021-10-27T16:14:30+00:00\",\"dateModified\":\"2021-11-03T15:17:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2021 Cyberattack Developments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2021 Cyberattack Developments - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/","og_locale":"en_US","og_type":"article","og_title":"2021 Cyberattack Developments - Computer Repair Blog","og_description":"Malware, Ransomware, and spyware are just a few examples of threats that are designed to infiltrate vulnerable software. As a result, hackers can steal personal information such as social security numbers or bank passwords. The Microsoft Digital Defense Report shared that while hackers are hitting hard, cybersecurity is hitting harder. As governments perceive cybercrime as [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2021-10-27T16:14:30+00:00","article_modified_time":"2021-11-03T15:17:51+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","type":"image\/jpeg"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"2021 Cyberattack Developments","datePublished":"2021-10-27T16:14:30+00:00","dateModified":"2021-11-03T15:17:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/"},"wordCount":326,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","keywords":["Windows 10"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/","url":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/","name":"2021 Cyberattack Developments - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","datePublished":"2021-10-27T16:14:30+00:00","dateModified":"2021-11-03T15:17:51+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"2021 Cyberattack Developments"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1842"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=1842"}],"version-history":[{"count":2,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1842\/revisions"}],"predecessor-version":[{"id":1882,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1842\/revisions\/1882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/1045"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=1842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=1842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=1842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}