{"id":447,"date":"2021-06-24T06:45:46","date_gmt":"2021-06-24T06:45:46","guid":{"rendered":"https:\/\/sattrix.com\/blog\/?p=447"},"modified":"2024-07-20T10:59:19","modified_gmt":"2024-07-20T10:59:19","slug":"how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company","status":"publish","type":"post","link":"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/","title":{"rendered":"How We Improve the Cybersecurity Posture of Global Electronic Manufacturing Company?"},"content":{"rendered":"<p style=\"text-align: justify;\">Cybersecurity is very crucial for businesses, especially nowadays when attacks are so common. According to recent data, hackers attack a computer every 39 seconds in the United States, and globally, 30,000 websites are hacked daily.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_69 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#1_Do_a_Cybersecurity_Risk_Check\" title=\"1. Do a Cybersecurity Risk Check\u00a0\">1. Do a Cybersecurity Risk Check\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#2_Network_Segmentation\" title=\"2. Network Segmentation\u00a0\">2. Network Segmentation\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#3_Password_Selection\" title=\"3. Password Selection\u00a0\">3. Password Selection\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#4_Daily_Secure_Backups\" title=\"4. Daily Secure Backups\u00a0\">4. Daily Secure Backups\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#5_Educate_Your_Users\" title=\"5. Educate Your Users \u00a0\">5. Educate Your Users \u00a0<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span>These stats are enough to show that cybercrime activities are at their peak. Therefore, every business needs to improve its cybersecurity posture to tackle all kinds of online attacks. Here is a list of steps that you must take to boost the security of your systems:<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h5><span class=\"ez-toc-section\" id=\"1_Do_a_Cybersecurity_Risk_Check\"><\/span><b><span data-contrast=\"auto\">1. Do a Cybersecurity Risk Check<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">The very first step in ensuring the safety of your network is doing a complete cybersecurity risk check. This will help you in finding all the weaknesses of your system at all levels. Further, the malware can break into your system through anything. Therefore, it&#8217;s also essential to check your third-party vendors for risks. Outline all the risks from the above assessment and prepare a defense plan that can help you to enhance companies\u2019 cybersecurity posture.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"2_Network_Segmentation\"><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">2. <\/span><b><span data-contrast=\"auto\">Network Segmentation<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">It is one of the primary and crucial methods to prevent your company from cyber risks. Network Segmentation includes dividing your organization into different compartments. The main benefit of doing so is when one part of your system is breached, the crackers will not have immediate access to the whole network. This will save your system from colossal loss and makes recovery easy. Also, ask your managed SOC services provider\u00a0to put all your critical business information in a different segment with minimal people access.\u00a0<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h5><span class=\"ez-toc-section\" id=\"3_Password_Selection\"><\/span><b><span data-contrast=\"auto\">3. Password Selection<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Most individuals use passwords resembling their personal information like names, dates\u00a0of birth, and phone numbers. Such passwords are readily guessable by using advanced algorithms. Therefore, using non-personal, non-dictionary, and multi-character passwords is suggested to make them hard to crack.\u00a0<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\">Also, occasionally change the passwords of all your devices, including printers, scanners, security devices, computers, and smartphones, to add an extra layer to cybersecurity.\u00a0<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h5><span class=\"ez-toc-section\" id=\"4_Daily_Secure_Backups\"><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">4. <\/span><b><span data-contrast=\"auto\">Daily Secure Backups<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Backups are one major component of cybersecurity. During a cyberattack, your data might be deleted or altered. Therefore, if you have a backup, then you can quickly neutralize the cyberattack. Every managed <a href=\"https:\/\/www.sattrix.com\/managed-services\/soc-as-a-service.php\"><strong><u>SOC service providers in India<\/u><\/strong><\/a><span data-contrast=\"auto\">\u00a0believes in implementing daily and secure backups of all your data. Automatic Cloud-based backups can be a good option because they support all types of devices and offer more convenience.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h5><span class=\"ez-toc-section\" id=\"5_Educate_Your_Users\"><\/span><b><span data-contrast=\"auto\">5. Educate Your Users <\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Teaching every employee about cybersecurity is very necessary. It can be easy to target one of your non-techy employees and enter your network through them. Hence, your employees can be proven to be the weakest link in cybersecurity unless you provide them with all the basic knowledge of cyberattacks. Companies can also set up a weekly seminar or a training program for their employees to teach them all basics of cybercrimes.\u00a0<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span data-contrast=\"auto\">Conclusion<\/span><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p style=\"text-align: justify;\">These are five best practices every company should do to keep all their confidential data protected. Certain other things can also help in improving the cybersecurity posture of your global electronic manufacturing company. This includes implementing automated <strong><a href=\"https:\/\/www.sattrix.com\/\">cybersecurity solutions<\/a><\/strong>, multi-factor authentication, endpoint protection and secure internet access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is very crucial for businesses, especially nowadays when attacks are so common. According to<\/p>\n","protected":false},"author":1,"featured_media":465,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[22,15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How We Improve the Cybersecurity Posture?- Sattrix<\/title>\n<meta name=\"description\" content=\"Managed SOC of Sattrix evolved with global electronic manufacturing company and helps them to improve their cybersecurity posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How We Improve the Cybersecurity Posture of Global Electronic Manufacturing Company?\" \/>\n<meta property=\"og:description\" content=\"Managed SOC of Sattrix evolved with global electronic manufacturing company and helps them to improve their cybersecurity posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/\" \/>\n<meta property=\"og:site_name\" content=\"Sattrix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SattrixInfo\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T06:45:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-20T10:59:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/06\/Improve-Cyber-Security-Posture.png\" \/>\n\t<meta property=\"og:image:width\" content=\"482\" \/>\n\t<meta property=\"og:image:height\" content=\"382\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How We Improve the Cybersecurity Posture of Global Electronic Manufacturing Company?\" \/>\n<meta name=\"twitter:description\" content=\"Managed SOC of Sattrix evolved with global electronic manufacturing company and helps them to improve their cybersecurity posture.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/06\/Improve-Cyber-Security-Posture.png\" \/>\n<meta name=\"twitter:creator\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:site\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\",\"name\":\"Sattrix\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/SattrixInfo\",\"https:\/\/www.linkedin.com\/company\/sattrix-information-security-private-limited\/\",\"https:\/\/twitter.com\/SattrixInfo\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"contentUrl\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"width\":1500,\"height\":414,\"caption\":\"Sattrix\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Sattrix\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.sattrix.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/06\/Improve-Cyber-Security-Posture.png\",\"contentUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/06\/Improve-Cyber-Security-Posture.png\",\"width\":482,\"height\":382,\"caption\":\"CyberSecurity - manage SOC\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#webpage\",\"url\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/\",\"name\":\"How We Improve the Cybersecurity Posture?- Sattrix\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#primaryimage\"},\"datePublished\":\"2021-06-24T06:45:46+00:00\",\"dateModified\":\"2024-07-20T10:59:19+00:00\",\"description\":\"Managed SOC of Sattrix evolved with global electronic manufacturing company and helps them to improve their cybersecurity posture.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#webpage\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\"},\"headline\":\"How We Improve the Cybersecurity Posture of Global Electronic Manufacturing Company?\",\"datePublished\":\"2021-06-24T06:45:46+00:00\",\"dateModified\":\"2024-07-20T10:59:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#webpage\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/how-we-improve-the-cybersecurity-posture-of-global-electronic-manufacturing-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2021\/06\/Improve-Cyber-Security-Posture.png\",\"articleSection\":[\"Cyber Security\",\"Managed SOC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/www.sattrix.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/447"}],"collection":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/comments?post=447"}],"version-history":[{"count":19,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/447\/revisions"}],"predecessor-version":[{"id":1544,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/447\/revisions\/1544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media\/465"}],"wp:attachment":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media?parent=447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/categories?post=447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/tags?post=447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}