{"id":3762,"date":"2021-11-02T11:37:07","date_gmt":"2021-11-02T15:37:07","guid":{"rendered":"https:\/\/knowledgeflow.org\/the-knowledgeflow-newsletter-volume-3-2\/"},"modified":"2024-07-30T10:45:27","modified_gmt":"2024-07-30T14:45:27","slug":"the-knowledgeflow-newsletter-volume-3","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/zh\/the-knowledgeflow-newsletter-volume-3\/","title":{"rendered":"KnowledgeFlow \u7b80\u8baf--\u7b2c 3 \u7248\u900f\u89c6"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79, .wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79[data-kb-block=\"kb-adv-heading3762_ae5ce9-79\"]{text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79[data-kb-block=\"kb-adv-heading3762_ae5ce9-79\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3762_ae5ce9-79[data-kb-block=\"kb-adv-heading3762_ae5ce9-79\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3762_ae5ce9-79 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3762_ae5ce9-79\">Check out the KnowledgeFlow Newsletter packed with <em>hand-picked headlines from KnowledgeFlow&#8217;s dedicated cybersafety curators. Vol. <\/em><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba, .wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba[data-kb-block=\"kb-adv-heading3762_89fe75-ba\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba[data-kb-block=\"kb-adv-heading3762_89fe75-ba\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3762_89fe75-ba[data-kb-block=\"kb-adv-heading3762_89fe75-ba\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading3762_89fe75-ba wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3762_89fe75-ba\"><strong>Top Story<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">CNBC: Microsoft Announces Plan to Cut Cybersecurity Workforce Shortage in Half by 2025<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cnbc.com\/2021\/10\/28\/microsoft-aims-to-cut-cybersecurity-workforce-shortage-in-half-by-2025.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-19.png\" alt=\"\" class=\"wp-image-3679\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-19.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-19-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-19-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">Microsoft plans to partner with community colleges across the United States and provide free resources in an effort to close the gap on the shortage of cybersecurity workers. Microsoft&#8217;s plan involves training and recruiting 250,000 workers by 2025, and is also intended to help diversify the cybersecurity industry.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cnbc.com\/2021\/10\/28\/microsoft-aims-to-cut-cybersecurity-workforce-shortage-in-half-by-2025.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Cyber Careers<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">BETAKIT: IBM Canada, University of Ottawa to Build Cybersecurity Learning Facility<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/betakit.com\/ibm-canada-university-of-ottawa-to-build-cybersecurity-learning-facility\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-12.png\" alt=\"\" class=\"wp-image-3680\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-12.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-12-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-12-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">IBM Canada and the University of Ottawa are partnering together to build and operate an experiential learning facility that will provide cybersecurity research. IBM is committing over $20 million to the initiative and the University of Ottawa $7 million over the next five years.<\/p>\n\n\n\n<p><a href=\"https:\/\/betakit.com\/ibm-canada-university-of-ottawa-to-build-cybersecurity-learning-facility\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Phishing<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">THE CONVERSATION: You Know How to Identify Phishing Emails &#8211; A Cybersecurity Researcher Explains How to Trust Your Instincts to Foil the Attacks<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/theconversation.com\/you-know-how-to-identify-phishing-emails-a-cybersecurity-researcher-explains-how-to-trust-your-instincts-to-foil-the-attacks-169804\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-22.png\" alt=\"\" class=\"wp-image-3682\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-22.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-22-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-22-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p><meta charset=\"utf-8\">Phishing emails can be dangerously deceptive. However, even some of the best phishing emails quickly make people suspicious. As Rick Wash explains, sometimes the best way to avoid phishing attacks is to be vigilant for the signs, and follow your instincts.<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/you-know-how-to-identify-phishing-emails-a-cybersecurity-researcher-explains-how-to-trust-your-instincts-to-foil-the-attacks-169804\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Research<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">SEON: Global Cybercrime Report: Which Countries Are Most at Risk?<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/seon.io\/resources\/global-cybercrime-report\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-13.png\" alt=\"\" class=\"wp-image-3684\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-13.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-13-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-13-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>How does the threat of cybercrime differ around the world? The latest research from SEON shows that Denmark, Germany, and the United States are the three countries with the lowest risk of cyber threat, based on strength of cybersecurity, legislation, and technology, with Canada clocking in not too far behind at number six.<\/p>\n\n\n\n<p><a href=\"https:\/\/seon.io\/resources\/global-cybercrime-report\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>News<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">CBC NEWS: <meta charset=\"utf-8\">Toronto Transit System Hit by Ransomware Attack, TTC Says No Significant Disruptions<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/toronto\/ttc-ransomware-attack-1.6231349\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24.png\" alt=\"\" class=\"wp-image-3685\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p><meta charset=\"utf-8\">The TTC is the latest ransomware victim, as hackers recently targeted the transit company&#8217;s computer systems. Stuart Green, TTC spokesman, indicated that there were no significant disruptions to service, and the public and employees are not at risk.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cbc.ca\/news\/canada\/toronto\/ttc-ransomware-attack-1.6231349\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id3762_35d7ca-4d{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id3762_35d7ca-4d > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id3762_35d7ca-4d > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id3762_35d7ca-4d > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id3762_35d7ca-4d > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id3762_35d7ca-4d > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id3762_35d7ca-4d > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id3762_35d7ca-4d alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column3762_046828-5d > .kt-inside-inner-col{display:flex;}.kadence-column3762_046828-5d > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column3762_046828-5d > .kt-inside-inner-col,.kadence-column3762_046828-5d > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column3762_046828-5d > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3762_046828-5d > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column3762_046828-5d{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3762_046828-5d > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column3762_046828-5d{text-align:center;}.kadence-column3762_046828-5d{position:relative;}.kadence-column3762_046828-5d, .kt-inside-inner-col > .kadence-column3762_046828-5d:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column3762_046828-5d{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column3762_046828-5d{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3762_046828-5d > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column3762_046828-5d kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c, .wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c[data-kb-block=\"kb-adv-heading3762_6167ee-0c\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c[data-kb-block=\"kb-adv-heading3762_6167ee-0c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3762_6167ee-0c[data-kb-block=\"kb-adv-heading3762_6167ee-0c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading3762_6167ee-0c wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3762_6167ee-0c\">rESOURCES<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af, .wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af[data-kb-block=\"kb-adv-heading3762_658f7c-af\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af[data-kb-block=\"kb-adv-heading3762_658f7c-af\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3762_658f7c-af[data-kb-block=\"kb-adv-heading3762_658f7c-af\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading3762_658f7c-af wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading3762_658f7c-af\">resources for Everyone<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51, .wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51[data-kb-block=\"kb-adv-heading3762_27f9a5-51\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51[data-kb-block=\"kb-adv-heading3762_27f9a5-51\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3762_27f9a5-51[data-kb-block=\"kb-adv-heading3762_27f9a5-51\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3762_27f9a5-51 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3762_27f9a5-51\">The KnowledgeFlow Cybersafety Foundation provides a wealth of resources such as blog posts, articles, tip sheets, and newsletters, tailored for a wide range of audiences. Our resources cover various aspects of online safety, ensuring that each group can navigate the digital environment with confidence. Parents can access guidance to protect their children online, teachers can find tools to educate students about cybersafety, seniors can learn to avoid common online scams, and police can utilize resources to enhance their cybersecurity knowledge. By offering specialized content for these diverse groups, KnowledgeFlow empowers everyone to stay safe and secure in the digital world.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns3762_736227-95, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns3762_736227-95, .wp-block-kadence-advancedbtn.kb-btns3762_736227-95, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns3762_736227-95{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns3762_736227-95{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns3762_736227-95 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3762_736227-95\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn3762_ac7af3-0f.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn3762_ac7af3-0f.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn3762_ac7af3-0f.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn3762_ac7af3-0f.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn3762_ac7af3-0f kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u67e5\u770b KnowledgeFlow \u65f6\u4e8b\u901a\u8baf\uff0c\u5176\u4e2d\u5305\u542b\u7531 KnowledgeFlow \u4e13\u804c\u7f51\u7edc\u5b89\u5168\u7b56\u5c55\u4eba\u7cbe\u5fc3\u6311\u9009\u7684\u5934\u6761\u65b0\u95fb\u3002\u5377\u9996\u65b0\u95fb...<\/p>","protected":false},"author":8,"featured_media":3785,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-KnowledgeFlow-Newsletter-\u2013-Edition-3-1.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/zh\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts\/3762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/comments?post=3762"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts\/3762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media\/3785"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media?parent=3762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/categories?post=3762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/tags?post=3762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}