[{"data":1,"prerenderedAt":218},["ShallowReactive",2],{"FT76wufM4r8EdOjBfbTFbsIl3TwxZK2Y1eVvpsY2--Q":3,"_apollo:default":165},{"page":4,"blog":5},null,{"__typename":6,"title":7,"_seoMetaTags":8,"_allSlugLocales":79,"_firstPublishedAt":86,"author":87,"categories":103,"editor":115,"image":119,"relatedPosts":121},"BlogRecord","Quick Guide to Phishing – Spot Scams & Stay Safe!",[9,12,16,19,23,26,29,33,37,41,45,48,51,55,59,63,67,71,75],{"__typename":10,"tag":11,"attributes":4,"content":7},"Tag","title",{"__typename":10,"tag":13,"attributes":14,"content":4},"meta",{"property":15,"content":7},"og:title",{"__typename":10,"tag":13,"attributes":17,"content":4},{"name":18,"content":7},"twitter:title",{"__typename":10,"tag":13,"attributes":20,"content":4},{"name":21,"content":22},"description","Learn how to recognize and avoid phishing scams – Protect your personal data with this quick and essential phishing guide.",{"__typename":10,"tag":13,"attributes":24,"content":4},{"property":25,"content":22},"og:description",{"__typename":10,"tag":13,"attributes":27,"content":4},{"name":28,"content":22},"twitter:description",{"__typename":10,"tag":13,"attributes":30,"content":4},{"property":31,"content":32},"og:image","https://www.datocms-assets.com/47413/1636624494-blogpostquick-guide-to-phishing.jpg?auto=format&fit=max&w=1200",{"__typename":10,"tag":13,"attributes":34,"content":4},{"property":35,"content":36},"og:image:width","1200",{"__typename":10,"tag":13,"attributes":38,"content":4},{"property":39,"content":40},"og:image:height","701",{"__typename":10,"tag":13,"attributes":42,"content":4},{"property":43,"content":44},"og:image:alt","blogpost-image of a laptop screen being hooked by a fishing lure ",{"__typename":10,"tag":13,"attributes":46,"content":4},{"name":47,"content":32},"twitter:image",{"__typename":10,"tag":13,"attributes":49,"content":4},{"name":50,"content":44},"twitter:image:alt",{"__typename":10,"tag":13,"attributes":52,"content":4},{"property":53,"content":54},"og:locale","en",{"__typename":10,"tag":13,"attributes":56,"content":4},{"property":57,"content":58},"og:type","article",{"__typename":10,"tag":13,"attributes":60,"content":4},{"property":61,"content":62},"og:site_name","StartMail",{"__typename":10,"tag":13,"attributes":64,"content":4},{"property":65,"content":66},"article:modified_time","2025-06-12T16:29:46Z",{"__typename":10,"tag":13,"attributes":68,"content":4},{"property":69,"content":70},"article:publisher","https://www.facebook.com/MyStartMail/",{"__typename":10,"tag":13,"attributes":72,"content":4},{"name":73,"content":74},"twitter:card","summary_large_image",{"__typename":10,"tag":13,"attributes":76,"content":4},{"name":77,"content":78},"twitter:site","@MyStartMail",[80,84],{"__typename":81,"locale":82,"value":83},"StringNonNullMultiLocaleField","de","kurzanleitung-phishing",{"__typename":81,"locale":54,"value":85},"quick-guide-to-phishing","2021-03-09T11:00:00+01:00",{"__typename":88,"function":89,"image":90,"name":102},"EmployeeRecord","Vice President",{"__typename":91,"responsiveImage":92,"format":99,"url":100,"width":101,"height":101},"FileField",{"__typename":93,"srcSet":94,"sizes":95,"src":96,"aspectRatio":97,"width":98,"height":98},"ResponsiveImage","https://www.datocms-assets.com/47413/1636541024-sally-p.png?auto=compress%2Cformat&fit=crop&h=50&w=50 50w,https://www.datocms-assets.com/47413/1636541024-sally-p.png?auto=compress%2Cformat&dpr=1.5&fit=crop&h=50&w=50 75w,https://www.datocms-assets.com/47413/1636541024-sally-p.png?auto=compress%2Cformat&dpr=2&fit=crop&h=50&w=50 100w,https://www.datocms-assets.com/47413/1636541024-sally-p.png?auto=compress%2Cformat&dpr=3&fit=crop&h=50&w=50 150w","(max-width: 50px) 100vw, 50px","https://www.datocms-assets.com/47413/1636541024-sally-p.png?auto=compress%2Cformat&fit=crop&h=50&w=50",1,50,"png","https://www.datocms-assets.com/47413/1636541024-sally-p.png",192,"Sally Payze",[104,110],{"__typename":105,"id":106,"slug":107,"title":108,"name":109},"CategoryRecord","72029094","privacy-and-security","Privacy & Security Articles – Tips, Guides & Best Practices","Privacy & Security",{"__typename":105,"id":111,"slug":112,"title":113,"name":114},"72029074","privacy-guides","Step-by-Step Privacy Guides – Secure Your Data & Stay Anonymous","Privacy Guides",[116],{"__typename":117,"requiredBody":118},"SimpleTextSectionRecord","\u003Ch1>Quick Guide to Phishing\u003C/h1>\n\u003Cp>Phishing&hellip; it&rsquo;s a scam where an Internet user is tricked (usually by a deceptive email message) into revealing personal or confidential information that can then be used illicitly by the scammer. It all starts with an email from something that appears to be from a trustworthy source designed to lure a victim. The message could look like a request from the bank, your Internet provider, or even the company you work for or follow. They usually contain a link to click or an attachment to download.\u003C/p>\n\u003Cp>Phishing has been around for more than ten years; &ldquo;Back then, because personal computers in the home combined with Internet usage were a fairly new experience, this method proved quite effective but was not observed with as much population as phishing is today.&rdquo; (James 2005)\u003C/p>\n\u003Cp>The first phishing attack against financial institutions was reported in 2003. Companies with all the expensive firewalls, SSL certificates, and IDS rules could not foresee the most critical threat of them all: the human element.\u003C/p>\n\u003Cp>Anyone with an email address has probably received a phish, and most of them have clicked.\u003C/p>\n\u003Cp>\u003Cstrong>Why is Phishing so dangerous?\u003C/strong>\u003C/p>\n\u003Cp>Because of the rise of COVID-19 cases, many companies have experienced changes in their working conditions, increasing remote work, and, therefore, the use of email.\u003C/p>\n\u003Cp>Although phishing has been around for a long time, cybercriminals are taking advantage of the situation, knowing most people are working from home.\u003C/p>\n\u003Cp>According to&nbsp;\u003Ca href=\"https://www.infosecurity-magazine.com/news/covid19-drive-phishing-emails-667/\" rel=\"noopener\" target=\"_blank\">Infosecurity Magazine\u003C/a>, email phishing attacks have spiked over 600% since the end of February 2020 due to the Coronavirus pandemic.&nbsp;\u003C/p>\n\u003Cp>\u003Cstrong>How to identify a Phishing email?\u003C/strong>\u003C/p>\n\u003Cp>The first step is the easiest one, but sometimes the one we often forget:&nbsp;\u003Cstrong>\u003Cu>Take time to evaluate!&nbsp;\u003C/u>\u003C/strong>&nbsp;Use these questions from Phishing expert Christopher Hadnagy&sup2; as a guide to identifying phishing.\u003C/p>\n\u003Cul>\n  \u003Cli>Does the email come from someone I know?\u003C/li>\n  \u003Cli>Was I expecting this email?\u003C/li>\n  \u003Cli>Are the requests being asked reasonable?\u003C/li>\n  \u003Cli>Does this email employ the emotional content of fear, greed, or curiosity, or, most important, does it try to get me to take action?\u003C/li>\n\u003C/ul>\n\u003Cp>Once you took your time to answer those questions, consider that phishing emails usually:\u003C/p>\n\u003Cul>\n  \u003Cli>Look identical to messages from a real reputable organization\u003C/li>\n  \u003Cli>Sound urgent and try to create fear\u003C/li>\n  \u003Cli>Claim to have important information or breaking news leading to an attachment or a link\u003C/li>\n\u003C/ul>\n\u003Cp>\u003Cstrong>How to stay protected against a Phishing attack\u003C/strong>\u003C/p>\n\u003Cp>Use these steps from the&nbsp;\u003Ca href=\"https://www.enisa.europa.eu/news/enisa-news/understanding-and-dealing-with-phishing-during-the-covid-19-pandemic#:~:text=Phishing%2520in%2520the%2520years%2520of%2520COVID-19%2520Many%2520organisations,thus%2520creating%2520perfect%2520conditions%2520for%2520email%2520fraud%2520schemes.\" rel=\"noopener noreferrer\">European Union Agency for Cybersecurity\u003C/a>&nbsp;to avoid taking the bait:&nbsp;\u003C/p>\n\u003Col type=\"1\">\n  \u003Cli>\u003Cstrong>Take time to reflect on a request for your personal information and whether the request is appropriate\u003C/strong>. Do not open any unsolicited email from people unfamiliar to you or click on suspicious attachments that you did not expect.\u003C/li>\n  \u003Cli>\u003Cstrong>Never supply any personal or financial information and passwords to anyone via email\u003C/strong>.\u003C/li>\n  \u003Cli>\u003Cstrong>Avoid emails that insist you act now\u003C/strong>. Phishing emails often try to create a sense of urgency or demand immediate action.&nbsp;\u003C/li>\n  \u003Cli>\u003Cstrong>Look for wording and terminology\u003C/strong>. Apart from phishing, cybercriminals could also trap a specific person via spear-phishing using the receiver&rsquo;s full name. Check for terms and language that are normally expected in the type of email you receive.\u003C/li>\n  \u003Cli>\u003Cstrong>Check the sender details\u003C/strong>. Check the sender&rsquo;s name, email address and whether the email domain matches the organization that the sender claims to be from. If not, it is probably a phishing attempt.\u003C/li>\n  \u003Cli>\u003Cstrong>Check the link before you click\u003C/strong>. See your emails in plain text to check for the hyperlinked address to see the real hyperlink. If it is not the same as what appears in the email, it is probably a phishing attempt.\u003C/li>\n  \u003Cli>\u003Cstrong>Keep an eye out for spelling and grammatical mistakes\u003C/strong>. If an email includes spelling, punctuation and/or grammar errors, it could be a phishing email.\u003C/li>\n  \u003Cli>\u003Cstrong>Be wary of third-party sources spreading information about COVID-19\u003C/strong>. Refer to the official websites for updates on COVID-19. Fraudulent emails can look like they come from a real organization, but legitimate government agencies will never call you or email you directly for this information.\u003C/li>\n  \u003Cli>\u003Cstrong>Protect your devices\u003C/strong>. Install anti-spam, anti-spyware, and anti-virus software and make sure they are always up to date.\u003C/li>\n  \u003Cli>\u003Cstrong>Visit websites by typing the domain name yourself\u003C/strong>. Most businesses use encryption and Secure Socket Layer (SSL) / Transport Layer Security (TLS). If you receive a certificate error while browsing, consider it as a warning sign that something is not right with the website.\u003C/li>\n  \u003Cli>We recommend that you keep your private address secret and only use it for official transactions. For your other activities, use an\u003Cspan>&nbsp;\u003C/span>\u003Ca href=\"/startmails-alias-feature-the-best-way-to-improve-your-privacy-and-keep-your-inbox-uncluttered/\">email alias\u003C/a>, that way, you can quickly end on-going phishing attempts without compromising your mail email address.&nbsp;\u003C/li>\n\u003C/ol>\n\u003Cp>\u003Cstrong>What to do if you become a victim of phishing\u003C/strong>\u003Cstrong>\u003C/strong>\u003C/p>\n\u003Cul>\n  \u003Cli>If you have clicked on a link or opened an attachment that downloaded harmful software,&nbsp;\u003Cstrong>update your computer&rsquo;s security software\u003C/strong>&nbsp;and&nbsp;\u003Cstrong>run a scan\u003C/strong>.\u003C/li>\n  \u003Cli>If you entered login credentials to access information,&nbsp;\u003Cstrong>change them immediately\u003C/strong>.\u003C/li>\n  \u003Cli>If you have provided your bank details,&nbsp;\u003Cstrong>contact your bank\u003C/strong>&nbsp;or credit card company.\u003C/li>\n\u003C/ul>\n\u003Cp>\u003Cstrong>Take action\u003C/strong>\u003C/p>\n\u003Cp>Protecting ourselves against scams is both a feasible and essential step. If you receive a phishing email, you should:\u003C/p>\n\u003Col type=\"1\">\n  \u003Cli>Report it to your IT department by compressing/zipping the email file and forwarding it as an attachment. (This prevents the message from being opened accidentally which could activate the scammers tracking pixels etc.)\u003C/li>\n  \u003Cli>Delete it.\u003C/li>\n  \u003Cli>Notify the organization being spoofed to prevent other people from being victimized.\u003C/li>\n\u003C/ol>\n\u003Ch6>\u003Cstrong>Sources:&nbsp;\u003C/strong>\u003C/h6>\n\u003Ch6>\u003C/h6>\n\u003Col type=\"1\">\n  \u003Cli>\n    \u003Ch6>James, Lance (2005) &ldquo;Phishing Exposed.&rdquo; (1st ed.) Syngress Publishing Inc.&nbsp;\u003C/h6>\n  \u003C/li>\n  \u003Cli>\n    \u003Ch6>Hadnagy, Christopher (2015) &ldquo;Phishing Dark Waters.&rdquo; (1st ed.) John Wiley &amp; Sons, Incorporated.\u003C/h6>\n  \u003C/li>\n  \u003Cli>\n    \u003Ch6>European Union Agency for Cybersecurity. &ldquo;Understanding and dealing with phishing during the COVID-19 pandemic.&rdquo; May 6, 2020 from:\u003Cspan>&nbsp;\u003C/span>\u003Ca href=\"https://www.enisa.europa.eu/news/enisa-news/understanding-and-dealing-with-phishing-during-the-covid-19-pandemic\" rel=\"noopener noreferrer\">www.enisa.europa.eu/news/enisa-news/understanding-and-dealing-with-phishing-during-the-covid-19-pandemic\u003C/a>\u003C/h6>\n  \u003C/li>\n\u003C/ol>",{"__typename":91,"url":120},"https://www.datocms-assets.com/47413/1636624494-blogpostquick-guide-to-phishing.jpg",[122,136,145,155],{"__typename":6,"image":123,"slug":134,"requiredTitle":135},{"__typename":91,"responsiveImage":124,"format":99,"url":131,"width":132,"height":133},{"__typename":93,"srcSet":125,"sizes":126,"src":127,"aspectRatio":128,"width":129,"height":130},"https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","(max-width: 580px) 100vw, 580px","https://www.datocms-assets.com/47413/1678367620-startmail-update.png?auto=compress%2Cformat&fit=crop&h=346&w=580",1.676300578034682,580,346,"https://www.datocms-assets.com/47413/1678367620-startmail-update.png",1572,918,"phishing-emails-on-the-rise","Phishing Emails Are on the Rise – Learn How to Stay Safe",{"__typename":6,"image":137,"slug":143,"requiredTitle":144},{"__typename":91,"responsiveImage":138,"format":141,"url":142,"width":132,"height":133},{"__typename":93,"srcSet":139,"sizes":126,"src":140,"aspectRatio":128,"width":129,"height":130},"https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580","jpg","https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg","email-scammers","How Email Scammers Operate – Spot & Avoid Online Threats",{"__typename":6,"image":146,"slug":153,"requiredTitle":154},{"__typename":91,"responsiveImage":147,"format":99,"url":150,"width":151,"height":152},{"__typename":93,"srcSet":148,"sizes":126,"src":149,"aspectRatio":128,"width":129,"height":130},"https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png?auto=compress%2Cformat&fit=crop&h=346&w=580","https://www.datocms-assets.com/47413/1675242114-startmail-common-types-of-email-scams-to-watch-for.png",1376,803,"6-common-types-of-email-scams","6 Common Email Scams – Learn to Spot & Avoid Them",{"__typename":6,"image":156,"slug":163,"requiredTitle":164},{"__typename":91,"responsiveImage":157,"format":141,"url":160,"width":161,"height":162},{"__typename":93,"srcSet":158,"sizes":126,"src":159,"aspectRatio":128,"width":129,"height":130},"https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=3&fit=crop&h=346&w=580 1740w","https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580","https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg",2096,1224,"what-makes-startmail-different","Why Choose StartMail? – Privacy Matters! | Secure & Ad-Free",{"CategoryRecord:72029094":166,"CategoryRecord:72029074":167,"ROOT_QUERY":168},["null","__typename",105,"id",106,"slug",107,"title",108,"name",109],["null","__typename",105,"id",111,"slug",112,"title",113,"name",114],["null","__typename",169,"page({\"filter\":{\"slug\":{\"eq\":\"quick-guide-to-phishing\"}},\"locale\":\"en\"})",4,"blog({\"filter\":{\"slug\":{\"eq\":\"quick-guide-to-phishing\"}},\"locale\":\"en\"})",170],"Query",["null","__typename",6,"title",7,"_seoMetaTags",171,"_allSlugLocales",191,"_firstPublishedAt",86,"author",194,"categories",197,"editor",202,"image",204,"relatedPosts",205],[172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188,189,190],["null","__typename",10,"tag",11,"attributes",4,"content",7],["null","__typename",10,"tag",13,"attributes",14,"content",4],["null","__typename",10,"tag",13,"attributes",17,"content",4],["null","__typename",10,"tag",13,"attributes",20,"content",4],["null","__typename",10,"tag",13,"attributes",24,"content",4],["null","__typename",10,"tag",13,"attributes",27,"content",4],["null","__typename",10,"tag",13,"attributes",30,"content",4],["null","__typename",10,"tag",13,"attributes",34,"content",4],["null","__typename",10,"tag",13,"attributes",38,"content",4],["null","__typename",10,"tag",13,"attributes",42,"content",4],["null","__typename",10,"tag",13,"attributes",46,"content",4],["null","__typename",10,"tag",13,"attributes",49,"content",4],["null","__typename",10,"tag",13,"attributes",52,"content",4],["null","__typename",10,"tag",13,"attributes",56,"content",4],["null","__typename",10,"tag",13,"attributes",60,"content",4],["null","__typename",10,"tag",13,"attributes",64,"content",4],["null","__typename",10,"tag",13,"attributes",68,"content",4],["null","__typename",10,"tag",13,"attributes",72,"content",4],["null","__typename",10,"tag",13,"attributes",76,"content",4],[192,193],["null","__typename",81,"locale",82,"value",83],["null","__typename",81,"locale",54,"value",85],["null","__typename",88,"function",89,"image",195,"name",102],["null","__typename",91,"format",99,"url",100,"width",101,"height",101,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":50,\"w\":50}})",196],["null","__typename",93,"srcSet",94,"sizes",95,"src",96,"aspectRatio",97,"width",98,"height",98],[198,200],{"__ref":199},"CategoryRecord:72029094",{"__ref":201},"CategoryRecord:72029074",[203],["null","__typename",117,"body",118],["null","__typename",91,"url",120],[206,209,212,215],["null","__typename",6,"image",207,"slug",134,"title",135],["null","__typename",91,"format",99,"url",131,"width",132,"height",133,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",208],["null","__typename",93,"srcSet",125,"sizes",126,"src",127,"aspectRatio",128,"width",129,"height",130],["null","__typename",6,"image",210,"slug",143,"title",144],["null","__typename",91,"format",141,"url",142,"width",132,"height",133,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",211],["null","__typename",93,"srcSet",139,"sizes",126,"src",140,"aspectRatio",128,"width",129,"height",130],["null","__typename",6,"image",213,"slug",153,"title",154],["null","__typename",91,"format",99,"url",150,"width",151,"height",152,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",214],["null","__typename",93,"srcSet",148,"sizes",126,"src",149,"aspectRatio",128,"width",129,"height",130],["null","__typename",6,"image",216,"slug",163,"title",164],["null","__typename",91,"format",141,"url",160,"width",161,"height",162,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",217],["null","__typename",93,"srcSet",158,"sizes",126,"src",159,"aspectRatio",128,"width",129,"height",130],1775572997943]