{"id":4203,"date":"2020-11-05T17:27:37","date_gmt":"2020-11-05T17:27:37","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=4203"},"modified":"2020-11-29T11:51:03","modified_gmt":"2020-11-29T11:51:03","slug":"bagaimana-cara-menghindari-kebocoran-data","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/","title":{"rendered":"Bagaimana Cara Menghindari Kebocoran Data ?"},"content":{"rendered":"<p>1. Perusahaan harus membuat kebijakan keamanan<br \/>\nPerusahaan harus mulai mengembangkan seperangkat pedoman yang harus diikuti karyawannya. Contohnya adalah seperti menegakkan peraturan bahwa karyawan tidak boleh meninggalkan komputer dalam keadaan logged on\/unlocked, tidak berbagi akun dengan rekan kerja yang lain, dan lain-lain.<\/p>\n<p>2. Mengontrol konten dalam email<br \/>\nKarena pengguna sering mengirim informasi dan dokumen rahasia melalui email, maka sering terjadi kebocoran data melalui email. Untuk meminimalisir hal tersebut terjadi, perusahaan kalian dapat menggunakan email content filtering. Email filter akan melakukan proses penyaringan lalu lintas email baik itu pesan masuk atau pesan keluar. Filter akan memindai pesan dan mengklasifikasikan pesan ke dalam kategori yang berbeda seperti spam, virus, penipuan, dan lain-lain. Teknologi ini juga dapat memperingatkan administrator tentang ancaman orang dalam. Sistem akan memberi tahu jika terdapat pengguna yang mencoba mengirim info sensitif ke luar perusahaan.<\/p>\n<p>3. Endpoint protection<br \/>\nPeretas selalu memiliki cara baru untuk mendapatkan akses pada sistem, mencuri informasi, serta memanipulasi karyawan agar mereka memberikan informasi sensitif. Oleh karena itu, kalian membutuhkan endpoint protection.<\/p>\n<p>Endpoint protection merupakan praktek mengamankan endpoint pengguna atau end user devices seperti dekstop, laptop, perangkat mobile, dan lain-lain agar terlindungi dari eksploitasi tidak sah yang dilakukan oleh penjahat cyber. Saat ini sudah banyak endpoint protection software yang bisa kalian gunakan seperti McAfee Endpoint Security, Sophos Endpoint Protection, dan lain-ain. Sistem perlindungan endpoint tersebut dikembangkan untuk mendeteksi, menganalisis, memblokir, dan menahan serangan cyber.<\/p>\n<p>4. Meningkatkan keamanan data<br \/>\nData leakage sering terjadi karena kelalaian user atau karena adanya kerentanan keamanan pada sistem yang digunakan. Kerentanan keamanan yang tidak segera diperbaiki dapat memberi peretas akses pada data-data sensitif di dalamnya.<\/p>\n<p>Oleh karena itu, salah satu cara untuk menghindari bocornya data adalah dengan selalu memastikan bahwa sistem yang digunakan memiliki keamanan yang baik. Salah satu cara yang bisa kalian lakukan adalah dengan melakukan penetration testing secara rutin. Dengan penetration testing, kerentanan keamanan dapat segera ditemukan dan diperbaiki sehingga data dapat terlindungi.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Perusahaan harus membuat kebijakan keamanan Perusahaan harus mulai mengembangkan seperangkat pedoman yang harus diikuti karyawannya. Contohnya adalah seperti menegakkan peraturan bahwa karyawan tidak boleh meninggalkan komputer dalam keadaan logged on\/unlocked, tidak berbagi akun dengan rekan kerja yang lain, dan lain-lain. 2. Mengontrol konten dalam email Karena pengguna sering mengirim informasi dan dokumen rahasia melalui [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[4,8],"tags":[],"class_list":["post-4203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknologi","category-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"1. Perusahaan harus membuat kebijakan keamanan Perusahaan harus mulai mengembangkan seperangkat pedoman yang harus diikuti karyawannya. Contohnya adalah seperti menegakkan peraturan bahwa karyawan tidak boleh meninggalkan komputer dalam keadaan logged on\/unlocked, tidak berbagi akun dengan rekan kerja yang lain, dan lain-lain. 2. Mengontrol konten dalam email Karena pengguna sering mengirim informasi dan dokumen rahasia melalui [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T17:27:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-29T11:51:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?v=1606498166\" \/>\n\t<meta property=\"og:image:width\" content=\"434\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Bagaimana Cara Menghindari Kebocoran Data ?\",\"datePublished\":\"2020-11-05T17:27:37+00:00\",\"dateModified\":\"2020-11-29T11:51:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/\"},\"wordCount\":313,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166\",\"articleSection\":[\"Teknologi\",\"Tips\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/\",\"name\":\"Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166\",\"datePublished\":\"2020-11-05T17:27:37+00:00\",\"dateModified\":\"2020-11-29T11:51:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166\",\"width\":434,\"height\":351},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/bagaimana-cara-menghindari-kebocoran-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bagaimana Cara Menghindari Kebocoran Data ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/","og_locale":"id_ID","og_type":"article","og_title":"Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id","og_description":"1. Perusahaan harus membuat kebijakan keamanan Perusahaan harus mulai mengembangkan seperangkat pedoman yang harus diikuti karyawannya. Contohnya adalah seperti menegakkan peraturan bahwa karyawan tidak boleh meninggalkan komputer dalam keadaan logged on\/unlocked, tidak berbagi akun dengan rekan kerja yang lain, dan lain-lain. 2. Mengontrol konten dalam email Karena pengguna sering mengirim informasi dan dokumen rahasia melalui [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/","og_site_name":"Hostnic.id","article_published_time":"2020-11-05T17:27:37+00:00","article_modified_time":"2020-11-29T11:51:03+00:00","og_image":[{"width":434,"height":351,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?v=1606498166","type":"image\/png"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"2 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Bagaimana Cara Menghindari Kebocoran Data ?","datePublished":"2020-11-05T17:27:37+00:00","dateModified":"2020-11-29T11:51:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/"},"wordCount":313,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166","articleSection":["Teknologi","Tips"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/","url":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/","name":"Bagaimana Cara Menghindari Kebocoran Data ? - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166","datePublished":"2020-11-05T17:27:37+00:00","dateModified":"2020-11-29T11:51:03+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166","width":434,"height":351},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/bagaimana-cara-menghindari-kebocoran-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Bagaimana Cara Menghindari Kebocoran Data ?"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/data-leak-prevention.png?fit=434%2C351&ssl=1?v=1606498166","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-15N","jetpack-related-posts":[{"id":6803,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/gmail-business-solusi-email-profesional-untuk-bisnis-anda\/","url_meta":{"origin":4203,"position":0},"title":"Gmail Business: Solusi Email Profesional Untuk Bisnis Anda!","author":"Monic","date":"2023-08-31","format":false,"excerpt":"Hostnic.id -\u00a0Halo pembaca yang terhormat, bagaimana kabar kalian? Kami harap semuanya baik-baik saja. Selamat datang di artikel kami yang akan membahas tentang Gmail Business: Solusi Email Profesional untuk Bisnis Kamu! Dalam artikel ini, kami akan mengulas tentang pentingnya memiliki alamat email yang profesional dalam menjalankan bisnis. Mari kita mulai dengan\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"Gmail Business: Solusi Email Profesional Untuk Bisnis Anda!","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/GB.png?fit=1077%2C635&ssl=1%3Fv%3D1693464030&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/GB.png?fit=1077%2C635&ssl=1%3Fv%3D1693464030&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/GB.png?fit=1077%2C635&ssl=1%3Fv%3D1693464030&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/GB.png?fit=1077%2C635&ssl=1%3Fv%3D1693464030&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/GB.png?fit=1077%2C635&ssl=1%3Fv%3D1693464030&resize=1050%2C600 3x"},"classes":[]},{"id":4632,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/mengatur-filter-email-di-cpanel\/","url_meta":{"origin":4203,"position":1},"title":"Mengatur Filter Email di cPanel","author":"Monic","date":"2021-03-16","format":false,"excerpt":"Filter email dilakukan agar kalian dapat menyaring setiap email yang masuk berdasarkan kategori atau rules tertentu. Misalnya, ingin menyaring email berdasarkan kata-kata tertentu, subject, pengirim email, balasan email dan sebagainya. Kalian dapat menggunakan filter email di cPanel untuk memblokir pesan yang tidak diinginkan (spam), berdasarkan serangkaian kondisi tertentu. Misalnya, dapat\u2026","rel":"","context":"dalam &quot;cPanel&quot;","block_context":{"text":"cPanel","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/cpanel\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2021\/03\/email-mail-icon-abstract-3d-infographic_6317-957.jpg?fit=626%2C626&ssl=1%3Fv%3D1615900277&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2021\/03\/email-mail-icon-abstract-3d-infographic_6317-957.jpg?fit=626%2C626&ssl=1%3Fv%3D1615900277&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2021\/03\/email-mail-icon-abstract-3d-infographic_6317-957.jpg?fit=626%2C626&ssl=1%3Fv%3D1615900277&resize=525%2C300 1.5x"},"classes":[]},{"id":3669,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/tips-menghindari-phising\/","url_meta":{"origin":4203,"position":2},"title":"Tips Menghindari Phising","author":"Nanda Anubis","date":"2020-07-22","format":false,"excerpt":"Kalian harus selalu berhati-hati dengan pesan dari pihak manapun yang meminta informasi pribadi. Berikut adalah beberapa tips yang dapat Anda lakukan agar terhindar dari email phising. Identifikasi Isi Email Waspada terhadap pesan yang meminta informasi pribadimu. Terutama bila pesan tersebut tidak ditujukan secara personal dengan menyertakan nama. Hal ini karena\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/07\/vector-phising-illustration.jpg?fit=630%2C419&ssl=1%3Fv%3D1595174212&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/07\/vector-phising-illustration.jpg?fit=630%2C419&ssl=1%3Fv%3D1595174212&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/07\/vector-phising-illustration.jpg?fit=630%2C419&ssl=1%3Fv%3D1595174212&resize=525%2C300 1.5x"},"classes":[]},{"id":10637,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/email\/business-email-hosting-murah\/","url_meta":{"origin":4203,"position":3},"title":"Business Email Hosting Murah untuk Email Bisnis Profesional","author":"Marketing","date":"2026-01-17","format":false,"excerpt":"Di era digital, email masih menjadi sarana komunikasi utama dalam dunia bisnis. Namun, penggunaan email gratis dengan domain umum sering kali membuat brand terlihat kurang kredibel.\u00a0 Karena itu, kami merekomendasikan business email hosting sebagai solusi komunikasi yang lebih aman, rapi, dan terpercaya, terutama bagi bisnis yang ingin tampil serius melalui\u2026","rel":"","context":"dalam &quot;Email&quot;","block_context":{"text":"Email","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/email\/"},"img":{"alt_text":"business email hosting","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2026\/01\/business-email-hosting.jpg?fit=800%2C600&ssl=1%3Fv%3D1768669814&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2026\/01\/business-email-hosting.jpg?fit=800%2C600&ssl=1%3Fv%3D1768669814&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2026\/01\/business-email-hosting.jpg?fit=800%2C600&ssl=1%3Fv%3D1768669814&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2026\/01\/business-email-hosting.jpg?fit=800%2C600&ssl=1%3Fv%3D1768669814&resize=700%2C400 2x"},"classes":[]},{"id":5343,"url":"https:\/\/www.hostnic.id\/blog\/berita\/email-hosting-murah-mulai-dari-10-ribu-fitur-lengkap\/","url_meta":{"origin":4203,"position":4},"title":"Email Hosting Murah Mulai Dari 10 Ribu Fitur Lengkap","author":"Monic","date":"2022-09-19","format":false,"excerpt":"Hostnic.id bekerjasama dengan Zimbra menyediakan email hosting murah Indonesia untuk kebutuhan bisnis Anda. Saat ini email telah menjadi kebutuhan semua orang, saat ini banyak yang mengandalkan email untuk komunikasi antara penyedia jasa dan customer. Mengapa menggunakan email? Karena ini adalah cara yang profesional, bisa saja melalui Whatsapp atau aplikasi chat\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"Email Hosting Murah Mulai Dari 10 Ribu Fitur Lengkap","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2022\/09\/WhatsApp-Image-2022-09-12-at-09.10.34.jpeg?fit=800%2C600&ssl=1%3Fv%3D1662951696&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2022\/09\/WhatsApp-Image-2022-09-12-at-09.10.34.jpeg?fit=800%2C600&ssl=1%3Fv%3D1662951696&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2022\/09\/WhatsApp-Image-2022-09-12-at-09.10.34.jpeg?fit=800%2C600&ssl=1%3Fv%3D1662951696&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2022\/09\/WhatsApp-Image-2022-09-12-at-09.10.34.jpeg?fit=800%2C600&ssl=1%3Fv%3D1662951696&resize=700%2C400 2x"},"classes":[]},{"id":9245,"url":"https:\/\/www.hostnic.id\/blog\/berita\/beberpa-contoh-subjek-email-marketing-untuk-bisnis\/","url_meta":{"origin":4203,"position":5},"title":"Beberpa Contoh Subjek Email Marketing untuk Bisnis","author":"Monic","date":"2024-03-05","format":false,"excerpt":"Selamat pag i Hostnic pembaca yang terhormat, Salam sejahtera untuk Kamu semua di sana! Kami berharap kabar baik selalu menyertai Kamu di setiap langkah perjalanan Kamu. Dalam artikel ini, kami ingin berbagi contoh subjek email pemasaran yang mungkin menarik minat Kamu. Namun sebelumnya, kami ingin mengajak Kamu untuk meluangkan waktu\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"Email Marketing","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-05T151948.422.png?fit=649%2C414&ssl=1%3Fv%3D1709627740&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-05T151948.422.png?fit=649%2C414&ssl=1%3Fv%3D1709627740&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-05T151948.422.png?fit=649%2C414&ssl=1%3Fv%3D1709627740&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=4203"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4203\/revisions"}],"predecessor-version":[{"id":4205,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4203\/revisions\/4205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/4204"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=4203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=4203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=4203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}