{"id":19121,"date":"2024-09-20T08:45:18","date_gmt":"2024-09-20T13:45:18","guid":{"rendered":"https:\/\/bolttech.io\/insight\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bf%9d%e9%99%basmb%e3%82%af%e3%83%a9%e3%82%a4%e3%82%a2%e3%83%b3%e3%83%88%e3%81%ae%e8%a3%9c%e5%84%9f\/"},"modified":"2024-09-20T08:45:22","modified_gmt":"2024-09-20T13:45:22","slug":"%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bf%9d%e9%99%basmb%e3%82%af%e3%83%a9%e3%82%a4%e3%82%a2%e3%83%b3%e3%83%88%e3%81%ae%e8%a3%9c%e5%84%9f","status":"publish","type":"insight","link":"https:\/\/bolttech.io\/ja\/insights\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bf%9d%e9%99%basmb%e3%82%af%e3%83%a9%e3%82%a4%e3%82%a2%e3%83%b3%e3%83%88%e3%81%ae%e8%a3%9c%e5%84%9f\/","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u967a:SMB\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u88dc\u511f\u7bc4\u56f2\u304b\u3089\u5f31\u70b9\u3092\u53d6\u308a\u9664\u304f"},"content":{"rendered":"\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u3001\u304a\u305d\u3089\u304f\u5546\u696d\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u512a\u5148\u4e8b\u9805\u30ea\u30b9\u30c8\u306e\u6700\u4e0a\u4f4d\u306b\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304c\u3001\u3059\u3079\u3066\u306e\u30ad\u30e3\u30ea\u30a2\u3001\u30d6\u30ed\u30fc\u30ab\u30fc\u3001\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u3068\u3063\u3066\u306f\u305d\u3046\u3067\u3042\u308b\u3079\u304d\u3067\u3059\u3002<\/p>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u306f\u3001\u73fe\u5728\u306e\u3088\u3046\u306b\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3055\u3089\u3055\u308c\u305f\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u306f\u3001\u81ea\u5206\u81ea\u8eab\u3092\u5b88\u308b\u305f\u3081\u306b\u9069\u5207\u306a\u4fdd\u967a\u306b\u52a0\u5165\u3059\u308b\u3053\u3068\u3092\u307e\u3060\u8e8a\u8e87\u3057\u3066\u3044\u307e\u3059\u3002\n\u901a\u4fe1\u4e8b\u696d\u8005\u306f\u3001\u4e2d\u5c0f\u4f01\u696d(SMB)\u304c\u76f4\u9762\u3057\u3066\u3044\u308b\u8105\u5a01\u306e\u72b6\u6cc1\u3092\u7406\u89e3\u3057\u3001\u771f\u306e\u4fa1\u5024\u3092\u63d0\u4f9b\u3059\u308b\u4fdd\u8b77\u3092\u63d0\u4f9b\u3059\u308b\u305f\u3081\u306e\u63aa\u7f6e\u3092\u8b1b\u3058\u308b\u8cac\u4efb\u3092\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306b\u5bfe\u3057\u3066\u8ca0\u3063\u3066\u3044\u307e\u3059\u3002 <\/p>\n\n<h2 class=\"wp-block-heading\">\u4e2d\u5c0f\u4f01\u696d\u306b\u5bfe\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8105\u5a01\u306f\u73fe\u5b9f\u306e\u3082\u306e\u3067\u3042\u308a\u3001\u305d\u306e\u8105\u5a01\u306f\u5897\u5927\u3057\u3066\u3044\u307e\u3059<\/h2>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u306f\u30cf\u30c3\u30ab\u30fc\u306e\u683c\u597d\u306e\u6a19\u7684\u3067\u3042\u308b\u3068\u3001AmTrust Financial Services\u306e\u30b5\u30a4\u30d0\u30fc\u62c5\u5f53\u30b7\u30cb\u30a2\u30d0\u30a4\u30b9\u30d7\u30ec\u30b8\u30c7\u30f3\u30c8\u3067\u3042\u308b <a href=\"https:\/\/riskandinsurance.com\/cyber-risk-for-small-businesses-understanding-your-individual-risks-and-what-you-can-actually-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aaron Basilius<\/a>\u6c0f\u306f\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002\n\u5927\u4f01\u696d\u3092\u653b\u6483\u3059\u308b\u3068\u591a\u984d\u306e\u652f\u6255\u3044\u304c\u3082\u305f\u3089\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u305d\u308c\u3089\u306e\u7d44\u7e54\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u5bfe\u51e6\u3059\u308b\u305f\u3081\u306e\u6e96\u5099\u3082\u306f\u308b\u304b\u306b\u6574\u3063\u3066\u3044\u307e\u3059\u3002\nSMB\u306e\u898b\u8fd4\u308a\u306f\u5c0f\u3055\u3044\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u304c\u3001\u306f\u308b\u304b\u306b\u7c21\u5358\u306a\u30bf\u30fc\u30b2\u30c3\u30c8\u3067\u3059\u3002  <\/p>\n\n<p>\u300c\u4e2d\u5c0f\u4f01\u696d\u306f\u591a\u56fd\u7c4d\u4f01\u696d\u306e\u3088\u3046\u306a\u5de8\u984d\u306e\u9280\u884c\u53e3\u5ea7\u3092\u6301\u3063\u3066\u3044\u308b\u306e\u3067\u3057\u3087\u3046\u304b?\u3044\u3044\u3048\u300d\u3068\u30d0\u30b7\u30ea\u30a6\u30b9\u306f\u8a00\u3044\u307e\u3059\u3002\n\u300c\u3057\u304b\u3057\u3001\u5168\u4f53\u3068\u3057\u3066\u306f\u3001\u4e2d\u5c0f\u4f01\u696d\u306e\u30b7\u30b9\u30c6\u30e0\u306b\u5165\u308b\u306e\u306f\u7c21\u5358\u3067\u3059\u3002\u30cf\u30c3\u30ab\u30fc\u306f\u3001\u305d\u3053\u306b\u4fb5\u5165\u3059\u308b\u305f\u3081\u306b\u540c\u3058\u3088\u3046\u306a\u9577\u3055\u3092\u8cbb\u3084\u3059\u5fc5\u8981\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u300d <\/p>\n\n<p>\u30cf\u30c3\u30ab\u30fc\u306f\u30c7\u30fc\u30bf\u3092\u6a19\u7684\u306b\u3057\u3066\u3044\u308b\u3068\u3001Comcast Business\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u88fd\u54c1\u62c5\u5f53\u30d0\u30a4\u30b9\u30d7\u30ec\u30b8\u30c7\u30f3\u30c8\u3067\u3042\u308b <a href=\"https:\/\/www.securitymagazine.com\/articles\/91806-as-cyber-attacks-become-more-prevalent-heres-why-your-small-business-is-at-risk\" target=\"_blank\" rel=\"noreferrer noopener\">Shena Tharnish<\/a>\u6c0f\u306f\u66f8\u3044\u3066\u3044\u307e\u3059\u3002\n\u3053\u308c\u306b\u306f\u3001\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u306e\u8a73\u7d30\u3084\u533b\u7642\u8a18\u9332\u306a\u3069\u3001\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u3067\u8ca9\u58f2\u3055\u308c\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b\u500b\u4eba\u30c7\u30fc\u30bf\u304c\u542b\u307e\u308c\u308b\u5834\u5408\u304c\u3042\u308a\u307e\u3059\u3002 <\/p>\n\n<p>\u5f7c\u5973\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u305d\u306e\u4ed6\u306e\u52d5\u6a5f\u306b\u306f\u6b21\u306e\u3088\u3046\u306a\u3082\u306e\u304c\u3042\u308b\u3068\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<ul class=\"wp-block-list\">\n<li>\u5927\u898f\u6a21\u306aDDoS\u653b\u6483\u3092\u5b9f\u884c\u3059\u308b\u305f\u3081\u306e\u8a08\u7b97\u80fd\u529b\u3092\u5f97\u308b\u3002<\/li>\n\n\n\n<li>\u5927\u4f01\u696d\u3078\u306e\u30d0\u30c3\u30af\u30c9\u30a2\u30a2\u30af\u30bb\u30b9\u3092\u53d6\u5f97\u3059\u308b\u3068\u3001\u3088\u308a\u5927\u304d\u306a\u652f\u6255\u3044\u304c\u767a\u751f\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/li>\n\n\n\n<li>\u8eab\u4ee3\u91d1\u306e\u5f62\u3067\u306e\u73fe\u91d1\u3002<\/li>\n<\/ul>\n\n<p>\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u306f\u3001\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30af\u304c\u751f\u307f\u51fa\u3057\u305f\u8106\u5f31\u6027\u3092\u3059\u3050\u306b\u5229\u7528\u3057\u305f\u30cf\u30c3\u30ab\u30fc\u306b\u3068\u3063\u3066\u6069\u6075\u3067\u3057\u305f\u3002\nFBI\u306e\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u72af\u7f6a\u82e6\u60c5\u30bb\u30f3\u30bf\u30fc\u306f\u3001\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u304c\u59cb\u307e\u3063\u3066\u4ee5\u6765\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u72af\u7f6a\u306e\u5831\u544a\u304c\u7d04400%\u5897\u52a0\u3057\u30011\u65e5\u3042\u305f\u308a1,000\u4ef6\u304b\u3089\u6700\u9ad8\u30674,000\u4ef6\u306b\u6025\u5897\u3057\u305f\u3068\u3001FBI\u306e\u30b5\u30a4\u30d0\u30fc\u90e8\u9580\u306e\u526f\u5c40\u9577\u88dc\u4f50\u3067\u3042\u308b <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/fbi-covid-19-cyberattacks-spike-400-in-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30c8\u30fc\u30cb\u30e3\u30fb\u30a6\u30b4\u30ec\u30c3\u30c4<\/a>\u6c0f\u306f\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002 <\/p>\n\n<p><a href=\"https:\/\/www.thestar.com\/business\/2021\/02\/04\/small-businesses-pivoting-online-because-of-covid-19-are-vulnerable-to-cyber-attacks-cfib-report.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u30ab\u30ca\u30c0\u72ec\u7acb\u4f01\u696d\u9023\u76df(Canadian Federation of Independent Business<\/a>)\u306e\u5831\u544a\u306b\u3088\u308b\u3068\u30012020\u5e74\u306b\u306f\u30ab\u30ca\u30c0\u306e\u6570\u5343\u306e\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u88ab\u5bb3\u306b\u906d\u3044\u307e\u3057\u305f\u3002\n2020\u5e7410\u6708\u306b3,040\u793e\u306e\u4e2d\u5c0f\u4f01\u696d\u3092\u5bfe\u8c61\u306b\u884c\u3063\u305f\u8abf\u67fb\u3067\u306f\u3001\u307b\u307c4\u793e\u306b1\u793e\u304c\u540c\u5e743\u6708\u4ee5\u964d\u306b\u653b\u6483\u3092\u53d7\u3051\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3057\u305f\u3002\n\u7d045%\u304c\u653b\u6483\u304c\u6210\u529f\u3057\u305f\u3068\u56de\u7b54\u3057\u3066\u304a\u308a\u3001\u5168\u56fd\u306e\u6570\u5b57\u3092\u63a8\u5b9a\u3059\u308b\u3068\u300160,000\u793e\u4ee5\u4e0a\u306e\u4f01\u696d\u304c\u88ab\u5bb3\u306b\u906d\u3063\u305f\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002  <\/p>\n\n<p>\u30ea\u30b9\u30af\u306f\u660e\u3089\u304b\u3067\u3059\u304c\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u967a\u306f\u4f9d\u7136\u3068\u3057\u3066\u7c21\u5358\u306b\u8ca9\u58f2\u3067\u304d\u308b\u3082\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\n\u4fdd\u967a\u4f1a\u793e\u306f\u3001\u5546\u696d\u9867\u5ba2\u3092\u6559\u80b2\u3057\u3001\u898f\u5236\u554f\u984c\u306b\u5bfe\u51e6\u3057\u3001\u4fdd\u967a\u3092\u30d1\u30fc\u30bd\u30ca\u30e9\u30a4\u30ba\u3057\u3001\u3053\u306e\u554f\u984c\u306b\u3064\u3044\u3066\u4e2d\u5c0f\u4f01\u696d\u3068\u3064\u306a\u304c\u308b\u305f\u3081\u306e\u7d71\u5408\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002 <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg\" alt=\"\" class=\"wp-image-10120\" srcset=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg 1024w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-300x200.jpg 300w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-768x512.jpg 768w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p id=\"gdcalert2\"><\/p>\n\n<h2 class=\"wp-block-heading\">\u30b3\u30de\u30fc\u30b7\u30e3\u30eb\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u3092\u6559\u80b2\u3059\u308b<\/h2>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u3068\u6709\u610f\u7fa9\u306a\u95a2\u4fc2\u3092\u7bc9\u304f\u305f\u3081\u306b\u306f\u3001\u901a\u4fe1\u4e8b\u696d\u8005\u306f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u4fdd\u967a\u3092\u53d6\u308a\u5dfb\u304f\u77e5\u8b58\u306e\u30ae\u30e3\u30c3\u30d7\u3092\u514b\u670d\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\n\u4fdd\u967a\u4f1a\u793e <a href=\"https:\/\/www.sedgwick.com\/assets\/uploads\/documents\/The-SME-Cyber-Insurance-Market_Perception-and-Adoption.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u306e\u30bb\u30b8\u30a6\u30a3\u30c3\u30af<\/a> \u306f\u3001\u4e2d\u5c0f\u4f01\u696d\u306f\u30d6\u30ed\u30fc\u30ab\u30fc\u304c\u8a8d\u8b58\u3057\u3066\u3044\u308b\u3088\u308a\u3082\u30b5\u30a4\u30d0\u30fc\u30ea\u30b9\u30af\u3092\u8a8d\u8b58\u3057\u3066\u3044\u308b\u4e00\u65b9\u3067\u3001\u300c\u30b5\u30a4\u30d0\u30fc\u306b\u7279\u5316\u3057\u305f\u4fdd\u967a\u306b\u52a0\u5165\u3057\u3066\u3044\u308b\u306e\u306f20%\u672a\u6e80\u300d\u3067\u3042\u308b\u3053\u3068\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u3002\n\u305d\u308c\u306b\u52a0\u3048\u3066\u3001\u4e2d\u5c0f\u4f01\u696d\u306e\u5f93\u696d\u54e1\u306e\u5927\u591a\u6570\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u610f\u8b58\u5411\u4e0a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3092\u53d7\u3051\u3066\u3044\u307e\u305b\u3093\u3002  <\/p>\n\n<p>\u3055\u3089\u306b\u60aa\u3044\u3053\u3068\u306b\u3001COVID-19\u306e\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u3092\u304d\u3063\u304b\u3051\u306b\u3001\u4e2d\u5c0f\u4f01\u696d\u306f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u967a\u3092\u8d05\u6ca2\u54c1\u3068\u898b\u306a\u3057\u59cb\u3081\u3066\u3044\u308b\u3068\u3001Verisk\u306e\u4e0d\u52d5\u7523\u8acb\u6c42\u30b5\u30fc\u30d3\u30b9\u8cac\u4efb\u8005\u3067\u3042\u308b <a href=\"https:\/\/hbr.org\/2021\/01\/cybersecurity-insurance-has-a-big-problem\" target=\"_blank\" rel=\"noreferrer noopener\">Tom Johansmeyer<\/a>\u6c0f\u306f\u66f8\u3044\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<p>\u3057\u304b\u3057\u3001\u5927\u624b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u967a\u4f1a\u793e\u306f\u3059\u3067\u306b\u9867\u5ba2\u3092\u6559\u80b2\u3057\u3066\u3044\u308b\u3068\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u306eCyberscout\u306e\u6700\u9ad8\u30de\u30fc\u30b1\u30c6\u30a3\u30f3\u30b0\u8cac\u4efb\u8005\u3067\u3042\u308b <a href=\"https:\/\/www.insurancebusinessmag.com\/us\/news\/cyber\/do-your-part-to-help-small-businesses-become-cyber-safe-242367.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Jeremy Barnett<\/a>\u6c0f\u306f\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<p>\u300c\u3053\u308c\u306f\u6bd4\u8f03\u7684\u65b0\u3057\u3044\u4fdd\u967a\u5546\u54c1\u3067\u3042\u308a\u3001\u4e2d\u5c0f\u4f01\u696d\u306e\u7d4c\u55b6\u8005\u306f\u5fc5\u305a\u3057\u3082\u3055\u307e\u3056\u307e\u306a\u88dc\u511f\u7bc4\u56f2\u3059\u3079\u3066\u306b\u7cbe\u901a\u3057\u3066\u3044\u308b\u308f\u3051\u3067\u306f\u306a\u3044\u305f\u3081\u3001\u4fdd\u967a\u4f1a\u793e\u306f\u5f7c\u3089\u306b\u512a\u308c\u305f\u6559\u80b2\u30ea\u30bd\u30fc\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u300d\u3068\u5f7c\u306f\u8aac\u660e\u3057\u307e\u3059\u3002\n\u300c\u4fdd\u967a\u3092\u8cfc\u5165\u3059\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u30b5\u30a4\u30d0\u30fc\u30b5\u30dd\u30fc\u30c8\u30ea\u30bd\u30fc\u30b9\u3082\u8cfc\u5165\u3057\u3066\u3044\u307e\u3059\u3002\u300d <\/p>\n\n<h2 class=\"wp-block-heading\">\u898f\u5236\u4e0a\u306e\u554f\u984c\u306b\u5bfe\u51e6\u3059\u308b<\/h2>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u967a\u306e\u8cfc\u5165\u3092\u691c\u8a0e\u3059\u308b\u4e3b\u306a\u7406\u7531\u306e1\u3064\u306f\u3001\u5951\u7d04\u4e0a\u306e\u7fa9\u52d9\u3092\u679c\u305f\u3059\u305f\u3081\u3067\u3042\u308b\u3068\u3001\u30ea\u30e2\u30fc\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u7ba1\u7406\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u3042\u308bSymba\u306e\u30c1\u30fc\u30d5\u30de\u30fc\u30b1\u30c6\u30a3\u30f3\u30b0\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3067\u3042\u308b <a href=\"https:\/\/www.zeguro.com\/blog\/the-state-of-the-cyber-insurance-market-for-smbs\" target=\"_blank\" rel=\"noreferrer noopener\">Ellen Zhang<\/a>\u6c0f\u306f\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002\n\u300c\u591a\u304f\u306e\u4f01\u696d\u306f\u3001\u5354\u529b\u3059\u308b\u7b2c\u4e09\u8005\u306b\u5bfe\u3057\u3066\u30b5\u30a4\u30d0\u30fc\u4fdd\u967a\u3078\u306e\u52a0\u5165\u3092\u7fa9\u52d9\u4ed8\u3051\u3066\u3044\u307e\u3059\u300d <\/p>\n\n<p>\u3057\u305f\u304c\u3063\u3066\u3001\u4fdd\u967a\u4f1a\u793e\u304c\u3053\u306e\u4fdd\u967a\u5546\u54c1\u3092\u53d6\u308a\u5dfb\u304f\u898f\u5236\u554f\u984c\u306b\u5bfe\u51e6\u3059\u308b\u3053\u3068\u306f\u7406\u306b\u304b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<p><a href=\"http:\/\/www.mcneilandcompany.com\/blog\/5-tips-for-selling-cyber-liability-to-small-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tim Woitach<\/a>\u6c0f\u3001McNeil &amp; Co.\u306e\u30de\u30fc\u30b1\u30c6\u30a3\u30f3\u30b0\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\n\u4fdd\u967a\u306f\u3001\u300c\u60c5\u5831\u3092\u76e3\u8996\u3057\u3001\u4fb5\u5bb3\u304b\u3089\u4fdd\u8b77\u3057\u3001\u767a\u751f\u3057\u305f\u4fb5\u5bb3\u3092\u7279\u5b9a\u3057\u3066\u505c\u6b62\u3057\u3001\u72af\u7f6a\u306e\u9069\u5207\u306a\u5f53\u5c40\u306b\u901a\u77e5\u3057\u3001\u4f59\u6ce2\u3092\u8efd\u6e1b\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u5927\u898f\u6a21\u306a\u4f5c\u696d\u3092\u4f1d\u3048\u308b\u3053\u3068\u304c\u4e0d\u53ef\u6b20\u3067\u3042\u308b\u300d\u3068\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002\n\u5927\u4f01\u696d\u306b\u306f\u3053\u308c\u3089\u306e\u554f\u984c\u306b\u5bfe\u5fdc\u3067\u304d\u308b\u90e8\u9580\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u4e2d\u5c0f\u4f01\u696d\u306f\u591a\u304f\u306e\u5834\u5408\u3001\u3059\u3079\u3066\u3092\u81ea\u5206\u305f\u3061\u3067\u51e6\u7406\u3057\u307e\u3059\u3002\n\u305d\u306e\u305f\u3081\u3001\u3053\u308c\u3089\u306e\u554f\u984c\u3092\u30ab\u30d0\u30fc\u3059\u308b\u4fdd\u967a\u304c\u307e\u3059\u307e\u3059\u91cd\u8981\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002   <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/businesswomen-meeting-1024x683.jpg\" alt=\"\" class=\"wp-image-10110\"\/><\/figure>\n\n<h2 class=\"wp-block-heading\">\u4fdd\u967a\u3068\u4fdd\u8b77\u3092\u7d44\u307f\u5408\u308f\u305b\u308b<\/h2>\n\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4eba\u6750\u958b\u767a\u4f1a\u793eTransmosis\u306eCEO\u3067\u3042\u308b <a href=\"https:\/\/www.securitymagazine.com\/articles\/94746-the-integration-of-small-business-cybersecurity-protection-and-cyber-insurance-an-emerging-trend-in-2021\" target=\"_blank\" rel=\"noreferrer noopener\">Chase Norlin<\/a>\u6c0f\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fdd\u8b77\u3068\u4fdd\u967a\u306e\u7d71\u5408\u3092\u9078\u629e\u3057\u3066\u3044\u308b\u7d44\u7e54\u3082\u3042\u308b\u3068\u66f8\u3044\u3066\u3044\u307e\u3059\u3002\n\u300c\u3053\u306e\u3088\u3046\u306a\u72b6\u6cc1\u3067\u306f\u3001\u4fdd\u967a\u4f1a\u793e\u306f\u6700\u65b0\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3092\u541f\u5473\u3057\u3066\u5229\u7528\u3059\u308b\u3053\u3068\u3067\u5168\u4f53\u7684\u306a\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3057\u3001\u653b\u6483\u306e\u53ef\u80fd\u6027\u3092\u6e1b\u3089\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u4e2d\u5c0f\u4f01\u696d\u306e\u7d4c\u55b6\u8005\u306f\u3001\u4fb5\u5bb3\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306b\u9069\u5207\u306a\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3068\u30dd\u30ea\u30b7\u30fc\u3092\u6c7a\u5b9a\u3059\u308b\u305f\u3081\u306b\u3001\u3053\u306e\u8907\u96d1\u306a\u72b6\u6cc1\u3092\u30ca\u30d3\u30b2\u30fc\u30c8\u3059\u308b\u5fc5\u8981\u304c\u306a\u304f\u306a\u308a\u307e\u3059\u3002\u300d <\/p>\n\n<p>\u3053\u306e\u30c8\u30ec\u30f3\u30c9\u306f\u307e\u3060\u59cb\u307e\u3063\u305f\u3070\u304b\u308a\u3067\u3059\u304c\u3001\u300c\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3068\u4fdd\u967a\u304c\u7dca\u5bc6\u306b\u9023\u643a\u3059\u308c\u3070\u3059\u308b\u307b\u3069\u3001\u53cc\u65b9\u306b\u3068\u3063\u3066\u3088\u308a\u826f\u3044\u7d50\u679c\u304c\u5f97\u3089\u308c\u308b\u3067\u3057\u3087\u3046\u300d\u3068Norlin\u6c0f\u306f\u4ed8\u3051\u52a0\u3048\u307e\u3059\u3002\n\u300c\u3053\u308c\u306f\u3001\u9055\u53cd\u3084\u4fdd\u967a\u91d1\u8acb\u6c42\u306e\u6e1b\u5c11\u3001\u8acb\u6c42\u304c\u3042\u3063\u305f\u5834\u5408\u306e\u3088\u308a\u8fc5\u901f\u3067\u5145\u5b9f\u3057\u305f\u652f\u6255\u3044\u3001\u305d\u3057\u3066\u4fdd\u967a\u4f1a\u793e\u304c\u7d99\u7d9a\u7684\u306a\u30ea\u30b9\u30af\u3092\u53d6\u308b\u3053\u3068\u306b\u5bfe\u3059\u308b\u3088\u308a\u5065\u5168\u306a\u6b32\u6c42\u3092\u6301\u3064\u3053\u3068\u3092\u610f\u5473\u3057\u307e\u3059\u3002\u300d <\/p>\n\n<p>\u4fdd\u967a\u4f1a\u793e\u306f\u3001\u4fb5\u5bb3\u5bfe\u5fdc\u306e\u3088\u3046\u306a\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u306e\u306b\u9069\u3057\u305f\u7acb\u5834\u306b\u3042\u308b\u3068\u3001TechTarget\u306e\u30a8\u30b0\u30bc\u30af\u30c6\u30a3\u30d6\u30a8\u30c7\u30a3\u30bf\u30fc\u3067\u3042\u308b <a href=\"https:\/\/searchsecurity.techtarget.com\/feature\/The-ins-and-outs-of-cyber-insurance-coverage\" target=\"_blank\" rel=\"noreferrer noopener\">Sharon Shea<\/a>\u6c0f\u306f\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<p>\u300c\u4fdd\u967a\u5951\u7d04\u8005\u304c\u9055\u53cd\u306e\u7591\u3044\u3067\u4fdd\u967a\u4f1a\u793e\u306b\u9023\u7d61\u3059\u308b\u3068\u3001\u30c1\u30fc\u30e0\u30e1\u30f3\u30d0\u30fc\u304c\u8fc5\u901f\u306b\u5bfe\u5fdc\u3057\u3001\u5fc5\u8981\u306b\u5fdc\u3058\u3066\u5f01\u8b77\u58eb\u3084\u6cd5\u533b\u5b66\u8abf\u67fb\u54e1\u306a\u3069\u306e\u7b2c\u4e09\u8005\u306e\u5c02\u9580\u5bb6\u3092\u9023\u308c\u3066\u304d\u307e\u3059\u300d\u3068\u5f7c\u5973\u306f\u66f8\u3044\u3066\u3044\u307e\u3059\u3002\n\u300c\u4fdd\u967a\u4f1a\u793e\u306f\u3001\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u30a2\u30ca\u30ea\u30b9\u30c8\u3001\u30c7\u30fc\u30bf\u4fb5\u5bb3\u5f01\u8b77\u58eb\u3001\u30b3\u30fc\u30eb\u30bb\u30f3\u30bf\u30fc\u3001PR\u4f1a\u793e\u3001\u304a\u3088\u3073\u4fb5\u5bb3\u5bfe\u5fdc\u3092\u5c02\u9580\u3068\u3059\u308b\u305d\u306e\u4ed6\u306e\u30d9\u30f3\u30c0\u30fc\u3092\u542b\u3080\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u306e\u30d1\u30cd\u30eb\u3092\u7dad\u6301\u3057\u3066\u304a\u308a\u3001\u77ed\u671f\u9593\u3067\u652f\u63f4\u3092\u53d7\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u4e2d\u5c0f\u898f\u6a21\u306e\u7d44\u7e54\u3084\u3001\u65e5\u5e38\u7684\u306b\u30c7\u30fc\u30bf\u4fb5\u5bb3\u306e\u5371\u6a5f\u3092\u7ba1\u7406\u3057\u3066\u3044\u306a\u3044\u7d44\u7e54\u306b\u3068\u3063\u3066\u3001\u7d4c\u9a13\u8c4a\u5bcc\u306a\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u306e\u4fb5\u5bb3\u5bfe\u5fdc\u30c1\u30fc\u30e0\u306e\u30b5\u30fc\u30d3\u30b9\u306f\u975e\u5e38\u306b\u8cb4\u91cd\u3067\u3042\u308b\u3053\u3068\u304c\u8a3c\u660e\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u300d <\/p>\n\n<h2 class=\"wp-block-heading\">\u30ab\u30d0\u30fc\u3092\u30d1\u30fc\u30bd\u30ca\u30e9\u30a4\u30ba\u3059\u308b<\/h2>\n\n<p>\u6a19\u6e96\u5316\u3055\u308c\u305f\u30dd\u30ea\u30b7\u30fc\u306f\u3001\u4fdd\u967a\u5546\u54c1\u306b\u95a2\u4fc2\u306a\u304f\u3001\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u3067\u306f\u6a5f\u80fd\u3057\u307e\u305b\u3093\u3002\n\u307e\u305f\u3001\u4fdd\u967a\u30d6\u30ed\u30fc\u30ab\u30fc\u304a\u3088\u3073\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4f1a\u793e\u3067\u3042\u308bWoodruff Sawyer\u306e\u5168\u56fd\u30b5\u30a4\u30d0\u30fc\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u30ea\u30fc\u30c0\u30fc\u3067\u3042\u308b <a href=\"https:\/\/woodruffsawyer.com\/cyber-liability\/cyber-101-liability-insurance-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dan Burke<\/a>\u6c0f\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u306f\u6a19\u6e96\u7684\u306a\u8981\u7d20\u304c\u3044\u304f\u3064\u304b\u7d44\u307f\u5408\u308f\u3055\u308c\u3066\u3044\u307e\u3059\u304c\u3001\u5c02\u9580\u5bb6\u306e\u8ffd\u52a0\u3092\u542b\u3080\u3088\u308a\u5fae\u5999\u306a\u30a2\u30d7\u30ed\u30fc\u30c1\u306b\u3088\u308a\u3001\u306f\u308b\u304b\u306b\u512a\u308c\u305f\u30ab\u30d0\u30ec\u30c3\u30b8\u304c\u5f97\u3089\u308c\u308b\u3068\u8ff0\u3079\u3066\u3044\u307e\u3059\u3002 <\/p>\n\n<p>\u300c\u30b5\u30a4\u30d0\u30fc\u4fdd\u967a\u5951\u7d04\u306b\u5bfe\u3059\u308b\u3053\u308c\u3089\u306e\u5f37\u5316\u306f\u3001\u4f55\u3092\u6c42\u3081\u308b\u3079\u304d\u304b\u3092\u77e5\u3089\u306a\u3044\u9650\u308a\u3001\u5e38\u306b\u5229\u7528\u3067\u304d\u308b\u308f\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u307e\u305f\u3001\u5229\u7528\u53ef\u80fd\u3067\u3042\u3063\u3066\u3082\u3001\u901a\u5e38\u306f\u4fdd\u967a\u5951\u7d04\u9650\u5ea6\u984d\u5168\u4f53\u3088\u308a\u3082\u5c11\u306a\u3044\u91d1\u984d\u306b\u7d30\u5206\u5316\u3055\u308c\u307e\u3059\u300d\u3068\u30d0\u30fc\u30af\u6c0f\u306f\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n\n<p>\u305d\u306e\u305f\u3081\u306b\u306f\u3001\u901a\u4fe1\u4e8b\u696d\u8005\u304c\u5546\u696d\u9867\u5ba2\u3092\u7406\u89e3\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3068 <a href=\"https:\/\/agencyheight.medium.com\/four-strategies-to-sell-cyber-security-insurance-b220c4b0d516\" target=\"_blank\" rel=\"noreferrer noopener\">\u3001Agency Height<\/a>\u306e\u30c1\u30fc\u30e0\u306f\u8a00\u3044\u307e\u3059\u3002\n\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30cb\u30fc\u30ba\u304c\u6700\u5c0f\u9650\u3067\u3001\u4e2d\u7a0b\u5ea6\u307e\u305f\u306f\u9650\u5b9a\u7684\u306a\u30ab\u30d0\u30ec\u30c3\u30b8\u306e\u307f\u3092\u671b\u3093\u3067\u3044\u308b\u5834\u5408\u3082\u3042\u308a\u307e\u3059\u3002\u4e00\u65b9\u3001\u30b5\u30a4\u30d0\u30fc\u30ea\u30b9\u30af\u304c\u9ad8\u304f\u3001\u4e0d\u6cd5\u884c\u70ba\u8cac\u4efb\u304c\u91cd\u3044\u305f\u3081\u3001\u5305\u62ec\u7684\u306a\u88dc\u511f\u3092\u671b\u3080\u4eba\u3082\u3044\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002\u300d\n\u5f7c\u3089\u306f\u3001\u30ad\u30e3\u30ea\u30a2\u306b\u5bfe\u3057\u3066\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u30cb\u30fc\u30ba\u3092\u3088\u308a\u3088\u304f\u7406\u89e3\u3057\u3001\u88dc\u511f\u7bc4\u56f2\u3092\u30d1\u30fc\u30bd\u30ca\u30e9\u30a4\u30ba\u3059\u308b\u305f\u3081\u306b\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u904b\u7528\u3068\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306e\u4f7f\u7528\u306b\u3064\u3044\u3066\u8a71\u3057\u5408\u3046\u3088\u3046\u306b\u30a2\u30c9\u30d0\u30a4\u30b9\u3057\u3066\u3044\u307e\u3059\u3002  <\/p>\n\n<p>\u30c1\u30e5\u30fc\u30ea\u30c3\u30d2\u30fb\u30ce\u30fc\u30b9\u30fb\u30a2\u30e1\u30ea\u30ab\u306e\u5c02\u9580\u8077\u8ce0\u511f\u8cac\u4efb\u304a\u3088\u3073\u30b5\u30a4\u30d0\u30fc\u90e8\u9580\u306e\u8cac\u4efb\u8005\u3067\u3042\u308b<a href=\"https:\/\/www.pathpoint.com\/blog\/a-guide-to-picking-the-right-cyber-coverage-for-small-businesses\" target=\"_blank\" rel=\"noreferrer noopener\">\u30df\u30b7\u30a7\u30eb\u30fb\u30c1\u30a2<\/a>\u6c0f\u306f\u3001\u4f01\u696d\u304c\u81ea\u793e\u306e\u30ea\u30b9\u30af\u3068\u305d\u308c\u306b\u4f34\u3046\u30b3\u30b9\u30c8\u3092\u8a55\u4fa1\u3057\u3001\u300c\u4e3b\u8981\u306a\u61f8\u5ff5\u4e8b\u9805\u300d\u306b\u5408\u308f\u305b\u305f\u4fdd\u967a\u3092\u9078\u629e\u3059\u308b\u3053\u3068\u3092\u63a8\u5968\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n<p>\u300c\u30aa\u30f3\u30e9\u30a4\u30f3\u8ca9\u58f2\u3092\u884c\u3046\u4f01\u696d\u306b\u3068\u3063\u3066\u3001\u6700\u3082\u61f8\u5ff5\u3055\u308c\u308b\u5f71\u97ff\u306f\u30d3\u30b8\u30cd\u30b9\u306e\u4e2d\u65ad\u3084\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u300d\u3068\u5f7c\u5973\u306f\u8a00\u3044\u307e\u3059\u3002\n\u300c\u4e00\u65b9\u3001\u533b\u7642\u30aa\u30d5\u30a3\u30b9\u4f01\u696d\u306f\u3001\u60c5\u5831\u306e\u640d\u5931\u3001HIPAA\u9055\u53cd\u3001\u30d3\u30b8\u30cd\u30b9\u306e\u4e2d\u65ad\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30a4\u30d9\u30f3\u30c8\u306b\u3064\u3044\u3066\u61f8\u5ff5\u3057\u3066\u3044\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002\u300d <\/p>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u72af\u7f6a\u306e\u8105\u5a01\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u308b\u4e00\u65b9\u3067\u3001\u6c11\u9593\u901a\u4fe1\u4e8b\u696d\u8005\u306f\u3001\u3053\u306e\u6025\u901f\u306b\u6210\u9577\u3059\u308b\u5e02\u5834\u306b\u53c2\u5165\u3059\u308b\u6e96\u5099\u304c\u3067\u304d\u3066\u3044\u306a\u3044\u5834\u5408\u3001\u7af6\u4e89\u306b\u8ca0\u3051\u308b\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u3002\n\u5546\u696d\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u3092\u7406\u89e3\u3057\u3001\u5f7c\u3089\u306e\u30cb\u30fc\u30ba\u3092\u8a55\u4fa1\u3057\u305f\u4e0a\u3067\u3001\u5fc5\u8981\u306a\u4fdd\u8b77\u3092\u63d0\u4f9b\u3059\u308b\u30d1\u30fc\u30bd\u30ca\u30e9\u30a4\u30ba\u3055\u308c\u305f\u88dc\u511f\u7bc4\u56f2\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002 <\/p>\n\n<p><em>\u753b\u50cf\u63d0\u4f9b: <a href=\"https:\/\/unsplash.com\/@awcreativeut\" target=\"_blank\" rel=\"noreferrer noopener\">\u30a2\u30c0\u30e0\u30fb\u30a6\u30a3\u30f3\u30ac\u30fc<\/a>\u3001 <a href=\"https:\/\/unsplash.com\/@jefflssantos\" target=\"_blank\" rel=\"noreferrer noopener\">\u30b8\u30a7\u30d5\u30a1\u30fc\u30bd\u30f3\u30fb\u30b5\u30f3\u30c8\u30b9<\/a>\u3001 <a href=\"https:\/\/unsplash.com\/@amyhirschi\" target=\"_blank\" rel=\"noreferrer noopener\">\u30a8\u30a4\u30df\u30fc\u30fb\u30d2\u30eb\u30b7<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u3001\u304a\u305d\u3089\u304f\u5546\u696d\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u512a\u5148\u4e8b\u9805\u30ea\u30b9\u30c8\u306e\u6700\u4e0a\u4f4d\u306b\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304c\u3001\u3059\u3079\u3066\u306e\u30ad\u30e3\u30ea\u30a2\u3001\u30d6\u30ed\u30fc\u30ab\u30fc\u3001\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u3068\u3063\u3066\u306f\u305d\u3046\u3067\u3042\u308b\u3079\u304d\u3067\u3059\u3002 \u4e2d\u5c0f\u4f01\u696d\u306f\u3001\u73fe\u5728\u306e\u3088\u3046\u306b\u653b\u6483\u306e\u30ea\u30b9\u30af\u306b\u3055\u3089\u3055\u308c\u305f\u3053\u3068\u306f [&hellip;]<\/p>\n","protected":false},"featured_media":10135,"template":"","insight-category":[],"class_list":["post-19121","insight","type-insight","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/insight\/19121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/types\/insight"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/media\/10135"}],"wp:attachment":[{"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/media?parent=19121"}],"wp:term":[{"taxonomy":"insight-category","embeddable":true,"href":"https:\/\/bolttech.io\/ja\/wp-json\/wp\/v2\/insight-category?post=19121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}