{"id":1701,"date":"2023-04-08T14:32:10","date_gmt":"2023-04-08T14:32:10","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1701"},"modified":"2023-04-08T14:32:10","modified_gmt":"2023-04-08T14:32:10","slug":"biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/","title":{"rendered":"Biztons\u00e1g meg\u0151rz\u00e9se glob\u00e1lis esem\u00e9nyeken: Kiberfenyeget\u00e9sek elleni k\u00fczdelem \u00e9s j\u00f3l\u00e9t biztos\u00edt\u00e1sa"},"content":{"rendered":"<p>Egy glob\u00e1lis hat\u00e1s\u00fa, zavarba ejt\u0151 helyzettel szembes\u00fclve elengedhetetlen az igaz \u00e9s pontos inform\u00e1ci\u00f3k terjeszt\u00e9se annak \u00e9rdek\u00e9ben, hogy meghat\u00e1rozhassuk azokat az ellen\u0151rz\u00e9si \u00e9s v\u00e9delmi int\u00e9zked\u00e9seket, amelyeket a k\u00e1rok m\u00e9rs\u00e9kl\u00e9se \u00e9rdek\u00e9ben be kell vezetni. Ilyen helyzetben a kiberb\u0171n\u00f6z\u0151k \u00faj csal\u00e1si lehet\u0151s\u00e9geket tal\u00e1lnak. P\u00e9ld\u00e1ul a COVID-19 vil\u00e1gj\u00e1rv\u00e1ny konkr\u00e9t eset\u00e9ben, <a href=\"https:\/\/f3magazine.unicri.it\/?p=2085\" target=\"_blank\" rel=\"noreferrer noopener\">a kiberb\u0171n\u00f6z\u0151k \u00faj m\u0171k\u00f6d\u00e9si m\u00f3dot mutattak be.<\/a>. Ez abb\u00f3l \u00e1llt, hogy nemzetk\u00f6zi eg\u00e9szs\u00e9g\u00fcgyi szervezeteket, mint p\u00e9ld\u00e1ul az Eg\u00e9szs\u00e9g\u00fcgyi Vil\u00e1gszervezetet, m\u00e1s eg\u00e9szs\u00e9g\u00fcgyi szervezeteket \u00e9s m\u00e1s korm\u00e1nyzati szerveket szem\u00e9lyes\u00edtettek meg rosszindulat\u00fa e-mail kamp\u00e1nyokon kereszt\u00fcl. Ezeket az\u00e9rt tervezt\u00e9k, hogy f\u00e9lelmet keltsenek, abban a rem\u00e9nyben, hogy olyan cselekv\u00e9seket v\u00e1ltanak ki, amelyek lehet\u0151v\u00e9 teszik sz\u00e1mukra az \u00e9rz\u00e9keny inform\u00e1ci\u00f3s rendszerekhez val\u00f3 hozz\u00e1f\u00e9r\u00e9st.<\/p>\n\n\n\n<p>Azonban ez nem az egyetlen aspektus, amelyre a szervezeteknek figyelni\u00fck kell a kiberbiztons\u00e1g ter\u00e9n. A COVID-19-hez kapcsol\u00f3d\u00f3 eg\u00e9szs\u00e9g\u00fcgyi kock\u00e1zatokra val\u00f3 akt\u00edv v\u00e1laszad\u00e1s \u00e9rdek\u00e9ben sok v\u00e1llalat kezdte el \u00e1thelyezni szok\u00e1sos m\u0171k\u00f6d\u00e9si m\u00f3dj\u00e1t egy alternat\u00edv, t\u00e1vmunka vagy virtu\u00e1lis irod\u00e1kon kereszt\u00fcli t\u00e1voli munkav\u00e9gz\u00e9s alap\u00fa m\u00f3dra.<\/p>\n\n\n\n<p>Egy \u00e1tfog\u00f3 \u00e9s j\u00f3l struktur\u00e1lt megk\u00f6zel\u00edt\u00e9s egy olyan rendk\u00edv\u00fcli esem\u00e9ny sor\u00e1n, mint amilyet most tapasztalunk, lehet\u0151v\u00e9 teszi a szervezetek sz\u00e1m\u00e1ra, hogy proakt\u00edvan kezelj\u00e9k a kiberbiztons\u00e1gi kih\u00edv\u00e1sokat.<\/p>\n\n\n<h2 class=\"simpletoc-title\">Tartalomjegyz\u00e9k<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#recommendations-for-cybersecurity-amidst-extraordinary-events\">Aj\u00e1nl\u00e1sok a kiberbiztons\u00e1gra rendk\u00edv\u00fcli esem\u00e9nyek k\u00f6zepette<\/a>\n\n<\/li>\n<li><a href=\"#ransomware-and-covid19\">Zsarol\u00f3v\u00edrusok \u00e9s COVID-19<\/a>\n\n<\/li>\n<li><a href=\"#phishing-and-covid19\">Adathal\u00e1szat \u00e9s COVID-19<\/a>\n\n<\/li>\n<li><a href=\"#identity-theft-and-covid19\">Szem\u00e9lyazonoss\u00e1g-lop\u00e1s \u00e9s COVID-19<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-for-cybersecurity-amidst-extraordinary-events\">Aj\u00e1nl\u00e1sok a kiberbiztons\u00e1gra rendk\u00edv\u00fcli esem\u00e9nyek k\u00f6zepette<\/h2>\n\n\n<p>A COVID-19 vil\u00e1gj\u00e1rv\u00e1nyb\u00f3l ered\u0151 v\u00e9delmi int\u00e9zked\u00e9sek f\u00e9ny\u00e9ben a v\u00e1llalatok \u00fczleti folyamataikat <a href=\"https:\/\/www.mckinsey.com\/capabilities\/strategy-and-corporate-finance\/our-insights\/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever\" target=\"_blank\" rel=\"noreferrer noopener\">a t\u00e1voli hozz\u00e1f\u00e9r\u00e9s<\/a> \u00e9s az egy\u00fcttm\u0171k\u00f6d\u00e9si szolg\u00e1ltat\u00e1sok fel\u00e9 mozd\u00edtott\u00e1k el az elm\u00falt h\u00e1rom \u00e9vben. Ez az elmozdul\u00e1s \u00faj kock\u00e1zatokat vezetett be, ami sz\u00fcks\u00e9gess\u00e9 teszi a kiberbiztons\u00e1gi ir\u00e1nyelvek, folyamatok \u00e9s ellen\u0151rz\u00e9sek alkalmazkod\u00e1s\u00e1t az \u00faj m\u0171k\u00f6d\u00e9si forgat\u00f3k\u00f6nyvh\u00f6z.<\/p>\n\n\n\n<p>Figyelembe v\u00e9ve, hogy n\u00e9gy \u00e9v telt el a vil\u00e1gj\u00e1rv\u00e1ny kezdete \u00f3ta, \u00e9s a COVID-19 mut\u00e1l\u00f3d\u00f3 term\u00e9szete miatt egyre t\u00f6bb szervezetnek kell hozz\u00e1igaz\u00edtania jelenlegi folyamatait ahhoz, hogy m\u0171k\u00f6d\u00e9s\u00fck nagy r\u00e9sz\u00e9t t\u00e1volr\u00f3l v\u00e9gezz\u00e9k. Ennek megfelel\u0151en az inform\u00e1ci\u00f3biztons\u00e1gi ellen\u0151rz\u00e9seket is hozz\u00e1 kell igaz\u00edtani, \u00e9s a megfelel\u0151 kiberbiztons\u00e1gi konfigur\u00e1ci\u00f3kat friss\u00edteni kell.<\/p>\n\n\n\n<p>P\u00e9ld\u00e1ul a munkat\u00e1rsak most m\u00e1r sz\u00e9les k\u00f6r\u0171 t\u00e1voli hozz\u00e1f\u00e9r\u00e9ssel rendelkeznek, ami megk\u00f6veteli a szervezetekt\u0151l, hogy nagyobb feldolgoz\u00e1si kapacit\u00e1ssal \u00e9s kapcsol\u00f3d\u00e1si lehet\u0151s\u00e9gekkel rendelkezzenek. Emellett t\u00f6bb interf\u00e9szt kell megnyitniuk vagy b\u0151v\u00edteni\u00fck a bels\u0151 szolg\u00e1ltat\u00e1sokhoz val\u00f3 hozz\u00e1f\u00e9r\u00e9s \u00e9rdek\u00e9ben, \u00e9s lehet\u0151v\u00e9 kell tenni\u00fck az adathozz\u00e1f\u00e9r\u00e9si jogokat egy nyilv\u00e1nos h\u00e1l\u00f3zaton kereszt\u00fcl. A v\u00e1llalatoknak nem szabad elhanyagolniuk vagy elhagyniuk a kock\u00e1zatkezel\u00e9si int\u00e9zked\u00e9seket ebben a k\u00fcl\u00f6nleges helyzetben. A kiberbiztons\u00e1gi \u00e9s h\u00e1l\u00f3zati kapacit\u00e1skezel\u00e9si ir\u00e1nyelvek ideiglenes m\u00f3dos\u00edt\u00e1sa lehet\u0151v\u00e9 teszi a szervezetek sz\u00e1m\u00e1ra, hogy hat\u00e9konyan szemben\u00e9zzenek az \u00faj m\u0171k\u00f6d\u00e9si forgat\u00f3k\u00f6nyv \u00e1ltal jelentett kiberfenyeget\u00e9sekkel.<\/p>\n\n\n\n<p>Ahogy a v\u00e1llalatok t\u00e1vmunk\u00e1t javasolnak az alkalmazottaknak, n\u00f6vekszik a mobil eszk\u00f6z\u00f6k haszn\u00e1lata \u00e9s a v\u00e1llalati rendszerekhez val\u00f3 t\u00e1voli hozz\u00e1f\u00e9r\u00e9s. Ez\u00e9rt elengedhetetlen az int\u00e9zm\u00e9nyi identit\u00e1s-hozz\u00e1f\u00e9r\u00e9s kezel\u00e9s\u00e9nek meger\u0151s\u00edt\u00e9se \u00e9s az esem\u00e9nyek monitoroz\u00e1s\u00e1nak \u00e9s korrel\u00e1ci\u00f3j\u00e1nak jav\u00edt\u00e1sa.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-covid19\">Zsarol\u00f3v\u00edrusok \u00e9s COVID-19<\/h2>\n\n\n<p>A kock\u00e1zatok n\u00f6vekednek, amikor t\u00e1volr\u00f3l vagy otthonr\u00f3l dolgozunk. Proakt\u00edv int\u00e9zked\u00e9sek jav\u00edthatj\u00e1k a felhaszn\u00e1l\u00f3i \u00e9lm\u00e9nyt \u00e9s a kiberbiztons\u00e1got, amikor ilyen keretek k\u00f6z\u00f6tt dolgozunk. Azok az eszk\u00f6z\u00f6k, amelyek nem rendelkeznek a sz\u00fcks\u00e9ges v\u00e9delemmel, adatveszt\u00e9shez, mag\u00e1n\u00e9let megs\u00e9rt\u00e9s\u00e9hez \u00e9s zsarol\u00f3v\u00edrusok \u00e1ldozat\u00e1ul es\u0151 rendszerekhez vezethetnek.<\/p>\n\n\n\n<p>A COVID-19 \u00e1ltal a zsarol\u00f3v\u00edrusoknak adott lend\u00fclet enyh\u00edt\u00e9se \u00e9rdek\u00e9ben aj\u00e1nlott:<\/p>\n\n\n\n<p>Egys\u00e9ges t\u00f6bbl\u00e9pcs\u0151s hiteles\u00edt\u00e9si r\u00e9teg vagy progressz\u00edv hiteles\u00edt\u00e9s bevezet\u00e9se a hozz\u00e1f\u00e9r\u00e9si k\u00e9relmek kritikus fontoss\u00e1ga alapj\u00e1n. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Biztos\u00edtani, hogy az identit\u00e1skezel\u00e9si folyamatok minden harmadik f\u00e9l identit\u00e1s\u00e1t biztos\u00edts\u00e1k, akik hozz\u00e1f\u00e9rnek a v\u00e1llalati h\u00e1l\u00f3zathoz. <\/li>\n\n\n\n<li>\u00c1tfog\u00f3 k\u00e9pet kapni a kiv\u00e1lts\u00e1gos identit\u00e1sokr\u00f3l az IT k\u00f6rnyezet\u00fckben, bele\u00e9rtve egy elj\u00e1r\u00e1st az \u00e1rva fi\u00f3kok \u00e9szlel\u00e9s\u00e9re, megel\u0151z\u00e9s\u00e9re vagy elt\u00e1vol\u00edt\u00e1s\u00e1ra. <\/li>\n\n\n\n<li>Finom\u00edtani a biztons\u00e1gi monitoroz\u00e1s r\u00e9szletess\u00e9g\u00e9t \u00e9s gazdag\u00edtani a monitoroz\u00e1st a t\u00e1voli m\u0171k\u00f6d\u00e9si forgat\u00f3k\u00f6nyvekben. <\/li>\n\n\n\n<li>Figyelemmel k\u00eds\u00e9rni a kiberbiztons\u00e1gi menedzsment funkci\u00f3k m\u0171k\u00f6d\u00e9s\u00e9t; azonos\u00edtani, melyek lehetnek szolg\u00e1ltat\u00e1sb\u00f3l kiesve \u00e9s a biztons\u00e1gi v\u00e1lasz k\u00e9s\u00e9seit.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"phishing-and-covid19\">Adathal\u00e1szat \u00e9s COVID-19<\/h2>\n\n\n<p>A v\u00e1ls\u00e1gok cs\u00f6kkentik a v\u00e9gfelhaszn\u00e1l\u00f3k \u00e9bers\u00e9gi \u00e9s v\u00e9delmi szintj\u00e9t, \u00e9s a kiberb\u0171n\u00f6z\u0151k kihaszn\u00e1lj\u00e1k ezt a helyzetet, hogy rosszindulat\u00fa s\u00e9m\u00e1k szerint m\u0171k\u00f6djenek. Ez\u00e9rt aj\u00e1nlott n\u00f6velni a tudatoss\u00e1got az \u00faj kiberfenyeget\u00e9sek megjelen\u00e9s\u00e9r\u0151l. A vil\u00e1gj\u00e1rv\u00e1ny idej\u00e9n az alkalmazottak folyamatosan nagy mennyis\u00e9g\u0171 inform\u00e1ci\u00f3t kapnak r\u00f3la bels\u0151 \u00e9s k\u00fcls\u0151 forr\u00e1sokb\u00f3l. Ez pszichol\u00f3giai nyom\u00e1st okozhat, ami cs\u00f6kkenti \u00e9bers\u00e9g\u00fcket \u00e9s befoly\u00e1solja a kiberfenyeget\u00e9sekre, p\u00e9ld\u00e1ul a szoci\u00e1lis m\u00e9rn\u00f6ki t\u00e1mad\u00e1sokra vagy az adathal\u00e1szatra adott v\u00e1laszuk szintj\u00e9t.<\/p>\n\n\n\n<p>A COVID-19-hez kapcsol\u00f3d\u00f3 adathal\u00e1sz kamp\u00e1nyok, amelyekben a kiberb\u0171n\u00f6z\u0151k p\u00e9ld\u00e1ul j\u00f3 h\u00edr\u0171 eg\u00e9szs\u00e9g\u00fcgyi szervezeteket szem\u00e9lyes\u00edtenek meg, n\u00f6vekedtek. Emiatt a szervezeteknek \u00e9bernek kell maradniuk a vil\u00e1gj\u00e1rv\u00e1nnyal kapcsolatos csal\u00f3 \u00fczenetekkel szemben. A kiberb\u0171n\u00f6z\u0151k rosszindulat\u00fa mell\u00e9kletekkel vagy csal\u00f3 weboldalakra mutat\u00f3 linkekkel ell\u00e1tott e-maileket k\u00fcldhetnek, hogy becsapj\u00e1k az \u00e1ldozatokat \u00e9rz\u00e9keny inform\u00e1ci\u00f3k felfed\u00e9s\u00e9re vagy csal\u00f3 szervezeteknek vagy \u00fcgyeknek t\u00f6rt\u00e9n\u0151 adom\u00e1nyoz\u00e1sra. Az ilyen t\u00e1mad\u00e1sok gyorsan \u00e9s sz\u00e9les k\u00f6rben terjedhetnek el egy teljes \u00fczleti h\u00e1l\u00f3zaton, ami szem\u00e9lyazonoss\u00e1g-lop\u00e1shoz \u00e9s hamis fizet\u00e9si ig\u00e9nyek \u00e9s juttat\u00e1si programok beny\u00fajt\u00e1s\u00e1hoz vezethet. De a pszichol\u00f3giai nyom\u00e1s n\u00f6veked\u00e9se nem csak ebben az \u00e9rtelemben hat. Ez a jelens\u00e9g azt is okozhatja, hogy a munkat\u00e1rsak hajlamosabbak legyenek hib\u00e1kat elk\u00f6vetni a folyamatok kezel\u00e9s\u00e9ben vagy bizonytalan viselked\u00e9st tan\u00fas\u00edtani, p\u00e9ld\u00e1ul megosztani mag\u00e1ninform\u00e1ci\u00f3kat vagy hozz\u00e1f\u00e9r\u00e9si hiteles\u00edt\u0151 adatokat. <\/p>\n\n\n\n<p>Ez\u00e9rt aj\u00e1nlott tudatoss\u00e1gn\u00f6vel\u0151 akci\u00f3kat v\u00e9grehajtani \u00fczenetekkel, az al\u00e1bbi ir\u00e1nyelvekkel:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/hogyan-vedheti-meg-vallalkozasat-az-e-mailes-adathalasz-tamadasoktol\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Legyen \u00f3vatos b\u00e1rmilyen e-mail kezel\u00e9s\u00e9n\u00e9l,<\/a> amelynek t\u00e1rgysora, mell\u00e9klete vagy hiperhivatkoz\u00e1sa kapcsol\u00f3dik a COVID-19-hez, \u00e9s legyen \u00f3vatos a k\u00f6z\u00f6ss\u00e9gi m\u00e9di\u00e1b\u00f3l sz\u00e1rmaz\u00f3, COVID-19-hez kapcsol\u00f3d\u00f3 felh\u00edv\u00e1sokkal, sz\u00f6vegekkel vagy h\u00edv\u00e1sokkal.<\/li>\n\n\n\n<li>Haszn\u00e1ljon megb\u00edzhat\u00f3 forr\u00e1sokat, p\u00e9ld\u00e1ul hivatalos korm\u00e1nyzati weboldalakat a COVID-19-r\u0151l sz\u00f3l\u00f3 naprak\u00e9sz, t\u00e9nyalap\u00fa inform\u00e1ci\u00f3k\u00e9rt.<\/li>\n\n\n\n<li>Ne fedjen fel szem\u00e9lyes vagy p\u00e9nz\u00fcgyi inform\u00e1ci\u00f3kat e-mailben, \u00e9s ne v\u00e1laszoljon az ilyen inform\u00e1ci\u00f3k ir\u00e1nti k\u00e9relmekre.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"identity-theft-and-covid19\">Szem\u00e9lyazonoss\u00e1g-lop\u00e1s \u00e9s COVID-19<\/h2>\n\n\n<p>Nagyobb a kock\u00e1zata a bizalmas vagy mag\u00e1nadatok kisziv\u00e1rg\u00e1s\u00e1nak a nem biztons\u00e1gos k\u00f6rnyezetekben val\u00f3 kitetts\u00e9g miatt, ez\u00e9rt aj\u00e1nlott a t\u00e1voli kapcsolatok kezel\u00e9se. A t\u00e1voli hozz\u00e1f\u00e9r\u00e9s \u00e9s az egy\u00fcttm\u0171k\u00f6d\u00e9s lehet\u0151s\u00e9gei nem v\u00e1llalati h\u00e1l\u00f3zatokon \u00e9s eszk\u00f6z\u00f6k\u00f6n kereszt\u00fcl n\u00f6vekedtek. A jelenlegi helyzetben az alkalmazottak k\u00eds\u00e9rt\u00e9st \u00e9rezhetnek, hogy ezeket az eszk\u00f6z\u00f6ket haszn\u00e1lj\u00e1k a v\u00e1llalatiak helyett.<\/p>\n\n\n\n<p>Ez a helyzet bizalmas adatok kitetts\u00e9g\u00e9t okozhatja nem v\u00e1llalati h\u00e1l\u00f3zatokon, k\u00f6z\u00f6ss\u00e9gi h\u00e1l\u00f3zatokon \u00e9s\/vagy harmadik f\u00e9l platformjain, amelyek nem rendelkeznek megfelel\u0151 v\u00e9delmi int\u00e9zked\u00e9sekkel. Emellett az elm\u00falt \u00e9vekben sok gyenge biztons\u00e1gi jellemz\u0151kkel rendelkez\u0151 okos h\u00e1l\u00f3zati eszk\u00f6z ker\u00fclt az otthonokba. Ezeknek az eszk\u00f6z\u00f6knek a sz\u00e1mos biztons\u00e1gi gyenges\u00e9ge olyan kock\u00e1zatokat jelent, amelyekre k\u00fcl\u00f6nb\u00f6z\u0151 biztons\u00e1gi \u00fcgyn\u00f6ks\u00e9gek figyelmeztettek, \u00e9s amelyek a \u201ct\u00f6meges\u201d t\u00e1voli m\u0171k\u00f6d\u00e9s alatt relev\u00e1nsabb\u00e1 \u00e9s hat\u00e1sosabb\u00e1 v\u00e1lnak.<\/p>\n\n\n\n<p>Ezek az eszk\u00f6z\u00f6k kock\u00e1zatokat is jelentenek a nem biztons\u00e1gos alap\u00e9rtelmezett konfigur\u00e1ci\u00f3k, a gy\u00e1rt\u00f3i karbantart\u00e1s vagy t\u00e1mogat\u00e1s hi\u00e1nya, a biztons\u00e1gi friss\u00edt\u00e9sek hi\u00e1nya \u00e9s az ismeretlen felhaszn\u00e1l\u00f3i hozz\u00e1f\u00e9r\u00e9si lehet\u0151s\u00e9gek miatt.<\/p>\n\n\n\n<p>A v\u00e1llalatoknak azonos\u00edtaniuk \u00e9s oszt\u00e1lyozniuk kell a t\u00e1voli kapcsolati k\u00f6vetelm\u00e9nyeket, azonos\u00edtaniuk kell a kapcsol\u00f3d\u00f3 kock\u00e1zatokat, \u00e9s gyorsan meg kell er\u0151s\u00edteni\u00fck az \u00fczleti biztons\u00e1gi k\u00fcsz\u00f6b\u00f6t, amelyet ebben a helyzetben megengednek. Ugyanakkor el kell ker\u00fclni\u00fck, hogy sok kiv\u00e9telt fogadjanak el, amelyek al\u00e1\u00e1ss\u00e1k az inform\u00e1ci\u00f3biztons\u00e1gi menedzsment \u00e9s ellen\u0151rz\u00e9s szintj\u00e9t, k\u00fcl\u00f6n\u00f6sen, ha ezek a kiv\u00e9telek m\u00e1sodlagos \u00fczleti ig\u00e9nyek miatt mer\u00fclnek fel.<\/p>\n\n\n\n<p><strong>Kiberbiztons\u00e1g a felh\u0151ben \u00e9s a Covid-19<\/strong><\/p>\n\n\n\n<p>A digit\u00e1lis \u00e1talakul\u00e1s lehet\u0151v\u00e9 teszi a k\u00f6z-, mag\u00e1n- \u00e9s vegyes v\u00e1llalatok sz\u00e1m\u00e1ra, hogy kiberbiztons\u00e1gi rendszereket \u00e9s int\u00e9zked\u00e9seket fejlesszenek ki a behatol\u00e1s \u00e9s a kritikus rendszerekhez val\u00f3 hozz\u00e1f\u00e9r\u00e9s megel\u0151z\u00e9se \u00e9rdek\u00e9ben. Aj\u00e1nlott egy kiber-helyre\u00e1ll\u00edt\u00e1si terv megl\u00e9te. Ebben az \u00e9rtelemben a jelenlegi sz\u00e1m\u00edt\u00f3g\u00e9pes korszakot nagyobb technol\u00f3giai \u00e1talakul\u00e1s jellemzi, \u00e9s a felh\u0151 vagy a nagyobb h\u00e1l\u00f3zati kapacit\u00e1sok haszn\u00e1lata azt mutatja, hogy a kiberfenyeget\u00e9si panor\u00e1ma tov\u00e1bbra is n\u00f6vekedni fog.<\/p>\n\n\n\n<p>Ebben a kontextusban a kiberb\u0171n\u00f6z\u0151k arra t\u00f6rekednek, hogy egyidej\u0171leg t\u00e1madj\u00e1k meg a m\u0171k\u00f6d\u00e9si rendszereket \u00e9s a biztons\u00e1gi ment\u00e9si kapacit\u00e1sokat egy rendk\u00edv\u00fcl kifinomult m\u0171k\u00f6d\u00e9si s\u00e9m\u00e1ban, ami jelent\u0151s kock\u00e1zatot jelenthet b\u00e1rmely v\u00e1llalat sz\u00e1m\u00e1ra.<\/p>\n\n\n\n<p>A v\u00e1llalatok jav\u00edthatj\u00e1k kiber v\u00e9delmi helyzet\u00fcket \u00e9s <a href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-vallalkozasok-elleni-kibertamadasok-legelterjedtebb-tipusai-es-azok-elkerulesenek-modjai\/\">kiber t\u00e1mad\u00e1s<\/a> felk\u00e9sz\u00fclts\u00e9g\u00fcket j\u00f3 kiberhigi\u00e9ni\u00e1val, incidensv\u00e1lasz strat\u00e9gi\u00e1val, valamint kiber-helyre\u00e1ll\u00edt\u00e1si megold\u00e1sok tervez\u00e9s\u00e9vel \u00e9s megval\u00f3s\u00edt\u00e1s\u00e1val, amelyek enyh\u00edtik a kiber t\u00e1mad\u00e1sok hat\u00e1s\u00e1t. Egy \u00e9letk\u00e9pes kiberreziliencia program kiterjeszti a hagyom\u00e1nyos kock\u00e1zati ter\u00fcletek hat\u00e1rait, hogy \u00faj k\u00e9pess\u00e9geket foglaljon mag\u00e1ban, mint p\u00e9ld\u00e1ul az alkalmazotti t\u00e1mogat\u00e1si szolg\u00e1ltat\u00e1sok, a t\u00e1voli kommunik\u00e1ci\u00f3s \u00e9s egy\u00fcttm\u0171k\u00f6d\u00e9si eszk\u00f6z\u00f6k, valamint egy helyre\u00e1ll\u00edt\u00e1si p\u00e1nc\u00e9lterem.<\/p>","protected":false},"excerpt":{"rendered":"<p>Faced with a disconcerting situation of global impact, disseminating truthful and precise information is essential to define the control and protection measures that must be implemented for damage control. In\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Biztons\u00e1g meg\u0151rz\u00e9se glob\u00e1lis esem\u00e9nyeken: Kiberfenyeget\u00e9sek elleni k\u00fczdelem \u00e9s j\u00f3l\u00e9t biztos\u00edt\u00e1sa<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Staying Safe in Global Events: Combating Cyber Threats<\/title>\n<meta name=\"description\" content=\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staying Safe in Global Events: Combating Cyber Threats\" \/>\n<meta property=\"og:description\" content=\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-08T14:32:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being\",\"datePublished\":\"2023-04-08T14:32:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"},\"wordCount\":1205,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\",\"name\":\"Staying Safe in Global Events: Combating Cyber Threats\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"datePublished\":\"2023-04-08T14:32:10+00:00\",\"description\":\"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Staying Safe in Global Events Combating Cyber Threats & Ensuring Well-being\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biztons\u00e1g meg\u0151rz\u00e9se glob\u00e1lis esem\u00e9nyeken: Kiberfenyeget\u00e9sek elleni k\u00fczdelem","description":"Glob\u00e1lis v\u00e1ls\u00e1gok idej\u00e9n helyezzenek priorit\u00e1st a pontos inform\u00e1ci\u00f3kra \u00e9s a kiberbiztons\u00e1gra, hogy megv\u00e9dj\u00e9k az \u00e9rz\u00e9keny rendszereket a kiberb\u0171n\u00f6z\u0151kt\u0151l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/","og_locale":"hu_HU","og_type":"article","og_title":"Staying Safe in Global Events: Combating Cyber Threats","og_description":"In global crises, prioritize accurate info and cybersecurity to protect sensitive systems from cybercriminals.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/biztonsagban-maradni-a-globalis-esemenyeken-kuzdelem-a-kiberfenyegetesek-ellen\/","og_site_name":"Security Briefing","article_published_time":"2023-04-08T14:32:10+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being","datePublished":"2023-04-08T14:32:10+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"},"wordCount":1205,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/","name":"Biztons\u00e1g meg\u0151rz\u00e9se glob\u00e1lis esem\u00e9nyeken: Kiberfenyeget\u00e9sek elleni k\u00fczdelem","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","datePublished":"2023-04-08T14:32:10+00:00","description":"Glob\u00e1lis v\u00e1ls\u00e1gok idej\u00e9n helyezzenek priorit\u00e1st a pontos inform\u00e1ci\u00f3kra \u00e9s a kiberbiztons\u00e1gra, hogy megv\u00e9dj\u00e9k az \u00e9rz\u00e9keny rendszereket a kiberb\u0171n\u00f6z\u0151kt\u0151l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Staying-Safe-in-Global-Events-1.jpg","width":696,"height":300,"caption":"Staying Safe in Global Events Combating Cyber Threats & Ensuring Well-being"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/staying-safe-in-global-events-combating-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Staying Safe in Global Events: Combating Cyber Threats &amp; Ensuring Well-being"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1707"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}