{"id":260,"date":"2022-06-22T21:39:55","date_gmt":"2022-06-22T21:39:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=260"},"modified":"2022-06-22T21:39:55","modified_gmt":"2022-06-22T21:39:55","slug":"hogyan-teszik-a-berbeadok-a-berloiket-veszelybe","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/","title":{"rendered":"Hogyan vesz\u00e9lyeztetik az adatb\u00e9rl\u0151k b\u00e9rl\u0151iket?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Ahogy a v\u00e1llalkoz\u00e1sok \u00e1thelyezik tev\u00e9kenys\u00e9g\u00fcket a felh\u0151be, egyre nagyobb bizalmat helyeznek harmadik f\u00e9l szolg\u00e1ltat\u00f3kba. Most fontosabb, mint valaha, hogy ezek a c\u00e9gek tiszt\u00e1ban legyenek az adatszolg\u00e1ltat\u00f3khoz kapcsol\u00f3d\u00f3 kock\u00e1zatokkal, akik azzal vesz\u00e9lyeztetik b\u00e9rl\u0151iket, hogy nem megfelel\u0151en biztos\u00edtj\u00e1k adataikat. A Microsoft egy kiv\u00e1l\u00f3 p\u00e9lda egy olyan adatszolg\u00e1ltat\u00f3ra, amely gyenge biztons\u00e1got ny\u00fajt, \u00e9s ezzel kock\u00e1zatnak teszi ki \u00fcgyfeleit. Ez a cikk a harmadik f\u00e9l szolg\u00e1ltat\u00f3kba vetett bizalom vesz\u00e9lyeit \u00e9s az \u00fczleti tev\u00e9kenys\u00e9g v\u00e9delm\u00e9t t\u00e1rgyalja a t\u00e1mad\u00e1sokkal szemben.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan vesz\u00e9lyeztetik az adatszolg\u00e1ltat\u00f3k a b\u00e9rl\u0151iket?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Sz\u00e1mos m\u00f3dja van annak, hogy az adatszolg\u00e1ltat\u00f3k vesz\u00e9lyeztess\u00e9k b\u00e9rl\u0151iket. Az egyik leggyakoribb, hogy nem biztos\u00edtj\u00e1k megfelel\u0151en adataikat. Ha nem biztos\u00edtj\u00e1k adataikat, a hackerek hozz\u00e1f\u00e9rhetnek \u00e9rz\u00e9keny inform\u00e1ci\u00f3khoz, p\u00e9ld\u00e1ul \u00fcgyf\u00e9lnevekhez \u00e9s hitelk\u00e1rtyasz\u00e1mokhoz. Az adatszolg\u00e1ltat\u00f3k eladhatj\u00e1k vagy b\u00e9rbe adhatj\u00e1k b\u00e9rl\u0151ik adatait m\u00e1s c\u00e9geknek a b\u00e9rl\u0151k tudta vagy beleegyez\u00e9se n\u00e9lk\u00fcl. Ez az adatok felhaszn\u00e1l\u00e1s\u00e1nak ellen\u0151rz\u00e9s\u00e9nek elveszt\u00e9s\u00e9hez vezethet, \u00e9s megnehez\u00edtheti a b\u00e9rl\u0151 sz\u00e1m\u00e1ra a mag\u00e1n\u00e9let v\u00e9delm\u00e9t. V\u00e9g\u00fcl az adatszolg\u00e1ltat\u00f3k gondatlanok is lehetnek b\u00e9rl\u0151ik adataival, ami v\u00e9letlen sziv\u00e1rg\u00e1sokhoz vagy nyilv\u00e1noss\u00e1gra hozatalokhoz vezethet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Az adatszolg\u00e1ltat\u00f3k b\u00e9rl\u0151i kock\u00e1zatot v\u00e1llalnak arra, hogy \u00e9rz\u00e9keny inform\u00e1ci\u00f3ik ellopj\u00e1k, adataikat tudtuk vagy beleegyez\u00e9s\u00fck n\u00e9lk\u00fcl eladj\u00e1k vagy b\u00e9rbe adj\u00e1k, \u00e9s adataik v\u00e9letlen\u00fcl kisziv\u00e1rognak.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Adatsziv\u00e1rg\u00e1s: A harmadik f\u00e9l szolg\u00e1ltat\u00f3kba vetett bizalom egyik vesz\u00e9lye<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Az adatsziv\u00e1rg\u00e1s a harmadik f\u00e9l szolg\u00e1ltat\u00f3kba vetett bizalom egyik legs\u00falyosabb vesz\u00e9lye. Adatsziv\u00e1rg\u00e1s akkor fordulhat el\u0151, amikor egy szolg\u00e1ltat\u00f3 v\u00e9letlen\u00fcl vagy sz\u00e1nd\u00e9kosan bizalmas inform\u00e1ci\u00f3kat hoz nyilv\u00e1noss\u00e1gra. Adatsziv\u00e1rg\u00e1s akkor is el\u0151fordulhat, amikor egy szolg\u00e1ltat\u00f3 eladja vagy b\u00e9rbe adja a b\u00e9rl\u0151 adatait egy m\u00e1sik c\u00e9gnek a b\u00e9rl\u0151 tudta vagy beleegyez\u00e9se n\u00e9lk\u00fcl. Adatsziv\u00e1rg\u00e1s akkor is el\u0151fordulhat, amikor egy szolg\u00e1ltat\u00f3 gondatlan a b\u00e9rl\u0151i adataival, \u00e9s v\u00e9letlen\u00fcl nyilv\u00e1noss\u00e1gra hozza azokat. A bizalmas inform\u00e1ci\u00f3k nyilv\u00e1noss\u00e1gra hozatala s\u00falyos k\u00f6vetkezm\u00e9nyekkel j\u00e1rhat a b\u00e9rl\u0151k sz\u00e1m\u00e1ra, bele\u00e9rtve a szem\u00e9lyazonoss\u00e1g-lop\u00e1st, csal\u00e1st \u00e9s a h\u00edrnev\u00fck k\u00e1rosod\u00e1s\u00e1t.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Milyen l\u00e9p\u00e9seket tehetnek a v\u00e1llalkoz\u00e1sok, hogy megv\u00e9dj\u00e9k magukat ezekt\u0151l a kock\u00e1zatokt\u00f3l?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A v\u00e1llalkoz\u00e1sok n\u00e9h\u00e1ny l\u00e9p\u00e9st tehetnek, hogy megv\u00e9dj\u00e9k magukat az adatszolg\u00e1ltat\u00f3khoz kapcsol\u00f3d\u00f3 kock\u00e1zatokt\u00f3l. El\u0151sz\u00f6r is, a c\u00e9geknek alaposan meg kell vizsg\u00e1lniuk a harmadik f\u00e9l szolg\u00e1ltat\u00f3kat, miel\u0151tt megb\u00edzn\u00e1nak benn\u00fck adataikkal. Ellen\u0151rizze a v\u00e1llalkoz\u00e1s k\u00e9pes\u00edt\u00e9s\u00e9t, bele\u00e9rtve, hogy rendelkezik-e enged\u00e9llyel \u00e9s biztos\u00edt\u00e1ssal. Keressen b\u00e1rmilyen fenn\u00e1ll\u00f3 \u00edt\u00e9letet vagy \u00e1ll\u00edt\u00e1st a nem biztons\u00e1gos munkak\u00f6r\u00fclm\u00e9nyekkel kapcsolatban. Ellen\u0151rizze, hogy a szolg\u00e1ltat\u00f3nak j\u00f3 h\u00edrneve van-e, az\u00e1ltal, hogy megvizsg\u00e1lja a h\u00e1tter\u00e9t. Ezenk\u00edv\u00fcl a v\u00e1llalkoz\u00e1soknak fontol\u00f3ra kell venni\u00fck a titkos\u00edt\u00e1s \u00e9s m\u00e1s biztons\u00e1gi technol\u00f3gi\u00e1k haszn\u00e1lat\u00e1t, hogy megv\u00e9dj\u00e9k adataikat az illet\u00e9ktelen hozz\u00e1f\u00e9r\u00e9st\u0151l. V\u00e9g\u00fcl a c\u00e9geknek meg kell \u0151rizni\u00fck adataik biztons\u00e1gi ment\u00e9seit v\u00e9letlen nyilv\u00e1noss\u00e1gra hozatal vagy sziv\u00e1rg\u00e1s eset\u00e9re.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Titkos\u00edt\u00e1s:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Az egyik legjobb m\u00f3dja annak, hogy megv\u00e9dje adatait, ha titkos\u00edtja azokat. Az adatok titkos\u00edt\u00e1sa olvashatatlann\u00e1 teszi azokat b\u00e1rki sz\u00e1m\u00e1ra, aki nem rendelkezik a megfelel\u0151 kulccsal, \u00edgy sokkal nehezebb\u00e9 teszi a hackerek sz\u00e1m\u00e1ra az inform\u00e1ci\u00f3k ellop\u00e1s\u00e1t. Ezenk\u00edv\u00fcl titkos\u00edtania kell az adatok b\u00e1rmely biztons\u00e1gi ment\u00e9s\u00e9t is, v\u00e9letlen nyilv\u00e1noss\u00e1gra hozatal vagy sziv\u00e1rg\u00e1s eset\u00e9re.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Biztons\u00e1gi ment\u00e9sek:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Egy m\u00e1sik fontos l\u00e9p\u00e9s, amit a v\u00e1llalkoz\u00e1sok megtehetnek az adatszolg\u00e1ltat\u00f3k kock\u00e1zatainak v\u00e9delm\u00e9ben, hogy biztons\u00e1gi ment\u00e9seket k\u00e9sz\u00edtenek adataikr\u00f3l. \u00cdgy, ha v\u00e9letlen nyilv\u00e1noss\u00e1gra hozatal vagy sziv\u00e1rg\u00e1s t\u00f6rt\u00e9nik, m\u00e9g mindig lesz egy p\u00e9ld\u00e1nya az adatair\u00f3l, amelyet nem \u00e9rintettek.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Harmadik f\u00e9l szolg\u00e1ltat\u00f3k ellen\u0151rz\u00e9se:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Ahogy kor\u00e1bban eml\u00edtett\u00fck, a v\u00e1llalkoz\u00e1soknak alaposan meg kell vizsg\u00e1lniuk a harmadik f\u00e9l szolg\u00e1ltat\u00f3kat, miel\u0151tt megb\u00edzn\u00e1nak benn\u00fck adataikkal. Ez mag\u00e1ban foglalja a megfelel\u0151 biztons\u00e1gi int\u00e9zked\u00e9sek ellen\u0151rz\u00e9s\u00e9t \u00e9s a szolg\u00e1ltat\u00f3 j\u00f3 h\u00edrnev\u00e9nek biztos\u00edt\u00e1s\u00e1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ezeknek a l\u00e9p\u00e9seknek a megt\u00e9tel\u00e9vel a v\u00e1llalkoz\u00e1sok megv\u00e9dhetik magukat az adatszolg\u00e1ltat\u00f3khoz kapcsol\u00f3d\u00f3 kock\u00e1zatokt\u00f3l. Azonban fontos eml\u00e9kezni arra, hogy egyetlen biztons\u00e1gi int\u00e9zked\u00e9s sem t\u00f6k\u00e9letes, \u00e9s mindig van n\u00e9mi kock\u00e1zat, amikor harmadik f\u00e9l szolg\u00e1ltat\u00f3kra b\u00edzzuk adatainkat.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Ahogy a v\u00e1llalkoz\u00e1sok \u00e1thelyezik m\u0171k\u00f6d\u00e9s\u00fcket a felh\u0151be, egyre nagyobb bizalmat helyeznek harmadik f\u00e9l szolg\u00e1ltat\u00f3kba. Most kritikusabb, mint valaha, hogy ezek a v\u00e1llalatok\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Hogyan vesz\u00e9lyeztetik az adatb\u00e9rl\u0151k b\u00e9rl\u0151iket?<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,27],"tags":[],"class_list":["post-260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Data Landlords Put Their Tenants at Risk? | Security Briefing<\/title>\n<meta name=\"description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T21:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How Data Landlords Put Their Tenants at Risk?\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"articleSection\":[\"Cyber Threats\",\"Security\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"name\":\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"description\":\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"width\":999,\"height\":667,\"caption\":\"How-Data-Landlords-Put-Their-Tenants-at-Risk\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Data Landlords Put Their Tenants at Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hogyan teszik kock\u00e1ra a b\u00e9rl\u0151iket az adath\u00e1ziurak? | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Ismerje meg a harmadik f\u00e9l szolg\u00e1ltat\u00f3kba vetett bizalom vesz\u00e9lyeit, \u00e9s hogyan v\u00e9dheti meg adatait az \u00fczleti t\u00e1mad\u00e1sokt\u00f3l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/","og_locale":"hu_HU","og_type":"article","og_title":"How Data Landlords Put Their Tenants at Risk? | Security Briefing","og_description":"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hogyan-teszik-a-berbeadok-a-berloiket-veszelybe\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T21:39:55+00:00","og_image":[{"width":999,"height":667,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How Data Landlords Put Their Tenants at Risk?","datePublished":"2022-06-22T21:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"wordCount":624,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","articleSection":["Cyber Threats","Security"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","name":"Hogyan teszik kock\u00e1ra a b\u00e9rl\u0151iket az adath\u00e1ziurak? | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","datePublished":"2022-06-22T21:39:55+00:00","description":"Ismerje meg a harmadik f\u00e9l szolg\u00e1ltat\u00f3kba vetett bizalom vesz\u00e9lyeit, \u00e9s hogyan v\u00e9dheti meg adatait az \u00fczleti t\u00e1mad\u00e1sokt\u00f3l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","width":999,"height":667,"caption":"How-Data-Landlords-Put-Their-Tenants-at-Risk"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Data Landlords Put Their Tenants at Risk?"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}