{"id":1221,"date":"2022-11-09T13:13:26","date_gmt":"2022-11-09T13:13:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1221"},"modified":"2022-11-09T13:13:26","modified_gmt":"2022-11-09T13:13:26","slug":"cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/","title":{"rendered":"Cum s\u0103 v\u0103 proteja\u021bi afacerea de atacurile de phishing prin e-mail"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Criminalitatea informatic\u0103 este \u00een prezent una dintre numeroasele preocup\u0103ri cu care se confrunt\u0103 zilnic \u00eentreprinderile. Cu toate acestea, pe m\u0103sur\u0103 ce aspectul digital devine din ce \u00een ce mai esen\u021bial pentru func\u021bionarea \u0219i activit\u0103\u021bile zilnice ale \u00eentreprinderilor, cre\u0219te \u0219i num\u0103rul atacurilor \u00een acest mediu.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unul dintre cele mai comune mijloace prin care hackerii ob\u021bin acces la informa\u021biile private ale persoanelor \u0219i companiilor este prin e-mail. E-mailul este unul dintre cele mai utilizate canale de c\u0103tre companii \u0219i persoane pentru a partaja informa\u021bii zilnic. Este incredibil c\u00e2t de multe informa\u021bii sunt trimise prin e-mail \u00een fiecare zi \u0219i c\u00e2t de multe dintre aceste date con\u021bin informa\u021bii private sau delicate. Dac\u0103 dori\u021bi s\u0103 preveni\u021bi ca firma dumneavoastr\u0103 s\u0103 sufere un atac de tip phishing din cauza unei neglijen\u021be \u00een utilizarea corect\u0103 a e-mailului, acest articol v\u0103 va oferi informa\u021bii valoroase pentru a preveni \u0219i a oferi o mai mare securitate companiei dumneavoastr\u0103.\u00a0<\/span><\/p>\n<h2><b>\u00cen primul r\u00e2nd, ce este phishing-ul?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Phishing-ul este un tip de inginerie social\u0103 prin care hackerul p\u0103c\u0103le\u0219te un utilizator s\u0103 fac\u0103 \"lucrul gre\u0219it\", care include, de obicei, dezv\u0103luirea de informa\u021bii sau s\u0103 dea clic pe un link mali\u021bios. Phishing-ul poate fi efectuat prin intermediul re\u021belelor de socializare, al mesajelor text sau chiar prin telefon. Cu toate acestea, \u00een prezent, e-mailurile au fost cel mai comun canal de perpetuare a acestui tip de atac. E-mailul este o metod\u0103 de livrare ideal\u0103 pentru atacurile de phishing, deoarece majoritatea oamenilor \u00ee\u0219i verific\u0103 e-mailurile \u00een mod gr\u0103bit. \u00cen plus, aceste e-mailuri mali\u021bioase sunt foarte u\u0219or de camuflat printre e-mailurile legitime.<\/span><\/p>\n<h3><b>Cum afecteaz\u0103 phishing-ul \u00eentreprinderile?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">O organiza\u021bie de orice tip \u0219i m\u0103rime poate fi afectat\u0103 de un e-mail de phishing. \u00cen afar\u0103 de furtul de informa\u021bii, e-mailurile de phishing pot instala programe malware, inclusiv ransomware, v\u0103 pot sabota sistemele sau fura bani prin fraud\u0103. \u00cen plus, un atac cibernetic v\u0103 poate distruge reputa\u021bia \u0219i \u00eencrederea clien\u021bilor. S-ar putea s\u0103 fi\u021bi prins \u00eentr-o campanie de mas\u0103; \u00een acest caz, atacatorul fur\u0103 parole sau c\u00e2\u0219tig\u0103 bani u\u0219or, ceea ce reprezint\u0103, de obicei, primul pas c\u0103tre comiterea unui atac mai mare asupra companiei dumneavoastr\u0103, cum ar fi furtul de date sensibile. \u00centr-o campanie direc\u021bionat\u0103, atacatorii pot utiliza informa\u021bii private despre angaja\u021bii dvs. pentru a crea mesaje mai realiste \u0219i mai conving\u0103toare, ceea ce este cunoscut sub denumirea de spear phishing.<\/span><\/p>\n<h3><b>De ce au succes atacurile de phishing?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hackerii au studiat foarte bine comportamentul online al oamenilor, \u0219tiu cum func\u021bioneaz\u0103 instinctele sociale ale oamenilor, cum ar fi ajutorul \u0219i eficien\u021ba. Atacurile de phishing pot fi deosebit de puternice, deoarece aceste instincte sociale ne fac, de asemenea, buni la locul de munc\u0103.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cel mai eficient mod de a v\u0103 proteja \u00eempotriva atacurilor de phishing este de a utiliza o combina\u021bie de abord\u0103ri bazate pe tehnologie, procese \u0219i oameni. De exemplu, dac\u0103 dori\u021bi ca oamenii s\u0103 raporteze orice e-mail suspect, trebuie s\u0103 le facilita\u021bi acest lucru. Aceasta \u00eenseamn\u0103 s\u0103 oferi\u021bi mijloace tehnice de raportare a e-mailului \u0219i s\u0103 dispune\u021bi de un proces care va oferi feedback \u00een timp util cu privire la raport.<\/span><\/p>\n<h2><b>Cum s\u0103 v\u0103 proteja\u021bi afacerea \u00eempotriva atacurilor de phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Iat\u0103 c\u00e2\u021biva pa\u0219i oferi\u021bi de exper\u021bi pentru a v\u0103 proteja compania de atacurile de phishing prin e-mail:<\/span><\/p>\n<h3><b>Extinderea ap\u0103r\u0103rii:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ap\u0103r\u0103rile tipice \u00eempotriva phishing-ului se bazeaz\u0103 pe capacitatea utilizatorilor de a detecta e-mailurile de phishing. Prin extinderea sistemului de ap\u0103rare, v\u0103 pute\u021bi \u00eembun\u0103t\u0103\u021bi rezisten\u021ba \u00eempotriva phishing-ului f\u0103r\u0103 a \u00eentrerupe productivitatea angaja\u021bilor dumneavoastr\u0103. De asemenea, ve\u021bi avea mai multe oportunit\u0103\u021bi de a detecta un atac de phishing \u0219i de a ac\u021biona \u00eenainte ca acesta s\u0103 provoace pagube mari companiei dumneavoastr\u0103. De asemenea, este esen\u021bial s\u0103 accepta\u021bi faptul c\u0103 unele atacuri vor reu\u0219i, pe care \u00eel pute\u021bi folosi ca un avantaj pentru a planifica din timp \u0219i a minimiza daunele cauzate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Atunci c\u00e2nd v\u0103 elabora\u021bi planul de securitate, v\u0103 pute\u021bi g\u00e2ndi la ap\u0103rarea dumneavoastr\u0103 \u00een termeni de patru straturi:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nu l\u0103sa\u021bi adresele dvs. de e-mail s\u0103 fie o resurs\u0103 pentru hackeri.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ajuta\u021bi utilizatorii s\u0103 identifice \u0219i s\u0103 raporteze e-mailurile poten\u021bial d\u0103un\u0103toare sau frauduloase.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">P\u0103stra\u021bi-v\u0103 organiza\u021bia \u00een siguran\u021b\u0103 fa\u021b\u0103 de e-mailurile de phishing care nu sunt detectate.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Este important s\u0103 r\u0103spunde\u021bi rapid la incidente pentru a le rezolva c\u00e2t mai cur\u00e2nd posibil.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Mai jos vom explica fiecare dintre aceste straturi \u0219i cum s\u0103 le aplica\u021bi \u00een afacerea dumneavoastr\u0103.\u00a0<\/span><\/p>\n<h2><b>Stratul 1: Face\u021bi dificil accesul hackerilor la utilizatorii dvs.<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Primul strat descrie m\u0103surile de ap\u0103rare care pot \u00eengreuna accesul hackerilor la utilizatorii finali.<\/span><\/p>\n<h3><b>Nu l\u0103sa\u021bi hackerii s\u0103 v\u0103 foloseasc\u0103 adresele de e-mail ca resurs\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Atacatorii pot p\u0103c\u0103li oamenii trimi\u021b\u00e2nd e-mailuri \u00een care se prefac c\u0103 sunt altcineva, de exemplu, unul dintre angaja\u021bii dvs. sau chiar dvs. Aceste e-mailuri false pot ajunge la clien\u021bii dvs. sau la persoane din cadrul organiza\u021biei dvs.<\/span><\/p>\n<p><strong>Cum pute\u021bi preveni acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Pentru a v\u0103 proteja adresele de e-mail \u0219i pentru a \u00eempiedica accesul hackerilor, pute\u021bi utiliza controale anti-spoofing: DMARC, SPF \u0219i DKIM. \u00cen plus, este foarte util s\u0103 v\u0103 \u00eencuraja\u021bi contactele s\u0103 fac\u0103 la fel.<\/span><\/p>\n<h3><b>Reducerea informa\u021biilor disponibile online<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Informa\u021biile publice online ale companiei dumneavoastr\u0103 sunt cunoscute sub denumirea de \"amprent\u0103 digital\u0103\" \u0219i includ toate informa\u021biile publice pe care le posta\u021bi pe re\u021belele de socializare \u0219i pe site-ul dumneavoastr\u0103. Inclusiv cea postat\u0103 de angajatul dvs.<\/span><\/p>\n<p><strong>Ce pute\u021bi face \u00een aceast\u0103 privin\u021b\u0103?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Nu oferi\u021bi detalii inutile; fi\u021bi aten\u021bi la informa\u021biile pe care partenerii, contractan\u021bii \u0219i furnizorii dvs. le ofer\u0103 despre dvs. \u00een comunicarea online a organiza\u021biei lor \u0219i colabora\u021bi cu angaja\u021bii dvs. pentru a minimiza riscurile de securitate. Educa\u021bi-v\u0103 angaja\u021bii cu privire la modul \u00een care partajarea informa\u021biilor lor personale \u00eei poate afecta pe ei \u0219i organiza\u021bia \u0219i elabora\u021bi o politic\u0103 de amprent\u0103 digital\u0103 curat\u0103 pentru to\u021bi utilizatorii.<\/span><\/p>\n<h3><b>Filtra\u021bi sau bloca\u021bi e-mailurile de phishing primite<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Filtrarea sau blocarea oric\u0103rei \u00eencerc\u0103ri de atac de tip phishing \u00eenainte ca aceasta s\u0103 ajung\u0103 la utilizatori reduce probabilitatea producerii oric\u0103rui prejudiciu. \u00cen plus, aceasta reduce \u0219i timpul pe care utilizatorii trebuie s\u0103 \u00eel petreac\u0103 verific\u00e2nd e-mailurile suspecte \u0219i raport\u00e2ndu-le.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Achizi\u021biona\u021bi un serviciu de filtrare\/blocare bazat pe cloud pentru a bloca toate e-mailurile primite cu phishing \u0219i malware \u00eenainte ca acestea s\u0103 ajung\u0103 la utilizator. Asigura\u021bi-v\u0103 c\u0103 serviciul pe care \u00eel achizi\u021biona\u021bi acoper\u0103 to\u021bi utilizatorii dumneavoastr\u0103. Pentru e-mailurile primite, ar trebui respectate politicile anti-spoofing ale expeditorului. Dac\u0103 expeditorul are o politic\u0103 DMARC cu o politic\u0103 de respingere, ar trebui s\u0103 face\u021bi ceea ce vi se cere. \u00cen plus, e-mailurile pot fi filtrate sau blocate \u00een mai multe moduri, cum ar fi folosind adrese IP, nume de domenii, liste albe\/negre de adrese de e-mail, spam public \u0219i liste negre de retransmisie deschis\u0103, tipuri de ata\u0219amente \u0219i detectarea programelor malware.<\/span><\/p>\n<h2><b>Nivelul 2: Ajuta\u021bi utilizatorul s\u0103 identifice \u0219i s\u0103 raporteze e-mailurile suspecte de phishing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Acest strat explic\u0103 cele mai bune modalit\u0103\u021bi de a v\u0103 ajuta personalul s\u0103 identifice e-mailurile de phishing \u0219i cum s\u0103 v\u0103 \u00eembun\u0103t\u0103\u021bi\u021bi cultura de raportare.<\/span><\/p>\n<h3><b>Un program de formare \u00een domeniul phishing bine pus \u00een aplicare poate face diferen\u021ba<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Una dintre cele mai importante metode de ap\u0103rare \u00eempotriva phishing-ului este instruirea utilizatorilor, care pot aduce o contribu\u021bie valoroas\u0103 la siguran\u021ba organiza\u021biei. Cu toate acestea, oamenii pot face gre\u0219eli, de aceea este esen\u021bial s\u0103 oferi\u021bi o abordare holistic\u0103 cu atenu\u0103ri tehnice adecvate \u0219i schimb\u0103ri \u00een cultura de securitate mai larg\u0103 a organiza\u021biei.\u00a0<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Personalul dvs. trebuie s\u0103 \u0219tie c\u0103 mesajele de phishing pot fi greu de identificat \u0219i nu v\u0103 a\u0219tepta\u021bi ca oamenii s\u0103 le identifice tot timpul. \u00cen schimb, \u00eencuraja\u021bi o mentalitate \u00een care este \u00een regul\u0103 s\u0103 solicita\u021bi \u00eendrumare sau sprijin atunci c\u00e2nd ceva pare ciudat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nu pedepsi\u021bi niciodat\u0103 utilizatorii care se str\u0103duiesc s\u0103 identifice e-mailurile de phishing. Nu uita\u021bi, hackerii sunt profesioni\u0219ti \u0219i \u0219tiu cum s\u0103 p\u0103c\u0103leasc\u0103 oamenii. Formarea ar trebui s\u0103 vizeze \u00eembun\u0103t\u0103\u021birea \u00eencrederii angaja\u021bilor dvs. \u0219i a dorin\u021bei lor de a raporta viitoare incidente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Asigura\u021bi-v\u0103 c\u0103 utilizatorii dvs. \u00een\u021beleg consecin\u021bele phishing-ului \u0219i oferi\u021bi exemple din via\u021ba real\u0103 \u0219i un caz tangibil de studii f\u0103r\u0103 a cople\u0219i oamenii.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lucra\u021bi cu personalul care este mai vulnerabil la primirea de e-mailuri de phishing. De exemplu, departamentele care se confrunt\u0103 cu clien\u021bii, domeniul financiar sau personalul IT prezint\u0103 un interes mai mare pentru hackeri. Asigura\u021bi-v\u0103 c\u0103 personalul este con\u0219tient de riscuri \u0219i oferi\u021bi-i sprijin suplimentar.<\/span><\/p>\n<h3><b>Facilita\u021bi recunoa\u0219terea cererilor frauduloase de c\u0103tre utilizatorii dvs.<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Atacatorii induc \u00een eroare utilizatorii pentru a ob\u021bine acces la parole sau pentru a efectua pl\u0103\u021bi neautorizate. \u021ain\u00e2nd cont de procesele care sunt mai susceptibile de a fi imitate de atacatori, este necesar s\u0103 le \u00eembun\u0103t\u0103\u021bi\u021bi \u0219i s\u0103 le revizui\u021bi, astfel \u00eenc\u00e2t depistarea acestor atacuri de phishing s\u0103 fie mai u\u0219oar\u0103.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Asigura\u021bi-v\u0103 c\u0103 toate persoanele implicate sunt familiarizate cu procesele \u0219i sunt preg\u0103tite s\u0103 recunoasc\u0103 activitatea neobi\u0219nuit\u0103.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Implementa\u021bi autentificarea cu doi factori, ceea ce \u00eenseamn\u0103 c\u0103 toate solicit\u0103rile importante prin e-mail sunt verificate printr-un al doilea tip de comunicare, cum ar fi mesajele text, apelurile sau \u00een persoan\u0103. Un alt lucru pe care \u00eel pute\u021bi face pentru a partaja fi\u0219iere este prin intermediul unui cont cloud cu acces controlat; \u00een acest fel, evita\u021bi orice ata\u0219amente \u00een e-mailuri.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lua\u021bi \u00een considerare posibilitatea de a le spune furnizorilor sau clien\u021bilor dumneavoastr\u0103 ce ar trebui s\u0103 caute, cum ar fi \"nu v\u0103 vom cere niciodat\u0103 parola sau detaliile bancare\".<\/span><\/p>\n<h3><b>\u00cencuraja\u021bi utilizatorii s\u0103 cear\u0103 ajutor atunci c\u00e2nd au nevoie de el<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Crearea unei bune culturi a raport\u0103rii permite utilizatorilor s\u0103 cear\u0103 ajutor \u0219i v\u0103 ofer\u0103 informa\u021bii importante despre tipurile de atacuri de phishing care vizeaz\u0103 organiza\u021bia dumneavoastr\u0103. De asemenea, pute\u021bi afla ce tipuri de e-mailuri sunt confundate cu phishing-ul \u0219i ce \u00eembun\u0103t\u0103\u021biri pute\u021bi face.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Crea\u021bi un proces eficient pentru ca utilizatorii s\u0103 raporteze atunci c\u00e2nd cred c\u0103 \u00eencerc\u0103rile de phishing ar fi putut trece de ap\u0103rarea tehnic\u0103 a organiza\u021biei dvs. Asigura\u021bi-v\u0103 c\u0103 procesul este clar, simplu \u0219i convenabil.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oferi\u021bi feedback rapid \u0219i specific cu privire la m\u0103surile luate \u0219i preciza\u021bi c\u0103 contribu\u021biile lor fac diferen\u021ba \u0219i sunt utile.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00e2ndi\u021bi-v\u0103 cum pute\u021bi utiliza canalele informale de comunicare pentru a crea un mediu \u00een care s\u0103 fie u\u0219or pentru personal s\u0103 vorbeasc\u0103 despre acest subiect \u0219i s\u0103 solicite sprijin \u0219i \u00eendrumare.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Evita\u021bi s\u0103 crea\u021bi o cultur\u0103 a pedepsei sau a culpabiliz\u0103rii \u00een ceea ce prive\u0219te phishing-ul.<\/span><\/p>\n<h2><b>Stratul 3: Proteja\u021bi-v\u0103 organiza\u021bia de efectele e-mailurilor de phishing nedetectate<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Acest strat explic\u0103 cum s\u0103 minimiza\u021bi impactul e-mailurilor de phishing nedetectate.<\/span><\/p>\n<h3><b>Proteja\u021bi-v\u0103 dispozitivele \u00eempotriva programelor malware<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Programele malware sunt ascunse \u00een e-mailuri sau site-uri web false, dar v\u0103 pute\u021bi configura dispozitivele pentru a opri instalarea programelor malware, chiar dac\u0103 face\u021bi clic pe e-mail.<\/span><\/p>\n<p><strong>Cum pute\u021bi evita programele malware?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">O modalitate de a \u00eempiedica atacatorii s\u0103 exploreze vulnerabilit\u0103\u021bile dvs. este s\u0103 utiliza\u021bi software \u0219i dispozitive acceptate \u0219i s\u0103 le men\u021bine\u021bi actualizate cu cele mai recente versiuni ale dezvoltatorilor de software, furnizorilor de hardware \u0219i furnizorilor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Limita\u021bi utilizarea conturilor de administrator doar la personalul care are nevoie de ele. Cu toate acestea, persoanele cu conturi de administrator nu ar trebui s\u0103 le foloseasc\u0103 niciodat\u0103 pentru a verifica e-mailurile sau pentru a naviga pe internet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lua\u021bi \u00een considerare \u0219i alte m\u0103suri de protec\u021bie \u00eempotriva programelor malware, cum ar fi dezactivarea macro-urilor, a software-ului anti-malware, a antivirusului etc. Cu toate acestea, trebuie s\u0103 v\u0103 asigura\u021bi c\u0103 tipul de ap\u0103rare \u00eempotriva programelor malware este adecvat pentru diferitele dispozitive.<\/span><\/p>\n<h3><b>Proteja\u021bi-v\u0103 utilizatorii de site-urile r\u0103u inten\u021bionate<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Linkurile c\u0103tre site-uri r\u0103u inten\u021bionate sunt \u00eentotdeauna cea mai important\u0103 parte a e-mailurilor de phishing. Cu toate acestea, dac\u0103 link-ul nu este capabil s\u0103 deschid\u0103 site-ul web, atacul nu va fi finalizat.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Cele mai moderne \u0219i actualizate programe software vor bloca site-urile web care con\u021bin programe malware. Cu toate acestea, aceast\u0103 op\u021biune nu este \u00eentotdeauna disponibil\u0103 pe dispozitivele mobile.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organiza\u021biile ar trebui s\u0103 ruleze un serviciu proxy, fie intern, fie \u00een cloud, pentru a bloca orice \u00eencercare de a ajunge la site-uri web identificate ca g\u0103zduind programe malware sau campanii de phishing.<\/span><\/p>\n<h3><b>Proteja\u021bi-v\u0103 conturile cu o autentificare mai puternic\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hackerii sunt mereu la v\u00e2n\u0103toare de parole, \u00een special atunci c\u00e2nd acestea sunt pentru conturi cu privilegii de acces la informa\u021bii sensibile, active financiare sau sisteme IT. Asigura\u021bi-v\u0103 c\u0103 procesul dvs. de autentificare este mai rezistent la phishing \u0219i limita\u021bi num\u0103rul de conturi cu acces privilegiat la informa\u021bii sensibile.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Activa\u021bi autentificarea cu doi factori (2FA) sau verificarea \u00een doi pa\u0219i. Existen\u021ba unui al doilea factor \u00eenseamn\u0103 c\u0103 atacatorul nu poate accesa un cont folosind o parol\u0103 furat\u0103.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Utiliza\u021bi un manager de parole. Unele dintre acestea recunosc site-urile web reale \u0219i nu se vor completa automat pe site-urile web false; \u00een acest fel, ve\u021bi evita s\u0103 v\u0103 furniza\u021bi informa\u021biile de conectare pe un site web fals. \u00cen plus, pute\u021bi utiliza o metod\u0103 de autentificare unic\u0103, \u00een care dispozitivul recunoa\u0219te \u0219i se conecteaz\u0103 automat la site-ul web real. Aceste dou\u0103 tehnici evit\u0103 introducerea manual\u0103 a parolelor, ceea ce \u00eenseamn\u0103 c\u0103 ar fi neobi\u0219nuit c\u00e2nd un site solicit\u0103 utilizatorului s\u0103 introduc\u0103 parola.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lua\u021bi \u00een considerare utilizarea unor mecanisme alternative de conectare care sunt mai greu de furat, cum ar fi biometria sau cardurile inteligente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Elimina\u021bi sau suspenda\u021bi conturile care nu mai sunt utilizate.<\/span><\/p>\n<h2><b>Stratul 4: Reac\u021biona\u021bi rapid la incidente<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Toate organiza\u021biile se vor confrunta cu un atac cibernetic la un moment dat; a fi con\u0219tient de acest lucru \u0219i a avea un plan \u00een avans pentru a reac\u021biona imediat este primordial pentru a evita cele mai grave consecin\u021be.<\/span><\/p>\n<h3><b>Detectarea rapid\u0103 a incidentelor<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Afl\u00e2nd despre un incident mai devreme dec\u00e2t mai t\u00e2rziu, pute\u021bi limita daunele pe care acesta le poate provoca.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Av\u00e2nd o capacitate de monitorizare a securit\u0103\u021bii, pute\u021bi detecta incidente de care utilizatorii dvs. nu sunt con\u0219tien\u021bi. Cu toate acestea, acest lucru nu poate fi posibil pentru toate organiza\u021biile, a\u0219a c\u0103 pute\u021bi \u00eencepe prin colectarea jurnalelor, cum ar fi istoricul e-mailurilor primite, adresele web accesate \u0219i conexiunile la adresele IP externe. Pentru a colecta aceste informa\u021bii, pute\u021bi utiliza instrumentele de monitorizare \u00eencorporate \u00een serviciile off-the-shelf, cum ar fi panourile de securitate cloud, pute\u021bi crea o echip\u0103 intern\u0103 sau pute\u021bi externaliza c\u0103tre un serviciu gestionat de monitorizare a securit\u0103\u021bii. Cantitatea pe care o colecta\u021bi \u0219i magazinul vor depinde de bugetul dumneavoastr\u0103. Odat\u0103 ce a\u021bi f\u0103cut acest lucru, asigura\u021bi-v\u0103 c\u0103 \u00eel men\u021bine\u021bi actualizat, astfel \u00eenc\u00e2t s\u0103 r\u0103m\u00e2n\u0103 eficient.<\/span><\/p>\n<h3><b>Ave\u021bi un plan de r\u0103spuns la incidente<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Odat\u0103 ce dvs. sau unii dintre angaja\u021bii dvs. a\u021bi descoperit un atac de phishing, trebuie s\u0103 \u0219ti\u021bi ce s\u0103 face\u021bi pentru a preveni orice prejudiciu c\u00e2t mai cur\u00e2nd posibil.<\/span><\/p>\n<p><strong>Cum pute\u021bi face acest lucru?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Asigura\u021bi-v\u0103 c\u0103 toat\u0103 lumea din organiza\u021bie \u0219tie ce trebuie s\u0103 fac\u0103 \u00een cazul diferitelor tipuri de incidente, care sunt responsabilit\u0103\u021bile lor \u0219i cum vor ac\u021biona. Asigura\u021bi-v\u0103 c\u0103 planul dumneavoastr\u0103 respect\u0103 obliga\u021biile legale \u0219i de reglementare ale organiza\u021biei dumneavoastr\u0103. Planurile de r\u0103spuns la incidente trebuie exersate \u00eenainte pentru a v\u0103 asigura c\u0103 toat\u0103 lumea este familiarizat\u0103 cu procedura \u0219i rolurile sale.<\/span><\/p>\n<h2><b>G\u00e2nduri finale<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u00cen concluzie, atacurile de phishing pot avea consecin\u021be grave pentru persoane \u0219i organiza\u021bii. Este important s\u0103 ne amintim c\u0103 nu este o problem\u0103 care poate fi rezolvat\u0103 cu o singur\u0103 solu\u021bie, ci mai degrab\u0103 prin implementarea mai multor straturi de ap\u0103rare. Acest lucru poate implica m\u0103suri tehnice, cum ar fi utilizarea gateway-urilor de e-mail securizate \u0219i a serviciilor proxy, precum \u0219i autentificarea puternic\u0103 \u0219i instruirea periodic\u0103 a utilizatorilor pentru a educa angaja\u021bii cu privire la recunoa\u0219terea tentativelor de phishing. \u00cen cele din urm\u0103, este esen\u021bial s\u0103 fi\u021bi preg\u0103ti\u021bi cu un plan de r\u0103spuns \u00een cazul unui atac pentru a minimiza pagubele \u0219i a v\u0103 recupera rapid.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Criminalitatea informatic\u0103 este \u00een prezent una dintre numeroasele preocup\u0103ri cu care se confrunt\u0103 zilnic \u00eentreprinderile. Tehnologia a fost pilonul de baz\u0103 al dezvolt\u0103rii pentru multe companii; cu toate acestea, pe m\u0103sur\u0103 ce aspectul digital devine mai esen\u021bial pentru... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/\">Continue reading <span class=\"screen-reader-text\">Cum s\u0103 v\u0103 proteja\u021bi afacerea de atacurile de phishing prin e-mail<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1225,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Protection From Email Phishing Attacks | Security Briefing<\/title>\n<meta name=\"description\" content=\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Protection From Email Phishing Attacks | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-09T13:13:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How to Protect Your Business From Email Phishing Attacks\",\"datePublished\":\"2022-11-09T13:13:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"},\"wordCount\":2338,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\",\"name\":\"Business Protection From Email Phishing Attacks | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"datePublished\":\"2022-11-09T13:13:26+00:00\",\"description\":\"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"Email phishing attacks image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Business From Email Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protec\u021bia \u00eentreprinderilor \u00eempotriva atacurilor de phishing prin e-mail | Security Briefing","description":"Este esen\u021bial s\u0103 ave\u021bi cea mai bun\u0103 securitate a e-mailurilor. Cu ajutorul acestui articol, pute\u021bi \u00eenv\u0103\u021ba cum s\u0103 detecta\u021bi \u0219i s\u0103 preveni\u021bi atacurile de phishing prin e-mail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/","og_locale":"ro_RO","og_type":"article","og_title":"Business Protection From Email Phishing Attacks | Security Briefing","og_description":"It is essential to have the best email security. With this article, you can learn how to detect and prevent email phishing attacks.","og_url":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/cum-sa-iti-protejezi-afacerea-de-atacurile-de-phishing-email\/","og_site_name":"Security Briefing","article_published_time":"2022-11-09T13:13:26+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"12 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How to Protect Your Business From Email Phishing Attacks","datePublished":"2022-11-09T13:13:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"},"wordCount":2338,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","articleSection":["Cyber Attacks"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/","name":"Protec\u021bia \u00eentreprinderilor \u00eempotriva atacurilor de phishing prin e-mail | Security Briefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","datePublished":"2022-11-09T13:13:26+00:00","description":"Este esen\u021bial s\u0103 ave\u021bi cea mai bun\u0103 securitate a e-mailurilor. Cu ajutorul acestui articol, pute\u021bi \u00eenv\u0103\u021ba cum s\u0103 detecta\u021bi \u0219i s\u0103 preveni\u021bi atacurile de phishing prin e-mail.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_man-using-keyboard-computer-login-interface-on-touch-screen_12347833_123-min-1-scaled-2.jpg","width":2560,"height":1709,"caption":"Email phishing attacks image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/how-to-protect-your-business-from-email-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Business From Email Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1221"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1225"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}