{"id":260,"date":"2022-06-22T21:39:55","date_gmt":"2022-06-22T21:39:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=260"},"modified":"2022-06-22T21:39:55","modified_gmt":"2022-06-22T21:39:55","slug":"cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/","title":{"rendered":"Cum \u00ee\u0219i pun proprietarii de date chiria\u0219ii \u00een pericol?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Pe m\u0103sur\u0103 ce afacerile \u00ee\u0219i mut\u0103 opera\u021biunile \u00een cloud, ele acord\u0103 o \u00eencredere tot mai mare furnizorilor ter\u021bi. Acum este mai critic ca niciodat\u0103 ca aceste companii s\u0103 fie con\u0219tiente de riscurile asociate cu proprietarii de date, care \u00ee\u0219i pun chiria\u0219ii \u00een pericol prin nesecurizarea corespunz\u0103toare a datelor lor. Microsoft este un exemplu principal de proprietar de date care ofer\u0103 securitate slab\u0103 \u0219i \u00ee\u0219i pune clien\u021bii \u00een pericol. Acest articol va discuta pericolele \u00eencrederii \u00een furnizorii ter\u021bi \u0219i cum s\u0103 v\u0103 proteja\u021bi afacerea de atacuri.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Cum \u00ee\u0219i pun proprietarii de date chiria\u0219ii \u00een pericol?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Exist\u0103 mai multe moduri \u00een care proprietarii de date \u00ee\u0219i pot pune chiria\u0219ii \u00een pericol. Unul dintre cele mai comune este nevoia de a-\u0219i securiza corect datele. Nesecurizarea datelor poate permite hackerilor s\u0103 acceseze informa\u021bii sensibile, cum ar fi numele clien\u021bilor \u0219i numerele de card de credit. Proprietarii de date pot, de asemenea, s\u0103 v\u00e2nd\u0103 sau s\u0103 \u00eenchirieze datele chiria\u0219ilor altor companii f\u0103r\u0103 cuno\u0219tin\u021ba sau consim\u021b\u0103m\u00e2ntul acestora. Acest lucru poate duce la pierderea controlului asupra modului \u00een care sunt utilizate datele \u0219i poate face mai dificil\u0103 protejarea intimit\u0103\u021bii chiria\u0219ului. \u00cen cele din urm\u0103, proprietarii de date pot fi, de asemenea, neglijen\u021bi cu datele chiria\u0219ilor lor, ceea ce duce la scurgeri sau dezv\u0103luiri accidentale.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Chiria\u0219ii proprietarilor de date risc\u0103 s\u0103 li se fure informa\u021biile sensibile, s\u0103 li se v\u00e2nd\u0103 sau s\u0103 li se \u00eenchirieze datele f\u0103r\u0103 cuno\u0219tin\u021ba sau consim\u021b\u0103m\u00e2ntul lor \u0219i s\u0103 li se scurg\u0103 accidental datele.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Scurgerea de date: Unul dintre pericolele \u00eencrederii \u00een furnizorii ter\u021bi<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">O scurgere de date este unul dintre cele mai grave pericole ale \u00eencrederii \u00een furnizorii ter\u021bi. O scurgere de date poate ap\u0103rea atunci c\u00e2nd un furnizor dezv\u0103luie accidental sau deliberat informa\u021bii confiden\u021biale. O scurgere de date poate avea loc atunci c\u00e2nd un furnizor vinde sau \u00eenchiriaz\u0103 datele chiria\u0219ului unei alte companii f\u0103r\u0103 cuno\u0219tin\u021ba sau consim\u021b\u0103m\u00e2ntul chiria\u0219ului. O scurgere de date poate ap\u0103rea \u0219i atunci c\u00e2nd un proprietar este neglijent cu datele chiria\u0219ilor s\u0103i \u0219i le dezv\u0103luie accidental. Dezv\u0103luirea informa\u021biilor confiden\u021biale poate avea consecin\u021be grave pentru chiria\u0219i, inclusiv furtul de identitate, frauda \u0219i deteriorarea reputa\u021biei lor.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ce m\u0103suri pot lua companiile pentru a se proteja de aceste riscuri?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Companiile pot lua c\u00e2\u021biva pa\u0219i pentru a se proteja de riscurile asociate cu proprietarii de date. \u00cen primul r\u00e2nd, companiile ar trebui s\u0103 verifice cu aten\u021bie furnizorii ter\u021bi \u00eenainte de a le \u00eencredin\u021ba datele lor. Verifica\u021bi calific\u0103rile afacerii, inclusiv dac\u0103 este sau nu licen\u021biat\u0103 \u0219i asigurat\u0103. C\u0103uta\u021bi orice judec\u0103\u021bi sau acuza\u021bii pendinte privind condi\u021biile de munc\u0103 nesigure. Asigura\u021bi-v\u0103 c\u0103 furnizorul are o reputa\u021bie pozitiv\u0103, investig\u00e2ndu-i istoricul. \u00cen plus, companiile ar trebui s\u0103 ia \u00een considerare utilizarea cript\u0103rii \u0219i a altor tehnologii de securitate pentru a-\u0219i proteja datele de accesul neautorizat. \u00cen cele din urm\u0103, companiile ar trebui s\u0103 p\u0103streze copii de rezerv\u0103 ale datelor lor \u00een caz de dezv\u0103luire sau scurgere accidental\u0103.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Criptare:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Una dintre cele mai bune modalit\u0103\u021bi de a v\u0103 proteja datele este s\u0103 le cripta\u021bi. Criptarea datelor dvs. le va face ilizibile pentru oricine nu are cheia corespunz\u0103toare, f\u0103c\u00e2nd mult mai dificil pentru hackeri s\u0103 v\u0103 fure informa\u021biile. \u00cen plus, ar trebui s\u0103 cripta\u021bi orice copii de rezerv\u0103 ale datelor dvs. \u00een caz de dezv\u0103luire sau scurgere accidental\u0103.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Copii de rezerv\u0103:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Un alt pas important pe care companiile \u00eel pot face pentru a proteja riscurile proprietarilor de date este s\u0103 p\u0103streze copii de rezerv\u0103 ale datelor lor. \u00cen acest fel, dac\u0103 exist\u0103 o dezv\u0103luire sau o scurgere accidental\u0103, ve\u021bi avea \u00een continuare o copie a datelor dvs. care nu a fost compromis\u0103.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Verificarea furnizorilor ter\u021bi:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A\u0219a cum am men\u021bionat anterior, companiile ar trebui s\u0103 verifice cu aten\u021bie furnizorii ter\u021bi \u00eenainte de a le \u00eencredin\u021ba datele lor. Acest lucru include verificarea m\u0103surilor de securitate adecvate \u0219i asigurarea c\u0103 furnizorul are o bun\u0103 reputa\u021bie.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Lu\u00e2nd aceste m\u0103suri, companiile se pot proteja de riscurile asociate cu proprietarii de date. Cu toate acestea, este esen\u021bial s\u0103 ne amintim c\u0103 nicio m\u0103sur\u0103 de securitate nu este perfect\u0103 \u0219i c\u0103 exist\u0103 \u00eentotdeauna un anumit risc atunci c\u00e2nd \u00eencredin\u021ba\u021bi datele dvs. furnizorilor ter\u021bi.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Pe m\u0103sur\u0103 ce \u00eentreprinderile \u00ee\u0219i mut\u0103 opera\u021biunile \u00een cloud, acestea acord\u0103 o \u00eencredere din ce \u00een ce mai mare furnizorilor ter\u021bi. Acum este mai important ca niciodat\u0103 ca aceste companii s\u0103... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/\">Continue reading <span class=\"screen-reader-text\">Cum \u00ee\u0219i pun proprietarii de date chiria\u0219ii \u00een pericol?<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,27],"tags":[],"class_list":["post-260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Data Landlords Put Their Tenants at Risk? | Security Briefing<\/title>\n<meta name=\"description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T21:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How Data Landlords Put Their Tenants at Risk?\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"articleSection\":[\"Cyber Threats\",\"Security\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"name\":\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"description\":\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"width\":999,\"height\":667,\"caption\":\"How-Data-Landlords-Put-Their-Tenants-at-Risk\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Data Landlords Put Their Tenants at Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cum \u00ee\u0219i pun proprietarii de date chiria\u0219ii \u00een pericol? | Informare de securitate","description":"Afla\u021bi despre pericolele \u00eencrederii \u00een furnizorii ter\u021bi \u0219i cum s\u0103 v\u0103 proteja\u021bi afacerea de date de atacuri.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/","og_locale":"ro_RO","og_type":"article","og_title":"How Data Landlords Put Their Tenants at Risk? | Security Briefing","og_description":"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.","og_url":"https:\/\/securitybriefing.net\/ro\/amenintari-cibernetice\/cum-proprietarii-de-date-isi-pun-chiriasii-in-pericol\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T21:39:55+00:00","og_image":[{"width":999,"height":667,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How Data Landlords Put Their Tenants at Risk?","datePublished":"2022-06-22T21:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"wordCount":624,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","articleSection":["Cyber Threats","Security"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","name":"Cum \u00ee\u0219i pun proprietarii de date chiria\u0219ii \u00een pericol? | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","datePublished":"2022-06-22T21:39:55+00:00","description":"Afla\u021bi despre pericolele \u00eencrederii \u00een furnizorii ter\u021bi \u0219i cum s\u0103 v\u0103 proteja\u021bi afacerea de date de atacuri.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","width":999,"height":667,"caption":"How-Data-Landlords-Put-Their-Tenants-at-Risk"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Data Landlords Put Their Tenants at Risk?"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}