{"id":260,"date":"2022-06-22T21:39:55","date_gmt":"2022-06-22T21:39:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=260"},"modified":"2022-06-22T21:39:55","modified_gmt":"2022-06-22T21:39:55","slug":"cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/","title":{"rendered":"Ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u g\u00e2y nguy hi\u1ec3m cho ng\u01b0\u1eddi thu\u00ea nh\u00e0 nh\u01b0 th\u1ebf n\u00e0o?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Khi c\u00e1c doanh nghi\u1ec7p chuy\u1ec3n ho\u1ea1t \u0111\u1ed9ng c\u1ee7a h\u1ecd l\u00ean \u0111\u00e1m m\u00e2y, h\u1ecd \u0111ang \u0111\u1eb7t ng\u00e0y c\u00e0ng nhi\u1ec1u ni\u1ec1m tin v\u00e0o c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba. Hi\u1ec7n nay, \u0111i\u1ec1u quan tr\u1ecdng h\u01a1n bao gi\u1edd h\u1ebft l\u00e0 c\u00e1c c\u00f4ng ty n\u00e0y ph\u1ea3i nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c c\u00e1c r\u1ee7i ro li\u00ean quan \u0111\u1ebfn c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u, nh\u1eefng ng\u01b0\u1eddi \u0111\u1eb7t ng\u01b0\u1eddi thu\u00ea c\u1ee7a h\u1ecd v\u00e0o nguy c\u01a1 b\u1eb1ng c\u00e1ch kh\u00f4ng b\u1ea3o m\u1eadt d\u1eef li\u1ec7u c\u1ee7a h\u1ecd \u0111\u00fang c\u00e1ch. Microsoft l\u00e0 m\u1ed9t v\u00ed d\u1ee5 \u0111i\u1ec3n h\u00ecnh v\u1ec1 m\u1ed9t ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u cung c\u1ea5p b\u1ea3o m\u1eadt y\u1ebfu v\u00e0 \u0111\u1eb7t kh\u00e1ch h\u00e0ng c\u1ee7a m\u00ecnh v\u00e0o nguy c\u01a1. B\u00e0i vi\u1ebft n\u00e0y s\u1ebd th\u1ea3o lu\u1eadn v\u1ec1 nh\u1eefng nguy hi\u1ec3m c\u1ee7a vi\u1ec7c tin t\u01b0\u1edfng c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 doanh nghi\u1ec7p c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">L\u00e0m th\u1ebf n\u00e0o c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u \u0111\u1eb7t ng\u01b0\u1eddi thu\u00ea c\u1ee7a h\u1ecd v\u00e0o nguy c\u01a1?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00f3 m\u1ed9t s\u1ed1 c\u00e1ch m\u00e0 c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u c\u00f3 th\u1ec3 \u0111\u1eb7t ng\u01b0\u1eddi thu\u00ea c\u1ee7a h\u1ecd v\u00e0o nguy c\u01a1. M\u1ed9t trong nh\u1eefng c\u00e1ch ph\u1ed5 bi\u1ebfn nh\u1ea5t l\u00e0 kh\u00f4ng b\u1ea3o m\u1eadt d\u1eef li\u1ec7u c\u1ee7a h\u1ecd \u0111\u00fang c\u00e1ch. Kh\u00f4ng b\u1ea3o m\u1eadt d\u1eef li\u1ec7u c\u1ee7a h\u1ecd c\u00f3 th\u1ec3 cho ph\u00e9p tin t\u1eb7c truy c\u1eadp v\u00e0o th\u00f4ng tin nh\u1ea1y c\u1ea3m, ch\u1eb3ng h\u1ea1n nh\u01b0 t\u00ean kh\u00e1ch h\u00e0ng v\u00e0 s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng. C\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u c\u0169ng c\u00f3 th\u1ec3 b\u00e1n ho\u1eb7c cho thu\u00ea d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi thu\u00ea cho c\u00e1c c\u00f4ng ty kh\u00e1c m\u00e0 kh\u00f4ng c\u00f3 s\u1ef1 bi\u1ebft ho\u1eb7c \u0111\u1ed3ng \u00fd c\u1ee7a h\u1ecd. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn m\u1ea5t ki\u1ec3m so\u00e1t v\u1ec1 c\u00e1ch d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng v\u00e0 l\u00e0m cho ng\u01b0\u1eddi thu\u00ea kh\u00f3 b\u1ea3o v\u1ec7 quy\u1ec1n ri\u00eang t\u01b0 c\u1ee7a h\u1ecd h\u01a1n. Cu\u1ed1i c\u00f9ng, c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u c\u0169ng c\u00f3 th\u1ec3 b\u1ea5t c\u1ea9n v\u1edbi d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi thu\u00ea, d\u1eabn \u0111\u1ebfn r\u00f2 r\u1ec9 ho\u1eb7c ti\u1ebft l\u1ed9 ng\u1eabu nhi\u00ean.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ng\u01b0\u1eddi thu\u00ea c\u1ee7a c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u c\u00f3 nguy c\u01a1 b\u1ecb \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u1ea1y c\u1ea3m, d\u1eef li\u1ec7u c\u1ee7a h\u1ecd b\u1ecb b\u00e1n ho\u1eb7c cho thu\u00ea m\u00e0 kh\u00f4ng c\u00f3 s\u1ef1 bi\u1ebft ho\u1eb7c \u0111\u1ed3ng \u00fd c\u1ee7a h\u1ecd, v\u00e0 d\u1eef li\u1ec7u c\u1ee7a h\u1ecd b\u1ecb r\u00f2 r\u1ec9 ng\u1eabu nhi\u00ean.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">R\u00f2 r\u1ec9 D\u1eef li\u1ec7u: M\u1ed9t trong nh\u1eefng Nguy hi\u1ec3m c\u1ee7a vi\u1ec7c tin t\u01b0\u1edfng c\u00e1c Nh\u00e0 cung c\u1ea5p B\u00ean th\u1ee9 ba<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">R\u00f2 r\u1ec9 d\u1eef li\u1ec7u l\u00e0 m\u1ed9t trong nh\u1eefng nguy hi\u1ec3m nghi\u00eam tr\u1ecdng nh\u1ea5t c\u1ee7a vi\u1ec7c tin t\u01b0\u1edfng c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba. R\u00f2 r\u1ec9 d\u1eef li\u1ec7u c\u00f3 th\u1ec3 x\u1ea3y ra khi m\u1ed9t nh\u00e0 cung c\u1ea5p v\u00f4 t\u00ecnh ho\u1eb7c c\u1ed1 \u00fd ti\u1ebft l\u1ed9 th\u00f4ng tin b\u00ed m\u1eadt. R\u00f2 r\u1ec9 d\u1eef li\u1ec7u c\u00f3 th\u1ec3 x\u1ea3y ra khi m\u1ed9t nh\u00e0 cung c\u1ea5p b\u00e1n ho\u1eb7c cho thu\u00ea d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi thu\u00ea cho m\u1ed9t c\u00f4ng ty kh\u00e1c m\u00e0 kh\u00f4ng c\u00f3 s\u1ef1 bi\u1ebft ho\u1eb7c \u0111\u1ed3ng \u00fd c\u1ee7a ng\u01b0\u1eddi thu\u00ea. R\u00f2 r\u1ec9 d\u1eef li\u1ec7u c\u0169ng c\u00f3 th\u1ec3 x\u1ea3y ra khi m\u1ed9t ch\u1ee7 nh\u00e0 b\u1ea5t c\u1ea9n v\u1edbi d\u1eef li\u1ec7u c\u1ee7a ng\u01b0\u1eddi thu\u00ea v\u00e0 v\u00f4 t\u00ecnh ti\u1ebft l\u1ed9 n\u00f3. Vi\u1ec7c ti\u1ebft l\u1ed9 th\u00f4ng tin b\u00ed m\u1eadt c\u00f3 th\u1ec3 g\u00e2y ra h\u1eadu qu\u1ea3 nghi\u00eam tr\u1ecdng cho ng\u01b0\u1eddi thu\u00ea, bao g\u1ed3m tr\u1ed9m c\u1eafp danh t\u00ednh, gian l\u1eadn v\u00e0 t\u1ed5n h\u1ea1i \u0111\u1ebfn danh ti\u1ebfng c\u1ee7a h\u1ecd.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Doanh nghi\u1ec7p c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n nh\u1eefng b\u01b0\u1edbc n\u00e0o \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi nh\u1eefng r\u1ee7i ro n\u00e0y?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Doanh nghi\u1ec7p c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n m\u1ed9t s\u1ed1 b\u01b0\u1edbc \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c r\u1ee7i ro li\u00ean quan \u0111\u1ebfn c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u. \u0110\u1ea7u ti\u00ean, c\u00e1c c\u00f4ng ty n\u00ean c\u1ea9n th\u1eadn ki\u1ec3m tra c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba tr\u01b0\u1edbc khi tin t\u01b0\u1edfng h\u1ecd v\u1edbi d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh. Ki\u1ec3m tra c\u00e1c ti\u00eau chu\u1ea9n c\u1ee7a doanh nghi\u1ec7p, bao g\u1ed3m vi\u1ec7c li\u1ec7u n\u00f3 c\u00f3 \u0111\u01b0\u1ee3c c\u1ea5p ph\u00e9p v\u00e0 b\u1ea3o hi\u1ec3m hay kh\u00f4ng. T\u00ecm ki\u1ebfm b\u1ea5t k\u1ef3 ph\u00e1n quy\u1ebft ho\u1eb7c c\u00e1o bu\u1ed9c n\u00e0o li\u00ean quan \u0111\u1ebfn \u0111i\u1ec1u ki\u1ec7n l\u00e0m vi\u1ec7c kh\u00f4ng an to\u00e0n. Ki\u1ec3m tra r\u1eb1ng nh\u00e0 cung c\u1ea5p c\u00f3 danh ti\u1ebfng t\u1ed1t b\u1eb1ng c\u00e1ch xem x\u00e9t l\u00fd l\u1ecbch c\u1ee7a h\u1ecd. Ngo\u00e0i ra, c\u00e1c doanh nghi\u1ec7p n\u00ean xem x\u00e9t vi\u1ec7c s\u1eed d\u1ee5ng m\u00e3 h\u00f3a v\u00e0 c\u00e1c c\u00f4ng ngh\u1ec7 b\u1ea3o m\u1eadt kh\u00e1c \u0111\u1ec3 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u c\u1ee7a h\u1ecd kh\u1ecfi truy c\u1eadp tr\u00e1i ph\u00e9p. Cu\u1ed1i c\u00f9ng, c\u00e1c c\u00f4ng ty n\u00ean gi\u1eef b\u1ea3n sao l\u01b0u d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh trong tr\u01b0\u1eddng h\u1ee3p ti\u1ebft l\u1ed9 ho\u1eb7c r\u00f2 r\u1ec9 ng\u1eabu nhi\u00ean.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">M\u00e3 h\u00f3a:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">M\u1ed9t trong nh\u1eefng c\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n l\u00e0 m\u00e3 h\u00f3a n\u00f3. M\u00e3 h\u00f3a d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n s\u1ebd l\u00e0m cho n\u00f3 kh\u00f4ng th\u1ec3 \u0111\u1ecdc \u0111\u01b0\u1ee3c \u0111\u1ed1i v\u1edbi b\u1ea5t k\u1ef3 ai kh\u00f4ng c\u00f3 kh\u00f3a \u0111\u00fang, l\u00e0m cho vi\u1ec7c tin t\u1eb7c \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u1ee7a b\u1ea1n tr\u1edf n\u00ean kh\u00f3 kh\u0103n h\u01a1n nhi\u1ec1u. Ngo\u00e0i ra, b\u1ea1n n\u00ean m\u00e3 h\u00f3a b\u1ea5t k\u1ef3 b\u1ea3n sao l\u01b0u d\u1eef li\u1ec7u n\u00e0o c\u1ee7a b\u1ea1n trong tr\u01b0\u1eddng h\u1ee3p ti\u1ebft l\u1ed9 ho\u1eb7c r\u00f2 r\u1ec9 ng\u1eabu nhi\u00ean.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Sao l\u01b0u:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">M\u1ed9t b\u01b0\u1edbc quan tr\u1ecdng kh\u00e1c m\u00e0 c\u00e1c doanh nghi\u1ec7p c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n \u0111\u1ec3 b\u1ea3o v\u1ec7 r\u1ee7i ro t\u1eeb c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u l\u00e0 gi\u1eef b\u1ea3n sao l\u01b0u d\u1eef li\u1ec7u c\u1ee7a h\u1ecd. B\u1eb1ng c\u00e1ch n\u00e0y, n\u1ebfu c\u00f3 ti\u1ebft l\u1ed9 ho\u1eb7c r\u00f2 r\u1ec9 ng\u1eabu nhi\u00ean, b\u1ea1n v\u1eabn s\u1ebd c\u00f3 m\u1ed9t b\u1ea3n sao d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh ch\u01b0a b\u1ecb x\u00e2m ph\u1ea1m.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Ki\u1ec3m tra Nh\u00e0 cung c\u1ea5p B\u00ean th\u1ee9 ba:<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Nh\u01b0 ch\u00fang t\u00f4i \u0111\u00e3 \u0111\u1ec1 c\u1eadp tr\u01b0\u1edbc \u0111\u00f3, c\u00e1c doanh nghi\u1ec7p n\u00ean c\u1ea9n th\u1eadn ki\u1ec3m tra c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba tr\u01b0\u1edbc khi tin t\u01b0\u1edfng h\u1ecd v\u1edbi d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m vi\u1ec7c ki\u1ec3m tra c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt \u0111\u1ea7y \u0111\u1ee7 v\u00e0 \u0111\u1ea3m b\u1ea3o r\u1eb1ng nh\u00e0 cung c\u1ea5p c\u00f3 danh ti\u1ebfng t\u1ed1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">B\u1eb1ng c\u00e1ch th\u1ef1c hi\u1ec7n nh\u1eefng b\u01b0\u1edbc n\u00e0y, c\u00e1c doanh nghi\u1ec7p c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c r\u1ee7i ro li\u00ean quan \u0111\u1ebfn c\u00e1c ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u. Tuy nhi\u00ean, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i nh\u1edb r\u1eb1ng kh\u00f4ng c\u00f3 bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt n\u00e0o l\u00e0 ho\u00e0n h\u1ea3o v\u00e0 lu\u00f4n c\u00f3 m\u1ed9t s\u1ed1 r\u1ee7i ro khi tin t\u01b0\u1edfng c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba v\u1edbi d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Khi c\u00e1c doanh nghi\u1ec7p chuy\u1ec3n ho\u1ea1t \u0111\u1ed9ng c\u1ee7a m\u00ecnh l\u00ean \u0111\u00e1m m\u00e2y, h\u1ecd ng\u00e0y c\u00e0ng tin t\u01b0\u1edfng v\u00e0o c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba. Gi\u1edd \u0111\u00e2y, \u0111i\u1ec1u quan tr\u1ecdng h\u01a1n bao gi\u1edd h\u1ebft \u0111\u1ed1i v\u1edbi c\u00e1c c\u00f4ng ty n\u00e0y l\u00e0\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Ch\u1ee7 nh\u00e0 d\u1eef li\u1ec7u g\u00e2y nguy hi\u1ec3m cho ng\u01b0\u1eddi thu\u00ea nh\u00e0 nh\u01b0 th\u1ebf n\u00e0o?<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,27],"tags":[],"class_list":["post-260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Data Landlords Put Their Tenants at Risk? | Security Briefing<\/title>\n<meta name=\"description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T21:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How Data Landlords Put Their Tenants at Risk?\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"articleSection\":[\"Cyber Threats\",\"Security\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\",\"name\":\"How Data Landlords Put Their Tenants at Risk? | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"datePublished\":\"2022-06-22T21:39:55+00:00\",\"description\":\"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg\",\"width\":999,\"height\":667,\"caption\":\"How-Data-Landlords-Put-Their-Tenants-at-Risk\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Data Landlords Put Their Tenants at Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u00e0m th\u1ebf n\u00e0o c\u00e1c ch\u1ee7 s\u1edf h\u1eefu d\u1eef li\u1ec7u \u0111\u1eb7t ng\u01b0\u1eddi thu\u00ea c\u1ee7a h\u1ecd v\u00e0o nguy c\u01a1? | T\u00f3m t\u1eaft An ninh","description":"T\u00ecm hi\u1ec3u v\u1ec1 nh\u1eefng nguy hi\u1ec3m c\u1ee7a vi\u1ec7c tin t\u01b0\u1edfng c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u kinh doanh c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/","og_locale":"vi_VN","og_type":"article","og_title":"How Data Landlords Put Their Tenants at Risk? | Security Briefing","og_description":"Learn about the dangers of trusting third-party providers and how to protect your data business from attacks.","og_url":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/cach-cac-chu-du-lieu-dat-nguoi-thue-vao-nguy-hiem\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T21:39:55+00:00","og_image":[{"width":999,"height":667,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"3 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How Data Landlords Put Their Tenants at Risk?","datePublished":"2022-06-22T21:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"},"wordCount":624,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","articleSection":["Cyber Threats","Security"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/","name":"L\u00e0m th\u1ebf n\u00e0o c\u00e1c ch\u1ee7 s\u1edf h\u1eefu d\u1eef li\u1ec7u \u0111\u1eb7t ng\u01b0\u1eddi thu\u00ea c\u1ee7a h\u1ecd v\u00e0o nguy c\u01a1? | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","datePublished":"2022-06-22T21:39:55+00:00","description":"T\u00ecm hi\u1ec3u v\u1ec1 nh\u1eefng nguy hi\u1ec3m c\u1ee7a vi\u1ec7c tin t\u01b0\u1edfng c\u00e1c nh\u00e0 cung c\u1ea5p b\u00ean th\u1ee9 ba v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u kinh doanh c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_250464762_S-min.jpg","width":999,"height":667,"caption":"How-Data-Landlords-Put-Their-Tenants-at-Risk"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/how-data-landlords-put-their-tenants-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Data Landlords Put Their Tenants at Risk?"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}