{"id":6921,"date":"2021-03-01T16:03:43","date_gmt":"2021-03-01T15:03:43","guid":{"rendered":"https:\/\/2021.assoprovider.it\/?p=6921"},"modified":"2021-03-09T16:23:57","modified_gmt":"2021-03-09T15:23:57","slug":"safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti","status":"publish","type":"post","link":"https:\/\/assoprovider.it\/en\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/","title":{"rendered":"Safer Internet Day: the 4 stages of a cyber attack (and how to protect yourself)"},"content":{"rendered":"<p><strong>Safer Internet Day: cyber attacks on the rise during the Covid 19 emergency. Assoprovider explains how a cyber attack works and how to act to protect your data.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Safer Internet Day<\/strong> it is the International Day for Internet Risk Awareness, established by the<strong>European Union<\/strong>. Assoprovider participates in this day with this article on our blog that addresses three topics: how a cyber attack works, which mistakes to avoid to prevent <strong>being a victim of malware<\/strong> which have increased exponentially <strong>during the Covid 19 emergency<\/strong>. And finally, <strong>how to create a good backup,<\/strong> a security tool that limits damage in the event of a cyber attack on your personal PC, as well as on your company's.<\/p>\n\n\n\n<p><em>This article is written in collaboration with <\/em><strong><em>Antonio Aprea<\/em><\/strong><em>, board member of Assoprovider and CEO of <\/em><strong><em>Nowtech<\/em><\/strong><em>, a company specialized in data protection.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4 phases of a cyber attack<\/strong><\/h2>\n\n\n\n<p>But how does a hacker operate, what are their moves to access and steal your data? Generally, there are four phases of a cyber attack.<\/p>\n\n\n\n<p>The first is <strong>target identification.<\/strong> Here the hacker identifies the target and uses some techniques <strong>like the <\/strong><a href=\"https:\/\/www.kaspersky.it\/resource-center\/definitions\/what-is-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>social engineering<\/strong><\/a>, gathers information about the target and security. It then follows the stages of the<strong>intrusion<\/strong>phase in which the hacker uses the information they have gathered to take control of the device remotely. One of the most commonly used techniques in this phase is <strong>phishing <\/strong>which occurs through<a href=\"https:\/\/www.cybersecurity360.it\/nuove-minacce\/attacchi-phishing-consigli-pratici-per-riconoscerli-e-stare-alla-larga-dalle-truffe-online\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong> sending emails.<\/strong><\/a><\/p>\n\n\n\n<p>There are then two additional phases: the <strong>network study<\/strong>a map of your network to understand the vulnerability of the systems and identify access points. His criminal activity then concludes with access and control of your IT systems. To maintain access, the hacker in this final phase installs<a rel=\"noreferrer noopener\" href=\"https:\/\/www.kaspersky.it\/resource-center\/preemptive-safety\/faq\" target=\"_blank\"> trojan backdoors and rootkits<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Defending Against Cyber Attacks: More Training and Awareness<\/strong><\/h2>\n\n\n\n<p>According to a Clusit report, <strong>Italian Association for Information Security<\/strong>, 119 out of approximately 850 serious cyberattacks analyzed on a global scale are related to the topic <strong>Covid -19<\/strong>. The most frequent attacks were related to phishing campaigns (61%).<\/p>\n\n\n\n<p>Therefore, having more awareness of how to manage your incoming emails can help you solve many problems. Nowtech recommends paying particular attention to:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Email attachments <\/strong>with compressed files of the type <strong>ZIP, RAR, TAR, GZ<\/strong>. Avoid downloading them and especially never click on them;<\/li><li><strong>Email link <\/strong>which seem harmless, but actually hide great pitfalls;<\/li><li><strong>Suspicious documents attached<\/strong> with extensions such as DOC, DOCM, XLS, or XSLM.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Backup, a lifeline<\/strong><\/h2>\n\n\n\n<p>Backup is the process used to store company data or your private files in different copies to recover them later, especially following the damage that a hacker can cause. However, there are still few companies that do it, 15% <a href=\"https:\/\/www.corrierecomunicazioni.it\/cyber-security\/backup-questo-sconosciuto-lo-utilizza-solo-il-15-delle-aziende\/\" target=\"_blank\" rel=\"noreferrer noopener\">according to a survey reported by Corriere Comunicazione<\/a>. <strong>&nbsp;<\/strong>For <strong>organize a good backup plan<\/strong> you need to have a storage space (hard disk, NAS on site or offline cloud space), choose an agent to schedule backup processes (i.e., a software that manages your backup processes), select the type of backup you want to perform, and protect the copies you have obtained with a password.<\/p>\n\n\n\n<p>In simple terms, there are three types of backup:<\/p>\n\n\n\n<p><strong>Incremental<\/strong>: here a copy of a folder with the files is created, while in subsequent executions the backup occurs only for the changes made in the following days;<\/p>\n\n\n\n<p><strong>Complete<\/strong>: here the backup copies all files, overwriting the existing ones, utilizing more disk space and bandwidth;<\/p>\n\n\n\n<p><strong>Differential: <\/strong>similar to the incremental, with the difference that the backup always contains all new or modified data compared to the full backup. While in the incremental, the backup includes only the data from the previous backup.&nbsp;<\/p>\n\n\n\n<p>Nowtech, in conclusion, reveals the mistakes to avoid during a backup: do not perform the backup during working hours and protect the storage space from possible voltage fluctuations or power interruptions with the support of uninterruptible power supplies.<\/p>\n\n\n\n<p><strong>Read also: <\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/assoprovider.it\/en\/cyber-security-30-cose-ridurre-rischi-sul-web\/\" target=\"_blank\"><strong>30 things to do to reduce risks on the web<\/strong><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.<\/p>","protected":false},"author":439,"featured_media":7377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[483,484],"tags":[],"class_list":["post-6921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-consigli"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider<\/title>\n<meta name=\"description\" content=\"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/assoprovider.it\/en\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider\" \/>\n<meta property=\"og:description\" content=\"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/assoprovider.it\/en\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/\" \/>\n<meta property=\"og:site_name\" content=\"Assoprovider\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/assoprovider\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-01T15:03:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-09T15:23:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Giancarlo Donadio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@assoprovider\" \/>\n<meta name=\"twitter:site\" content=\"@assoprovider\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Giancarlo Donadio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/\"},\"author\":{\"name\":\"Giancarlo Donadio\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#\\\/schema\\\/person\\\/528ce5cd32d9e9593b5b9b6e58e2448a\"},\"headline\":\"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti)\",\"datePublished\":\"2021-03-01T15:03:43+00:00\",\"dateModified\":\"2021-03-09T15:23:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/\"},\"wordCount\":694,\"publisher\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg\",\"articleSection\":[\"Articoli\",\"Consigli\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/\",\"url\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/\",\"name\":\"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg\",\"datePublished\":\"2021-03-01T15:03:43+00:00\",\"dateModified\":\"2021-03-09T15:23:57+00:00\",\"description\":\"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg\",\"contentUrl\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg\",\"width\":1200,\"height\":630,\"caption\":\"internet day\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/assoprovider.it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#website\",\"url\":\"https:\\\/\\\/assoprovider.it\\\/\",\"name\":\"Assoprovider\",\"description\":\"Associazione di Internet Provider Indipendente\",\"publisher\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/assoprovider.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#organization\",\"name\":\"Assoprovider\",\"url\":\"https:\\\/\\\/assoprovider.it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Logo_Assoprovider_1.jpg\",\"contentUrl\":\"https:\\\/\\\/assoprovider.it\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Logo_Assoprovider_1.jpg\",\"width\":1000,\"height\":500,\"caption\":\"Assoprovider\"},\"image\":{\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/assoprovider\",\"https:\\\/\\\/x.com\\\/assoprovider\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/34577501\\\/admin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/assoprovider\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/assoprovider.it\\\/#\\\/schema\\\/person\\\/528ce5cd32d9e9593b5b9b6e58e2448a\",\"name\":\"Giancarlo Donadio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g\",\"caption\":\"Giancarlo Donadio\"},\"url\":\"https:\\\/\\\/assoprovider.it\\\/en\\\/author\\\/giancarlodonadio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider","description":"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/assoprovider.it\/en\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/","og_locale":"en_US","og_type":"article","og_title":"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider","og_description":"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.","og_url":"https:\/\/assoprovider.it\/en\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/","og_site_name":"Assoprovider","article_publisher":"https:\/\/www.facebook.com\/assoprovider","article_published_time":"2021-03-01T15:03:43+00:00","article_modified_time":"2021-03-09T15:23:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","type":"image\/jpeg"}],"author":"Giancarlo Donadio","twitter_card":"summary_large_image","twitter_creator":"@assoprovider","twitter_site":"@assoprovider","twitter_misc":{"Written by":"Giancarlo Donadio","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#article","isPartOf":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/"},"author":{"name":"Giancarlo Donadio","@id":"https:\/\/assoprovider.it\/#\/schema\/person\/528ce5cd32d9e9593b5b9b6e58e2448a"},"headline":"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti)","datePublished":"2021-03-01T15:03:43+00:00","dateModified":"2021-03-09T15:23:57+00:00","mainEntityOfPage":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/"},"wordCount":694,"publisher":{"@id":"https:\/\/assoprovider.it\/#organization"},"image":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#primaryimage"},"thumbnailUrl":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","articleSection":["Articoli","Consigli"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/","url":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/","name":"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti) - Assoprovider","isPartOf":{"@id":"https:\/\/assoprovider.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#primaryimage"},"image":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#primaryimage"},"thumbnailUrl":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","datePublished":"2021-03-01T15:03:43+00:00","dateModified":"2021-03-09T15:23:57+00:00","description":"Safer Internet Day: Assoprovider spiega come funziona un attacco informatico e come agire per difendere i tuoi dati.","breadcrumb":{"@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#primaryimage","url":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","contentUrl":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","width":1200,"height":630,"caption":"internet day"},{"@type":"BreadcrumbList","@id":"https:\/\/assoprovider.it\/safer-internet-day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/assoprovider.it\/"},{"@type":"ListItem","position":2,"name":"Safer Internet Day: le 4 fasi di un attacco informatico (e come proteggerti)"}]},{"@type":"WebSite","@id":"https:\/\/assoprovider.it\/#website","url":"https:\/\/assoprovider.it\/","name":"Assoprovider","description":"Independent Internet Provider Association","publisher":{"@id":"https:\/\/assoprovider.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/assoprovider.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/assoprovider.it\/#organization","name":"Assoprovider","url":"https:\/\/assoprovider.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/assoprovider.it\/#\/schema\/logo\/image\/","url":"https:\/\/assoprovider.it\/wp-content\/uploads\/2018\/01\/Logo_Assoprovider_1.jpg","contentUrl":"https:\/\/assoprovider.it\/wp-content\/uploads\/2018\/01\/Logo_Assoprovider_1.jpg","width":1000,"height":500,"caption":"Assoprovider"},"image":{"@id":"https:\/\/assoprovider.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/assoprovider","https:\/\/x.com\/assoprovider","https:\/\/www.linkedin.com\/company\/34577501\/admin\/","https:\/\/www.youtube.com\/assoprovider"]},{"@type":"Person","@id":"https:\/\/assoprovider.it\/#\/schema\/person\/528ce5cd32d9e9593b5b9b6e58e2448a","name":"Giancarlo Donadio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/511e02701f396da591e20ebdfa9fdb5c82f29837e8e9a1285ff86b1b5c8ba6cd?s=96&d=mm&r=g","caption":"Giancarlo Donadio"},"url":"https:\/\/assoprovider.it\/en\/author\/giancarlodonadio\/"}]}},"jetpack_featured_media_url":"https:\/\/assoprovider.it\/wp-content\/uploads\/2021\/02\/Safer-Internet-Day-le-4-fasi-di-un-attacco-informatico-e-come-proteggerti.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/posts\/6921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/comments?post=6921"}],"version-history":[{"count":0,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/posts\/6921\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/media\/7377"}],"wp:attachment":[{"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/media?parent=6921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/categories?post=6921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/assoprovider.it\/en\/wp-json\/wp\/v2\/tags?post=6921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}