{"id":13046,"date":"2024-11-12T08:01:28","date_gmt":"2024-11-12T08:01:28","guid":{"rendered":"https:\/\/www.cyber40.it\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/"},"modified":"2025-05-15T19:45:42","modified_gmt":"2025-05-15T19:45:42","slug":"cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/","title":{"rendered":"Cyber 4.0 joins the worldwide More Than a Password Day campaign"},"content":{"rendered":"\n<p>A coalition of nonprofit organizations publishes the second version of the Common Password Guidelines with 132 signatories worldwide.<\/p>\n\n<p>Cyber 4.0 is again joining the More Than a Password Day campaign this year.<\/p>\n\n<p><strong>We join the global community on this global day to raise awareness among each of us of the importance of strong authentication. Our data is increasingly numerous and valuable, and protecting it with a simple password, while sophisticated, no longer guarantees its protection from unauthorized access and malicious use. Much more effective tools exist.  <\/strong><\/p>\n\n<p>So here is the Common Guide on Passwords translated into Italian<\/p>\n\n<p><strong>Protect your account and your devices<\/strong><\/p>\n\n<p>We believe that using stronger authentication is one of the most effective and inexpensive steps that can be taken to protect organizations and people online. In celebration of World More Than a Password Day, November 12, 2024, we are jointly releasing this Common Password Guide that specifies simple steps anyone can take to be more secure: <\/p>\n\n<p>Actions to be taken immediately<\/p>\n\n<p><strong>1. Use password-free authentication<\/strong><\/p>\n\n<p>Use password-free authentication such as passkeys (sometimes other terms are used) when you can. Passkeys are easier to use and more secure than passwords. They use encryption to verify your online identity, with a secret key stored on your device that is never shared. Most popular operating systems, browsers and e-mail services support passkeys: just search for &#8220;passkey&#8221; and the name of the operating system, browser or site\/service.   <\/p>\n\n<p><strong>2. Protect your e-mail<\/strong><\/p>\n\n<p>If you use password authentication for your mailboxes, use a very complex (long, randomly generated, unique password<a href=\"mailto:https:\/\/www.cisa.gov\/secure-our-world\/use-strong-passwords\">(Use Strong Passwords | CISA<\/a>) and multi-factor authentication\/two-step verification (see the next point). Email is the most common form of reset if you want to make sure that no one else can &#8220;reset&#8221; your passwords and gain access to your accounts. <\/p>\n\n<p><strong>3. Add an additional layer of security beyond just using passwords<\/strong><\/p>\n\n<p>Using a hardware security key or token, an authentication app, or a PIN provided by SMS messages as a &#8220;second factor&#8221; in addition to the password can help prevent phishing and other attacks. This process can be called multi-factor authentication (MFA), two-factor authentication (2FA) or two-step verification. The best form of additional security is to use a hardware token or authentication app on the phone and not rely on SMS messages for the second factor.  <\/p>\n\n<p><strong>4. Use a password manager<\/strong><\/p>\n\n<p>If you have accounts that use only passwords, consider using a password manager so that you do not have to memorize dozens of passwords. Using a password manager means you can use complex, randomly generated passwords that are much harder to guess. Software password managers, browsers that manage your passwords, and operating systems can do a good job. Of course, the password for your password manager must be complex and easy to remember (see the next step on choosing a good password), and you must respond quickly to change all passwords if your password management service is compromised. More detailed guidance on password managers is available, for example, from UK: <a href=\"mailto:https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/password-managers\">Password Managers: using browsers and apps to safely store your passwords<\/a> and Canada: <a href=\"mailto:https:\/\/www.cyber.gc.ca\/en\/guidance\/password-managers-security-itsap30025\">Password Manager:Security Tips (ITSAP.30.025)<\/a>.    <\/p>\n\n<p><strong>5. Use recommended techniques for choosing passwords<\/strong><\/p>\n\n<p>If you choose your own passwords instead of having them generated by your computer or password manager, you can use a passphrase<a href=\"mailto:https:\/\/www.cyber.gc.ca\/en\/guidance\/best-practices-passphrases-and-passwords-itsap30032\">(Best practices for passphrases and passwords (ITSAP.30.032<\/a>) or a technique such as the U.K. NCSC&#8217;s &#8220;Three Random Words&#8221; to choose passwords that are easier to remember but difficult to guess<a href=\"mailto:https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/three-random-words\">(Three Random Words &#8211; NCSC.GOV.UK<\/a>).<\/p>\n\n<p><strong>If you have been &#8220;hacked&#8221;<\/strong><\/p>\n\n<p><strong>6. Changing passwords<\/strong><\/p>\n\n<p>Your passwords should be changed immediately if one of your devices is compromised (e.g., a hacker installs malware on your computer). If an online site or service you use (an e-mail service, Web site, etc.) is hacked, change the password for that site or service and wherever you reused that password (and you really shouldn&#8217;t reuse passwords). Signing up at <a href=\"https:\/\/haveibeenpwned.com\/\">https:\/\/haveibeenpwned.com\/<\/a> is a good way to find out if any of your passwords need updating. Finally, it is best to change passwords using a device that has not been compromised.   <\/p>\n\n<p>Note to providers: require or support advanced authentication instead of requiring periodic password changes. You may find this guide useful: <a href=\"mailto:https:\/\/www.ncsc.gov.uk\/collection\/mfa-for-your-corporate-online-services\">Muti-factor authentication for your corporate online services<\/a> <\/p>\n\n<p>The Guide was produced thanks to the collaboration of:<\/p>\n\n<p>#ShareTheMicInCyber<br\/>AKTA<br\/>Albanian Cyber Association NGO<br\/>American University<br\/>Anti-Phishing Working Group (APWG).<br\/>Aspen Digital<br\/>Association of Information Security Professionals (AiSP)<br\/>Australian Cyber Collaboration Centre<br\/>Aviation ISAC<br\/>BBB Institute for Marketplace Trust<br\/>Bfore.Ai<br\/>Black Girls in Cyber<br\/>Broadcom<br\/>C3Initiative<br\/>Canadian Cyber Threat Exchange<br\/>Center for Democracy &amp; Technology<br\/>Center for Internet Security<br\/>Center for Threat-Informed Defense<br\/>Charter of Trust<br\/>Cloud Security Alliance<br\/>Common Sense<br\/>Consumer Reports<br\/>Craig Newmark Philanthropies<br\/>CREST International<br\/>Crowdstrike<br\/>Cum Sensu B.V<br\/>Cyber 4.0 Cybersecurity Competence Center<br\/>Cyber Defense Alliance<br\/>Cyber Peace Foundation<br\/>Cyber Readiness Institute<br\/>Cyber Risk Institute<br\/>Cyber Security &amp; Forensics Association Uganda<br\/>Cyber Threat Alliance<br\/>Cyber8M<br\/>CyberGreen Institute<br\/>CyberPeace Institute<br\/>Cybersecurity and Infrastructure Security Agency (CISA)<br\/>Cybersecurity Network Foundation<br\/>Cybersecurity Tech Accord<br\/>Cybertrust America<br\/>CyberWA, Inc.<br\/>CyberWyoming Alliance<br\/>CyBlack<br\/>DECO PROTESTS<br\/>Dell<br\/>DigeTekS LLC<br\/>DISARM Foundation<br\/>DNS Research Federation<br\/>PuntoGal Domain<br\/>eco &#8211; Association of the Internet Industry<br\/>EST Applied Intelligence<br\/>EURid<br\/>Euroconsumers<br\/>European Cyber Security Organization (ECSO)<br\/>European Cybercrime Centre &#8211; EC3 &#8211; Europol<br\/>Everyone.AI<br\/>FIDO Alliance<br\/>Forge Institute<br\/>Forum of Incident Response and Security Teams (FIRST)<br\/>Foundation Cyberbrein<br\/>Get Safe Online<br\/>Girls Who Code<br\/>Global Anti-Scam Alliance<br\/>Global Cyber Alliance<br\/>Global Forum on Cyber Expertise (GFCE)<br\/>Global Resilience Federation<br\/>Hacking the Workforce<br\/>Health-ISAC<br\/>HIKS<br\/>ICT Academy<br\/>Impetus<br\/>Insig2<br\/>Institute for Security and Technology<br\/>Internet Society (ISOC)<br\/>Internet Society Belgium<br\/>Internet Society UK England Chapter<br\/>INTERPOL<br\/>ISOC Democratic Republic of the Congo Chapter<br\/>ISOC Zambia Chapter<br\/>Kenya CyberSecurity &amp; Forensics Association.<br\/>LAC4<br\/>Maritime Safety &amp; Security Alliance<br\/>Metamorphosis<br\/>Microsoft<br\/>National Authority for Electronic Certification and Cyber Security (AKCESK)<br\/>National Council of ISACs<br\/>National Cyber Forensics and Training Alliance<br\/>National Cybersecurity Alliance<br\/>National Cybersecurity Society<br\/>Netsafe<br\/>Nomad Futurist<br\/>NPower<br\/>NSI Cyber and Tech Center, Antonin Scalia Law School at George Mason University<br\/>Okta<br\/>Open Cybersecurity Alliance<br\/>OpenSecurityTraining2<br\/>Outpost24<br\/>OWASP<br\/>Packet Clearing House<br\/>DOTU.EUS<br\/>Quad9<br\/>R Street Institute<br\/>Rapid7<br\/>Recorded Future<br\/>Red Piranha<br\/>Retail &amp; Hospitality ISAC<br\/>Safe Online Women Kenya<br\/>SAFECode<br\/>SAM for Compliance<br\/>ScamAdviser<br\/>Sctium<br\/>SecureTheVillage<br\/>Security Scorecard<br\/>Serianu<br\/>Shadowserver Foundation<br\/>Sightline Security<br\/>Singapore Computer Emergency Response Team (SingCERT)<br\/>Society of Citizens Against Relationship Scams Inc.<br\/>South West Cyber Security Cluster<br\/>STOP. THINK. CONNECT. Messaging Convention<br\/>TechSoup<br\/>The Kosciuszko Institute Association<br\/>U.S. Chamber of Commerce<br\/>UC Berkeley Center for Long-Term Cybersecurity<br\/>University of Chicago Harris School of Public Policy &#8211; Cyber Policy Initiative<br\/>Women4Cyber Foundation<br\/>Women4Cyber Montenegro<br\/>XRSI &#8211; X Reality Safety Intelligence<br\/>youthprotect e.V.<br\/>Zyber Global Centre   <\/p>\n\n<p><a href=\"https:\/\/nonprofitcyber.org\/common-guidance-on-passwords\/\"><strong>Access the Nonprofit Cyber campaign in English<\/strong><\/a><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A coalition of nonprofit organizations publishes the second version of the Common Password Guidelines with 132 signatories worldwide. Cyber 4.0 is again joining the More Than a Password Day campaign this year. We join the global community on this global&#8230;<\/p>\n","protected":false},"author":17,"featured_media":12881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":2,"footnotes":""},"categories":[611],"tags":[],"class_list":["post-13046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"A coalition of nonprofit organizations publishes the second version of the Common Password Guidelines with 132 signatories worldwide. Cyber 4.0 is again joining the More Than a Password Day campaign this year. We join the global community on this global...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T08:01:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T19:45:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"Cyber 4.0 joins the worldwide More Than a Password Day campaign\",\"datePublished\":\"2024-11-12T08:01:28+00:00\",\"dateModified\":\"2025-05-15T19:45:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\"},\"wordCount\":1024,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\",\"name\":\"Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png\",\"datePublished\":\"2024-11-12T08:01:28+00:00\",\"dateModified\":\"2025-05-15T19:45:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png\",\"width\":1500,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber 4.0 joins the worldwide More Than a Password Day campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/","og_locale":"en_US","og_type":"article","og_title":"Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0","og_description":"A coalition of nonprofit organizations publishes the second version of the Common Password Guidelines with 132 signatories worldwide. Cyber 4.0 is again joining the More Than a Password Day campaign this year. We join the global community on this global...","og_url":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/","og_site_name":"Cyber 4.0","article_published_time":"2024-11-12T08:01:28+00:00","article_modified_time":"2025-05-15T19:45:42+00:00","og_image":[{"width":1500,"height":1500,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png","type":"image\/png"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"Cyber 4.0 joins the worldwide More Than a Password Day campaign","datePublished":"2024-11-12T08:01:28+00:00","dateModified":"2025-05-15T19:45:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/"},"wordCount":1024,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/","url":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/","name":"Cyber 4.0 joins the worldwide More Than a Password Day campaign - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png","datePublished":"2024-11-12T08:01:28+00:00","dateModified":"2025-05-15T19:45:42+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1.png","width":1500,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/cyber-4-0-joins-the-worldwide-more-than-a-password-day-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber 4.0 joins the worldwide More Than a Password Day campaign"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/1-1024x1024.png",1024,1024,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":128,"filter":"raw","term_order":"0","cat_ID":611,"category_count":128,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13046"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13046\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/12881"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}