{"id":13271,"date":"2022-05-20T15:47:44","date_gmt":"2022-05-20T15:47:44","guid":{"rendered":"https:\/\/www.cyber40.it\/cybersecurity-how-to-defend-against-hacker-attacks\/"},"modified":"2022-05-20T15:47:44","modified_gmt":"2022-05-20T15:47:44","slug":"cybersecurity-how-to-defend-against-hacker-attacks","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/","title":{"rendered":"Cybersecurity, how to defend against hacker attacks"},"content":{"rendered":"<p>Cyber 4.0 is participating today in an event organized by Confindustria Umbria and the Digital Innovation Hub of Umbria, with which the Competence Center collaborates.<\/p>\n<p>More than 60 SMBs attended the event, some of whom shared experiences of attacks suffered at the hands of the Conti ransomware gang, resulting in weeks of operational freezes and substantial damage to corporate information archives.<\/p>\n<p>Once again stressed the importance of skills, training, awareness of all employees in order to raise awareness of risks and how to behave in case of attack.<\/p>\n<p>Highly topical seminar, to which the Compartimento di Polizia postale e delle Comunicazioni Umbria also made its very important contribution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber 4.0 is participating today in an event organized by Confindustria Umbria and the Digital Innovation Hub of Umbria, with which the Competence Center collaborates. More than 60 SMBs attended the event, some of whom shared experiences of attacks suffered&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11006,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":5,"footnotes":""},"categories":[611],"tags":[],"class_list":["post-13271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity, how to defend against hacker attacks - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity, how to defend against hacker attacks - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Cyber 4.0 is participating today in an event organized by Confindustria Umbria and the Digital Innovation Hub of Umbria, with which the Competence Center collaborates. More than 60 SMBs attended the event, some of whom shared experiences of attacks suffered...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T15:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Cybersecurity, how to defend against hacker attacks\",\"datePublished\":\"2022-05-20T15:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\"},\"wordCount\":113,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\",\"name\":\"Cybersecurity, how to defend against hacker attacks - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg\",\"datePublished\":\"2022-05-20T15:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg\",\"width\":1200,\"height\":900,\"caption\":\"WhatsApp Image 2022 05 20 at 16.53.14 scaled\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity, how to defend against hacker attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity, how to defend against hacker attacks - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity, how to defend against hacker attacks - Cyber 4.0","og_description":"Cyber 4.0 is participating today in an event organized by Confindustria Umbria and the Digital Innovation Hub of Umbria, with which the Competence Center collaborates. More than 60 SMBs attended the event, some of whom shared experiences of attacks suffered...","og_url":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/","og_site_name":"Cyber 4.0","article_published_time":"2022-05-20T15:47:44+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","type":"image\/jpeg"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Cybersecurity, how to defend against hacker attacks","datePublished":"2022-05-20T15:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/"},"wordCount":113,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/","url":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/","name":"Cybersecurity, how to defend against hacker attacks - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","datePublished":"2022-05-20T15:47:44+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","width":1200,"height":900,"caption":"WhatsApp Image 2022 05 20 at 16.53.14 scaled"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity, how to defend against hacker attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-1024x768.jpeg",1024,768,true],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":128,"filter":"raw","term_order":"0","cat_ID":611,"category_count":128,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13271"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13271\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11006"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}