{"id":10572,"date":"2020-12-06T01:07:16","date_gmt":"2020-12-06T00:07:16","guid":{"rendered":"https:\/\/www.cyberfero.com\/?page_id=10572"},"modified":"2024-05-08T00:49:06","modified_gmt":"2024-05-07T22:49:06","slug":"testa-la-tua-azienda-con-attacchi-di-phishing-etico","status":"publish","type":"page","link":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/","title":{"rendered":"Attacchi phishing etico &#8211; Testa la tua azienda!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10572\" class=\"elementor elementor-10572\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ff98d18 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ff98d18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-052c1c0\" data-id=\"052c1c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6932df4 elementor-widget elementor-widget-heading\" data-id=\"6932df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing\/Smishing etico<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30f5eff elementor-widget elementor-widget-heading\" data-id=\"30f5eff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Verifica la preparazione dei tuoi dipendenti contro gli attacchi phishing.<br>\nIl personale \u00e8 preparato ad affrontare attacchi <i>progettati per ottenere informazioni sensibili<\/i>?<br><big>Scoprilo con una campagna di <em>Phishing etico<\/em><\/big>.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5243d1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f5243d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23ae104 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23ae104\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5add339\" data-id=\"5add339\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3b676e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b676e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1132e29\" data-id=\"1132e29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-120aca7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"120aca7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png\" class=\"attachment-full size-full wp-image-10602\" alt=\"Attacchi phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Testa la difesa della tua azienda<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e2dfcbc\" data-id=\"e2dfcbc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d7d89b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2d7d89b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak.png\" class=\"attachment-full size-full wp-image-10604\" alt=\"Perdita di dati\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/data-leak-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Identifica potenziali perdite di dati<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a88c6ec\" data-id=\"a88c6ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de2fbab elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"de2fbab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc.png\" class=\"attachment-full size-full wp-image-10606\" alt=\"Debolezze nel comportamento\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Scopri le cattive abitudini del team<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e4163 elementor-widget elementor-widget-spacer\" data-id=\"f3e4163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79426d7 elementor-widget elementor-widget-heading\" data-id=\"79426d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Il <b>phishing<\/b> \u00e8 pi\u00f9 che mai diffuso e sta diventando sempre pi\u00f9 sofisticato. Possiamo aiutarvi a ridurre al minimo gli attacchi phishing e a identificare le debolezze della vostra organizzazione attraverso <b>il test e la formazione dei vostri dipendenti<\/b> grazie alle nostre soluzioni di phishing etico.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76719be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76719be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1469e8\" data-id=\"b1469e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8843d97 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8843d97\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6bb43cc\" data-id=\"6bb43cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff99b83 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ff99b83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-10df2d0\" data-id=\"10df2d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6162ad1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6162ad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"tel:+3905221685330\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Chiamaci<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82291f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82291f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-955ead6\" data-id=\"955ead6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96b9c30 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"96b9c30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tScopri di pi\u00f9\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41737a2 elementor-widget elementor-widget-heading\" data-id=\"41737a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Sapevate che un'e-mail che sembra affidabile potrebbe essere un tentativo di phishing progettato per rubare informazioni? <b>Possiamo aiutarvi a identificarle.<\/b><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-394ed1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"394ed1f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fb792\" data-id=\"f1fb792\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f93511a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f93511a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-876849b\" data-id=\"876849b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56e610b elementor-widget elementor-widget-image\" data-id=\"56e610b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"501\" height=\"501\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert.jpg\" class=\"attachment-large size-large wp-image-10580\" alt=\"Attacchi phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert.jpg 501w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert-300x300.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert-150x150.jpg 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert-165x165.jpg 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAlert-120x120.jpg 120w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e42bb7\" data-id=\"7e42bb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a21de75 elementor-widget elementor-widget-heading\" data-id=\"a21de75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Agisci contro gli attacchi phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7746b75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7746b75\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-505fbb0\" data-id=\"505fbb0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8674dd4 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"8674dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing.png\" class=\"attachment-full size-full wp-image-10585\" alt=\"phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Programma attacchi phishing simulati<\/h3><p class=\"elementor-image-box-description\">Attraverso l'uso di <em>phishing etico<\/em>, programma dei <i>test<\/i> per i tuoi dipendenti e verifica la loro preparazione in materia.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc9f8ad elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"bc9f8ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report.png\" class=\"attachment-full size-full wp-image-10587\" alt=\"Risultati phishing etico\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Verifica e implementa<\/h3><p class=\"elementor-image-box-description\">Risultati alla mano, potrai verificare la resilienza dell'azienda a questo tipo di attacchi, permettendoti di implementare soluzioni <i>ad hoc<\/i>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0c8cdf elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"c0c8cdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation.png\" class=\"attachment-full size-full wp-image-10589\" alt=\"Presentazione Phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Aiuta il tuo team<\/h3><p class=\"elementor-image-box-description\">Supporta i membri dello staff fornendo loro gli strumenti per individuare i tentativi <em>prima<\/em> che vadano a buon fine.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab16d39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab16d39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab1d04a\" data-id=\"ab1d04a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d73671a elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"d73671a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-223d2eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"223d2eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-116d69e\" data-id=\"116d69e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-af7f37f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af7f37f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8187b2a\" data-id=\"8187b2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61c4f4f elementor-widget elementor-widget-heading\" data-id=\"61c4f4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cos'\u00e8 il phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a584f7 elementor-widget elementor-widget-text-editor\" data-id=\"1a584f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si tratta di un fenomeno di <strong><a href=\"https:\/\/it.wikipedia.org\/wiki\/Phishing\">truffa informatica<\/a> che consiste nel sottrarre i dati di autenticazione<\/strong> (principalmente username e password) facendoli inserire all\u2019utente stesso in una pagina falsa che <i>appare identica a quella di un servizio che il destinatario usa realmente<\/i>.<\/p><p>Gli attacchi phishing di questo tipo sono difficili da individuare in modo automatico, perch\u00e9 i link nelle email potrebbero apparire legittimi a una macchina.<\/p><p>L&#8217;unico modo per evitare di venire ingannati \u00e8 quello di sapere a quali indicatori fare attenzione ed essere sempre all&#8217;erta. <strong>Per questo \u00e8 importante lavorare per aumentare la resilienza del proprio team a questo tipo di attacchi.<\/strong><\/p><p>Se i dipendenti dell&#8217;azienda sono in grado di individuare i tentativi di attacco, i dati della compagnia saranno pi\u00f9 al sicuro.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f5d041 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0f5d041\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Chiedi una consulenza<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7ee9d86\" data-id=\"7ee9d86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0fbcd5 elementor-widget elementor-widget-image\" data-id=\"c0fbcd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept.jpg\" class=\"attachment-large size-large wp-image-10594\" alt=\"Attacchi Phishing Concept\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept.jpg 500w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept-300x300.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept-150x150.jpg 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept-165x165.jpg 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/PhishingAttackConcept-120x120.jpg 120w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2375e22 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2375e22\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d87993\" data-id=\"7d87993\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ae99e8 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"1ae99e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc7dfa0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc7dfa0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50e1113\" data-id=\"50e1113\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7c964b elementor-widget elementor-widget-heading\" data-id=\"a7c964b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cosa faremo per voi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1778eb4 elementor-widget elementor-widget-heading\" data-id=\"1778eb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Tutto quello di cui abbiamo bisogno \u00e8 la lista degli utenti da testare. Ovviamente gli attacchi sono personalizzabili, all'occorrenza.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2cfc667 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cfc667\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f604f15\" data-id=\"f604f15\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28b07de elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"28b07de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy.png\" class=\"attachment-full size-full wp-image-10614\" alt=\"Attacchi Phishing - Raccolta credenziali\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/privacy-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Raccolta credenziali e <i>pharming<\/i><\/h3><p class=\"elementor-image-box-description\">Convinceremo i dipendenti della vostra organizzazione a rivelare le loro credenziali. \n<br \/>Questo servizio \u00e8 ideale per valutare la <b>consapevolezza<\/b> dei vostri dipendenti in merito agli attacchi di phishing via e-mail. <br \/>Inoltre, <i>tutte le credenziali ottenute possono essere riviste per garantire che aderiscano a una politica adeguata in materia di password<\/i>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-993c188\" data-id=\"993c188\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f527208 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f527208\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1.png\" class=\"attachment-full size-full wp-image-10616\" alt=\"Attacchi phishing - Spear phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/hacker-1-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><i>Spear Phishing<\/i><\/h3><p class=\"elementor-image-box-description\">In questo caso si ricorre a scenari di phishing precedentemente menzionati, ma l'attacco \u00e8 diretto a un gruppo <b>target specifico<\/b> di individui (ad es. il dipartimento finanze) utilizzando informazioni specifiche per l'obiettivo o gli obiettivi. <br \/>Questo test consente di valutare la probabilit\u00e0 che i bersagli rivelino informazioni riservate.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9d6a01e\" data-id=\"9d6a01e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4a51d1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e4a51d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/it.wikipedia.org\/wiki\/Whaling\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication.png\" class=\"attachment-full size-full wp-image-10618\" alt=\"Attacchi Phishing - Whaling attack\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/authentication-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"https:\/\/it.wikipedia.org\/wiki\/Whaling\"><i>Whaling<\/i><\/a><\/h3><p class=\"elementor-image-box-description\">Analogamente allo <i>Spear Phishing<\/i>, ma l'obiettivo dell'attacco sar\u00e0 a livello dirigenziale  all'interno dell'organizzazione. <br \/>Anche in questo caso, lo scopo di questo test \u00e8 quello di valutare la suscettibilit\u00e0 dei destinatari a rivelare informazioni riservate.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6f48680 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f48680\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-486109d\" data-id=\"486109d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67640fc elementor-widget elementor-widget-heading\" data-id=\"67640fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cosa fare dopo l'attacco simulato?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd93f16 elementor-widget elementor-widget-heading\" data-id=\"bd93f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">I nostri servizi di <i>Ethical Phishing<\/i> producono dei report dettagliati contenenti moltissime informazioni essenziali per identificare i punti deboli negli scenari testati. Per esempio: <i>quanti aprono i messaggi, quanti click vengono raccolti, le credenziali utilizzate<\/i>, etc. Questi dati sono ottimi per quantificare la consapevolezza degli utenti nel riconoscere email sospette.\n<br>\nInoltre \u00e8 possibile organizzare una <b>campagna di formazione<\/b> e sensibilizzazione alla sicurezza informatica per i dipendenti. Conducendo il servizio di phishing etico e <b>utilizzando i risultati per personalizzare il programma di formazione del vostro personale<\/b>, la loro formazione viene condotta con esempi reali coinvolgenti, <i>rendendo l'intervento molto pi\u00f9 efficace<\/i>.<br>\nLa Cyberfero \u00e8 partner del <a href=\"https:\/\/www.cyberfero.com\/it\/partner\">Clusit (Associazione Italiana per la sicurezza informatica)<\/a> al fine di essere sempre aggiornati sui temi della Cyber Security ed \u00e8 inoltre azienda formatrice dell'ente formatore <a href=\"https:\/\/www.ifoa.it\">IFOA<\/a>.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e13a20b\" data-id=\"e13a20b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5622b6 elementor-widget elementor-widget-image\" data-id=\"e5622b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/training-phishing-attack-1024x683.jpg\" class=\"attachment-large size-large wp-image-10626\" alt=\"Attacchi Phishing - Educational Training\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/training-phishing-attack-1024x683.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/training-phishing-attack-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/training-phishing-attack-768x512.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/training-phishing-attack.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8458fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8458fc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7060af6\" data-id=\"7060af6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-369cb81 elementor-widget elementor-widget-text-editor\" data-id=\"369cb81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Fortifica la <a href=\"https:\/\/www.cyberfero.com\/it\/soc-as-a-service\/\">sicurezza dell&#8217;azienda<\/a><br \/>supportando i dipendenti nel riconoscere le minacce del phishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd96037 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd96037\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e84e8b2\" data-id=\"e84e8b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f7d20a elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"2f7d20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1809813 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1809813\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec78170\" data-id=\"ec78170\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-34ecced elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34ecced\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d5f10a1\" data-id=\"d5f10a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7447aea elementor-widget elementor-widget-heading\" data-id=\"7447aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cos'\u00e8 lo smishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d47c650 elementor-widget elementor-widget-text-editor\" data-id=\"d47c650\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn modo molto simile al phishing, lo <strong>smishing<\/strong>\u00a0o <a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing#SMS_phishing\">SMS Phishing<\/a> <strong>utilizza gli SMS in sostituzione delle e-mail<\/strong> ma con gli stessi identici obiettivi. Le nostre campagne di simulazione sono in grado di testare la permeabilit\u00e0 anche di questa variante.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d94bf8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5d94bf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Chiedi una consulenza<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7322302\" data-id=\"7322302\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efdc65f elementor-widget elementor-widget-image\" data-id=\"efdc65f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"339\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/shishing.jpg\" class=\"attachment-large size-large wp-image-13476\" alt=\"smishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/shishing.jpg 509w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/shishing-300x200.jpg 300w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dab2d2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dab2d2e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-880ed08\" data-id=\"880ed08\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-344923a elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"344923a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1349860 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1349860\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-022d76f\" data-id=\"022d76f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-148d8c0 elementor-widget elementor-widget-menu-anchor\" data-id=\"148d8c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contatti\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-464ff4a elementor-widget elementor-widget-heading\" data-id=\"464ff4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contattaci per maggiori informazioni<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-00f4a8a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00f4a8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5fd5803\" data-id=\"5fd5803\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e628757\" data-id=\"e628757\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bb08bc elementor-widget elementor-widget-text-editor\" data-id=\"5bb08bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Siamo a disposizione per rispondere alle tue domande e valutare insieme la tua situazione per offrirti i servizi migliori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1323a3 elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"a1323a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Successivo&quot;,&quot;step_previous_label&quot;:&quot;Precedente&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Modulo Ethical Phishing\" aria-label=\"Modulo Ethical Phishing\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"10572\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"a1323a3\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Attacchi phishing etico - Testa la tua azienda! - Cyberfero\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"10572\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_59dadd9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_59dadd9\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefono\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_59dadd9]\" id=\"form-field-field_59dadd9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessaggio\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" required=\"required\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_f8dd6d5 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_f8dd6d5]\" id=\"form-field-field_f8dd6d5\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_f8dd6d5\">Con il presente modulo accetto i termini della <a href=\"https:\/\/www.cyberfero.com\/privacy-policy\/\" target=\"_blank\">privacy policy<\/a><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_5385480 elementor-col-100 recaptcha_v3-bottomleft\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_5385480\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Lc76NApAAAAAPlpHmqDBJPueP6IEqBWw3m9wdyl\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomleft\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contattaci<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-84e6d6f\" data-id=\"84e6d6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing\/Smishing etico Verifica la preparazione dei tuoi dipendenti contro gli attacchi phishing. Il personale \u00e8 preparato ad affrontare attacchi progettati per ottenere informazioni sensibili?Scoprilo con una campagna di Phishing etico. Testa la difesa della tua azienda Identifica potenziali perdite di dati Scopri le cattive abitudini del team Il phishing \u00e8 pi\u00f9 che mai diffuso e sta diventando sempre pi\u00f9 sofisticato&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-10572","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Attacchi phishing etico - Testa la tua azienda! - Cyberfero<\/title>\n<meta name=\"description\" content=\"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacchi phishing etico - Testa la tua azienda!\" \/>\n<meta property=\"og:description\" content=\"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyberfero\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T22:49:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/\",\"name\":\"Attacchi phishing etico - Testa la tua azienda! - Cyberfero\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/shield.png\",\"datePublished\":\"2020-12-06T00:07:16+00:00\",\"dateModified\":\"2024-05-07T22:49:06+00:00\",\"description\":\"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/shield.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/shield.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attacchi phishing etico &#8211; Testa la tua azienda!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Attacchi phishing etico - Testa la tua azienda! - Cyberfero","description":"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/","og_locale":"it_IT","og_type":"article","og_title":"Attacchi phishing etico - Testa la tua azienda!","og_description":"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?","og_url":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/","og_site_name":"Cyberfero","article_publisher":"https:\/\/www.facebook.com\/Cyberfero","article_modified_time":"2024-05-07T22:49:06+00:00","og_image":[{"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@secureod","twitter_misc":{"Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/","url":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/","name":"Attacchi phishing etico - Testa la tua azienda! - Cyberfero","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png","datePublished":"2020-12-06T00:07:16+00:00","dateModified":"2024-05-07T22:49:06+00:00","description":"Verifica la preparazione dei tuoi dipendenti contro gli attacchi di phishing.Il personale \u00e8 preparato ad affrontare questi attacchi?","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#primaryimage","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Attacchi phishing etico &#8211; Testa la tua azienda!"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/10572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/comments?post=10572"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/10572\/revisions"}],"predecessor-version":[{"id":19337,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/10572\/revisions\/19337"}],"wp:attachment":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/media?parent=10572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}