{"id":12310,"date":"2021-01-29T20:10:50","date_gmt":"2021-01-29T19:10:50","guid":{"rendered":"https:\/\/www.cyberfero.com\/?page_id=12310"},"modified":"2024-05-08T00:46:06","modified_gmt":"2024-05-07T22:46:06","slug":"sicurezza-fisica-add-on-al-servizio-vapt","status":"publish","type":"page","link":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/","title":{"rendered":"Sicurezza fisica: add on al servizio VA&#038;PT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12310\" class=\"elementor elementor-12310\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-286bdeb7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"286bdeb7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64bf96fd\" data-id=\"64bf96fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-650fba88 elementor-widget elementor-widget-heading\" data-id=\"650fba88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><small>Add on di <strong>sicurezza fisica<\/strong> per il servizio di<\/small><br \/>Vulnerability Assessment e Penetration Test<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1383868 elementor-widget elementor-widget-heading\" data-id=\"1383868\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Testiamo in modo completo <br \/>la sicurezza fisica della tua azienda<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-128f5ff3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"128f5ff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0090d6a elementor-widget elementor-widget-text-editor\" data-id=\"0090d6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vogliamo offrire un servizio completo per la sicurezza professionale. <strong>Per questo non possiamo trascurare gli attacchi che sfruttano tecniche di ingegneria sociale e manomissione fisica dei sistemi<\/strong>.\u00a0<\/p><p>Tramite questi add on ai servizi di <a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\">Vulnerability Assessment e Penetration Test<\/a>, mettiamo alla prova a 360\u00b0 la sicurezza della tua azienda, testando la sua resilienza agli attacchi di sicurezza fisica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135abe4 elementor-widget elementor-widget-heading\" data-id=\"135abe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Alcuni dei servizi di sicurezza fisica proposti<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ce4b5a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce4b5a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4d6a831\" data-id=\"4d6a831\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9162fc6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9162fc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#socialengineering\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png\" class=\"attachment-full size-full wp-image-12361\" alt=\"Sicurezza fisica Social Engineer\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#socialengineering\">Social Engineer<\/a><\/h3><p class=\"elementor-image-box-description\">L'arte di imbrogliare le persone tramite empatia o vere e proprie truffe potrebbe essere la debolezza fatale della tua azienda<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5776489\" data-id=\"5776489\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-817db43 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"817db43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#rogueap\" tabindex=\"-1\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi.png\" class=\"attachment-full size-full wp-image-12363\" alt=\"sicurezza fisica Rogue AP\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#rogueap\">Rogue AP<\/a><\/h3><p class=\"elementor-image-box-description\">Access point corrotti che vengono scambiati per legittimi. A volte non basta essere collegati a una certa linea wifi per potersi dire al sicuro<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b44b29f\" data-id=\"b44b29f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c1fe9c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0c1fe9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#catturadati\" tabindex=\"-1\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password.png\" class=\"attachment-full size-full wp-image-12367\" alt=\"sicurezza fisica attacchi in loco\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#catturadati\">Cattura dati dalla rete<\/a><\/h3><p class=\"elementor-image-box-description\">Le comunicazioni sulla rete sono davvero sicure? La VPN aziendale funziona correttamente? I dipendenti la usano sempre?<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-73ebb2d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73ebb2d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-03783a3\" data-id=\"03783a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17d8ae2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"17d8ae2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#dumpter\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin.png\" class=\"attachment-full size-full wp-image-12359\" alt=\"sicurezza fisica dumpster diving\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#dumpter\">Dumpster Diving<\/a><\/h3><p class=\"elementor-image-box-description\">Non si fa quasi mai caso a quello che viene gettato nel bidone della spazzatura, invece \u00e8 il caso di prestare attenzione a cosa e in che modo questo avviene<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e480f4\" data-id=\"1e480f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7eaca49 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7eaca49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#inloco\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1.png\" class=\"attachment-full size-full wp-image-12365\" alt=\"sicurezza fisica attacchi in loco\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/hacker-1-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#inloco\">Attacchi in loco<\/a><\/h3><p class=\"elementor-image-box-description\">Non tutto passa per la rete. Alcuni attacchi potrebbero sfruttare punti deboli fisici dell'edificio o la leggerezza con cui i dipendenti usano i loro dati di accesso.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c91fbe1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c91fbe1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d219d7a\" data-id=\"4d219d7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5a22d3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c5a22d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d09d8c1 elementor-widget elementor-widget-menu-anchor\" data-id=\"d09d8c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"socialengineering\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102220fa elementor-widget elementor-widget-heading\" data-id=\"102220fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2955a40e elementor-widget elementor-widget-text-editor\" data-id=\"2955a40e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00c8 molto pi\u00f9 facile e conveniente <em>hackerare<\/em> una persona piuttosto che una macchina.<\/strong><\/p><p>Il <em><a href=\"https:\/\/it.wikipedia.org\/wiki\/Ingegneria_sociale\">social engineering<\/a><\/em> \u00e8 l&#8217;arte di manipolare le persone in modo che forniscano informazioni riservate. I tipi di informazioni possono variare e comprendere password, informazioni bancarie o informazioni di accesso a un computer da remoto.\u00a0<\/p><p>Vediamo alcuni dei pi\u00f9 comuni metodi di attacco a cui prestare attenzione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-603b708d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"603b708d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-455da550\" data-id=\"455da550\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-524ee4bc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"524ee4bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat.png\" class=\"attachment-full size-full wp-image-12328\" alt=\"Social Engineering in person\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/chat-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Incontri inusuali<\/span><p class=\"elementor-image-box-description\">Con incontri che possono sembrare casuali, richieste di aiuto che puntano sull'empatia o raggiri verbali, gli hacker social possono farsi rivelare importanti informazioni sull'azienda. Non necessariamente informazioni sensibili come le password, ma anche informazioni sulla struttura dell'azienda che possono poi essere usate per portare avanti l'attacco.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5d341757\" data-id=\"5d341757\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bcc1454 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2bcc1454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call.png\" class=\"attachment-full size-full wp-image-12330\" alt=\"Social Engineering phone\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/phone-call-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Richieste via telefono<\/span><p class=\"elementor-image-box-description\">Le grandi aziende, che hanno decine o centinaia di dipendenti, magari suddivise in diverse sedi, dovrebbero prestare molta attenzione alle informazioni che sono comunicate telefonicamente. Sono noti i casi di hacker che fingendosi nuovi assunti di altre sedi riuscivano a farsi rivelare password di accesso o codici di sicurezza.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5c0743d7\" data-id=\"5c0743d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69a86b7d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"69a86b7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital.png\" class=\"attachment-full size-full wp-image-12332\" alt=\"Social Engineering via web\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/digital-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Assistenza online<\/span><p class=\"elementor-image-box-description\">Queste tecniche rientrano nel campo del <a href=\"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/\" target=\"_blank\">phishing<\/a>, per cui abbiamo un servizio dedicato. Si tratta di email, pagine web o comunque siti internet che assomigliano a portali legittimi, ma sono invece opera di hacker, che tramite queste copie riescono a ingannare gli utenti a far scaricare malware o a far inserire le proprie credenziali.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-37aaf22 elementor-widget elementor-widget-heading\" data-id=\"37aaf22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Come prevenire<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5517f962 elementor-widget elementor-widget-text-editor\" data-id=\"5517f962\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Per fortuna la protezione per questo tipo di attacchi non \u00e8 complicata e non costa molto, bisogna puntare sulla formazione dei dipendenti e degli utenti aziendali in generale.<\/p><p>Noi possiamo aiutarti mettendo alla prova la tua azienda e rivelando i punti deboli. Sar\u00e0 poi pi\u00f9 semplice mettere in pratica una strategia di prevenzione proattiva. <strong>Contattaci per maggiori informazioni!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5776ba24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5776ba24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-38addea6\" data-id=\"38addea6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-250c70a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"250c70a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5b8a48 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5b8a48\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19011fd\" data-id=\"19011fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e3743c elementor-widget elementor-widget-menu-anchor\" data-id=\"4e3743c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"rogueap\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f4a37fa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3f4a37fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f4781 elementor-widget elementor-widget-heading\" data-id=\"c5f4781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Installazione di Rogue Access Point<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-456ffd3 elementor-widget elementor-widget-text-editor\" data-id=\"456ffd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Una delle pi\u00f9 comuni minacce alla sicurezza wireless \u00e8 il rogue access point, usato in molti attacchi.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9f17f43 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9f17f43\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-91b49a9\" data-id=\"91b49a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21de4e1 elementor-widget elementor-widget-image\" data-id=\"21de4e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"1024\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/RogueAP-771x1024.jpg\" class=\"attachment-large size-large wp-image-12353\" alt=\"Rogue AP concept\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/RogueAP-771x1024.jpg 771w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/RogueAP-226x300.jpg 226w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/RogueAP-768x1019.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/RogueAP.jpg 904w\" sizes=\"(max-width: 771px) 100vw, 771px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-97653a0\" data-id=\"97653a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a87668 elementor-widget elementor-widget-text-editor\" data-id=\"8a87668\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Per definizione un <em>rogue AP<\/em> si presenta come un punto d&#8217;accesso wireless che non fa parte della rete, ma potrebbe avere lo stesso nome della rete aziendale. Uno degli usi pi\u00f9 comuni di un Rogue AP \u00e8 quello di <strong>sostituirsi alla linea aziendale con una SSID identica <\/strong>(o apparentemente legittima). In questo modo i computer si collegano ad essa pensando di essere nella linea sicura dell&#8217;azienda e si comportano di conseguenza, abbassando la guardia.<\/p><p>Il rischio \u00e8 che questi access point potrebbero essere usati per il furto di informazioni sensibili, quali password e dati degli utenti. Questi dati rubati possono poi essere usati per accedere alla vera rete aziendale per compiere attacchi mirati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78bb634 elementor-widget elementor-widget-text-editor\" data-id=\"78bb634\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Con il nostro intervento possiamo individuare e analizzare i Rogue AP per poi prendere provvedimenti per mitigare il rischio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4dc7c0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a4dc7c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18c67e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18c67e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f9bebd\" data-id=\"2f9bebd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdbcb97 elementor-widget elementor-widget-menu-anchor\" data-id=\"bdbcb97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"catturadati\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b879286 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b879286\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a150c12 elementor-widget elementor-widget-heading\" data-id=\"a150c12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cattura di dati sensibili sulla rete<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bb3b7a elementor-widget elementor-widget-text-editor\" data-id=\"5bb3b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Con l&#8217;uso sempre maggiore delle reti pubbliche o casalinghe, il rischio di offrire i propri dati inconsapevolmente \u00e8 aumentato molto. Senza una <a href=\"https:\/\/www.cyberfero.com\/it\/vpn-aziendali-saas\/\">VPN aziendale<\/a> o comunque una cifratura della comunicazione, il furto di dati provenienti da comunicazioni tra dispositivi \u00e8 un rischio concreto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e850d02 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e850d02\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f91f349\" data-id=\"f91f349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3c851e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e3c851e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker.png\" class=\"attachment-full size-full wp-image-12355\" alt=\"sicurezza fisica man in the middle\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/018-hacker-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\"><i>Man in the Middle<\/i><\/span><p class=\"elementor-image-box-description\">Con <b>Man in the Middle<\/b> si intende un tipo di attacchi con il quale l'hacker ritrasmette o altera i messaggi tra due utenti o macchine, ottenendo dalle risposte dei dati sensibili.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ed905de\" data-id=\"ed905de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c25e8f9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c25e8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router.png\" class=\"attachment-full size-full wp-image-12357\" alt=\"Sicurezza fisica Wireless sniffing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/046-router-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\"><i>Wireless Sniffing<\/i><\/span><p class=\"elementor-image-box-description\">Analogamente agli attacchi <i>Man in the middle<\/i>, lo <b>sniffing<\/b> di una rete wifi intercetta i pacchetti tra i computer collegati e l'access point per poi cercare di decifrarli per ottenere dati sensibili.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9d9605 elementor-widget elementor-widget-text-editor\" data-id=\"a9d9605\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In entrambi i casi, noi di SOD offriamo un <strong>servizio di test<\/strong> alla risposta di questo tipo di attacchi. Non ci limitiamo, per\u00f2, nel provare a mettere in pratica <em>questi<\/em> attacchi. Tra i servizi di test con attacchi <a href=\"#inloco\"><em>in loco<\/em><\/a>, proponiamo anche un test sui dispositivi collegati solamente alle reti interne, come possono essere telecamere wifi a circuito chiuso e altri dispositivi IoT.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4283b95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4283b95\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-400b426\" data-id=\"400b426\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d3b271 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8d3b271\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-843804a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"843804a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0216f7\" data-id=\"c0216f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac0248c elementor-widget elementor-widget-menu-anchor\" data-id=\"ac0248c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"inloco\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee368df elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ee368df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60032a4 elementor-widget elementor-widget-heading\" data-id=\"60032a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attacchi in loco<br \/><small>Manomissione rete, Tailgating, Shoulder surfing<\/small><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a1400 elementor-widget elementor-widget-text-editor\" data-id=\"a5a1400\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Non sono solo le reti wifi a proteggere un&#8217;azienda, ma anche le infrastrutture fisiche<\/strong>. Con questi tipo di attacchi si sfruttano debolezze del personale di sorveglianza, della sicurezza delle centraline di rete ma anche del modo in cui vengono usati i dispositivo informatici dai dipendenti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bbc238f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbc238f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2ce3672\" data-id=\"2ce3672\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcb0350 elementor-widget elementor-widget-image-box\" data-id=\"dcb0350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Manomissione delle rete<\/span><p class=\"elementor-image-box-description\">Le aziende sono collegate alla rete telefonica e di internet come ogni altro edificio. Se si riesce ad avere accesso alle centraline e quindi alle <b>connessioni fisiche<\/b> dei cavi, \u00e8 possibile installare dei dispositivi di intercettazione dei dati passanti per uno specifico cavo. L'accesso al cavo pu\u00f2 avvenire per forzatura o sfruttando il <i>tailgating<\/i>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-cbbc6fa\" data-id=\"cbbc6fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-711cdc0 elementor-widget elementor-widget-image-box\" data-id=\"711cdc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Tailgating<\/span><p class=\"elementor-image-box-description\">Questa tecnica, usatissima nelle metropolitane di Londra e New York, consiste nell'<b>entrare in un edificio accodandosi a un dipendente<\/b> e sfruttando quel brevissimo lasso di tempo in cui la porta si sta chiudendo per evitare di usare campanelli o badge. Una volta dentro, le possibilit\u00e0 di attacco diventano molteplici. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6cd01cf\" data-id=\"6cd01cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a86ff04 elementor-widget elementor-widget-image-box\" data-id=\"a86ff04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\"><i>Shoulder Surfing<\/i><\/span><p class=\"elementor-image-box-description\">Questa tecnica consiste nello spiare un utente che digita una password o un codice di accesso per poi riutilizzarlo in seguito. Per esempio: se le porte dell'azienda sono protette da un codice, potrebbe essere semplice aspettare che un dipendenti lo inserisca e guardare quali cifre compongono il codice. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c38b448 elementor-widget elementor-widget-text-editor\" data-id=\"c38b448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Solitamente non \u00e8 sufficiente mettere in pratica <strong>una sola tecnica<\/strong> per completare un attacco, ma non \u00e8 difficile usarne pi\u00f9 di una per ottenere risultati sorprendenti.<\/p><p>Per proteggere <em>in modo completo<\/em> la vostra azienda, <strong>bisogna pensare anche a questo tipo di attacchi che possono essere estremamente subdoli e difficilmente intercettabili<\/strong>, facendo leva sull&#8217;empatia dei dipendenti e sulle debolezze fisiche dell&#8217;azienda. Con i test di penetrazione fisica offerti da SOD, si individuano i punti deboli per prendere provvedimenti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ce4f384 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce4f384\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-dd61a7a\" data-id=\"dd61a7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b83ea95 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"b83ea95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6405210 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6405210\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d2fef6\" data-id=\"1d2fef6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a7dc07 elementor-widget elementor-widget-menu-anchor\" data-id=\"8a7dc07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"dumpster\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24fdd82 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"24fdd82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49bde46 elementor-widget elementor-widget-heading\" data-id=\"49bde46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dumpster diving<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fe48eb elementor-widget elementor-widget-text-editor\" data-id=\"0fe48eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il <em>dumpster diving<\/em>, chiamato anche <em>trashing<\/em> o <em>information diving<\/em>, \u00e8 la pratica di setacciare i rifiuti in cerca di documenti o dati sensibili che possono poi essere usati per compiere attacchi informatici.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fcd81f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fcd81f7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8928c25\" data-id=\"8928c25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e682f2b elementor-widget elementor-widget-text-editor\" data-id=\"e682f2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quando si parla di <em>sicurezza fisica<\/em>, questo \u00e8 un fattore che spesso si tende a scordare, ma ogni documento ufficiale contiene informazioni riservate come l&#8217;indirizzo personale, il numero del conto corrente, il codice fiscale o altro.\u00a0<\/p><p>Con questo tipo di informazioni non \u00e8 complicato rubare l&#8217;identit\u00e0 del malcapitato a cui sono state sottratte. Se succedesse in azienda? <strong>Cosa potrebbe succedere se i dati bancari, codici di sicurezza o altre informazioni riservate e di valore cadessero in mani sbagliate?\u00a0<\/strong><\/p><p>Non sarebbe bello scoprirlo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d5c90a4\" data-id=\"d5c90a4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cc07d7 elementor-widget elementor-widget-image\" data-id=\"7cc07d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/sicurezza-fisica-dumpster-diving-1024x681.jpg\" class=\"attachment-large size-large wp-image-12372\" alt=\"Sicurezza fisica dumpster diving\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/sicurezza-fisica-dumpster-diving-1024x681.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/sicurezza-fisica-dumpster-diving-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/sicurezza-fisica-dumpster-diving-768x511.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/sicurezza-fisica-dumpster-diving.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ade1086 elementor-widget elementor-widget-text-editor\" data-id=\"ade1086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Anche questa possibilit\u00e0 \u00e8 presa in considerazione con i nostri servizi aggiuntivi al <strong>Vulnerability Assessment e Penetration Test<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5287244 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5287244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14d47377 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14d47377\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38ed02b0\" data-id=\"38ed02b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50882272 elementor-widget elementor-widget-menu-anchor\" data-id=\"50882272\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contatti\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34b849ef elementor-widget elementor-widget-heading\" data-id=\"34b849ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contattaci per maggiori informazioni<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-73e3bb13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73e3bb13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f9c0636\" data-id=\"f9c0636\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-69fe2ba9\" data-id=\"69fe2ba9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30b4f813 elementor-widget elementor-widget-text-editor\" data-id=\"30b4f813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Siamo a disposizione per rispondere alle tue domande e valutare insieme la tua situazione per offrirti i servizi migliori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5e487e elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"e5e487e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Successivo&quot;,&quot;step_previous_label&quot;:&quot;Precedente&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Modulo Ethical Phishing\" aria-label=\"Modulo Ethical Phishing\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"12310\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"e5e487e\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Sicurezza fisica: add on al servizio VA&amp;PT\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"12310\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_59dadd9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_59dadd9\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefono\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_59dadd9]\" id=\"form-field-field_59dadd9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessaggio\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" required=\"required\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_c91a287 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_c91a287]\" id=\"form-field-field_c91a287\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_c91a287\">Con il presente modulo accetto i termini della <a href=\"https:\/\/www.cyberfero.com\/it\/informativa-privacy\/\" target=\"_blank\">privacy policy<\/a><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_5fbe410 elementor-col-100 recaptcha_v3-bottomleft\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_5fbe410\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Lc76NApAAAAAPlpHmqDBJPueP6IEqBWw3m9wdyl\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomleft\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contattaci<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-34743e3\" data-id=\"34743e3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Add on di sicurezza fisica per il servizio diVulnerability Assessment e Penetration Test Testiamo in modo completo la sicurezza fisica della tua azienda Vogliamo offrire un servizio completo per la sicurezza professionale. Per questo non possiamo trascurare gli attacchi che sfruttano tecniche di ingegneria sociale e manomissione fisica dei sistemi.\u00a0 Tramite questi add on ai servizi di Vulnerability Assessment e&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":8606,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-12310","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sicurezza fisica: add on al servizio VA&amp;PT<\/title>\n<meta name=\"description\" content=\"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicurezza fisica: add on al servizio VA&amp;PT\" \/>\n<meta property=\"og:description\" content=\"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyberfero\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T22:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/\",\"name\":\"Sicurezza fisica: add on al servizio VA&PT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/007-criminal.png\",\"datePublished\":\"2021-01-29T19:10:50+00:00\",\"dateModified\":\"2024-05-07T22:46:06+00:00\",\"description\":\"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/007-criminal.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/007-criminal.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Assessment e Penetration test\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sicurezza fisica: add on al servizio VA&#038;PT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/vulnerability-assessment-e-penetration-test\\\/sicurezza-fisica-add-on-al-servizio-vapt\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sicurezza fisica: add on al servizio VA&PT","description":"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/","og_locale":"it_IT","og_type":"article","og_title":"Sicurezza fisica: add on al servizio VA&PT","og_description":"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.","og_url":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/","og_site_name":"Cyberfero","article_publisher":"https:\/\/www.facebook.com\/Cyberfero","article_modified_time":"2024-05-07T22:46:06+00:00","og_image":[{"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@secureod","twitter_misc":{"Tempo di lettura stimato":"10 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/","url":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/","name":"Sicurezza fisica: add on al servizio VA&PT","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png","datePublished":"2021-01-29T19:10:50+00:00","dateModified":"2024-05-07T22:46:06+00:00","description":"Una delle maggiori debolezze dei sistemi informatici sono proprio gli utenti. Proteggiti con gli add on per la sicurezza fisica aziendale.","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#primaryimage","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Assessment e Penetration test","item":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/"},{"@type":"ListItem","position":3,"name":"Sicurezza fisica: add on al servizio VA&#038;PT"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/comments?post=12310"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12310\/revisions"}],"predecessor-version":[{"id":19334,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12310\/revisions\/19334"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/8606"}],"wp:attachment":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/media?parent=12310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}