{"id":24080,"date":"2023-01-04T18:07:06","date_gmt":"2023-01-04T18:07:06","guid":{"rendered":"http:\/\/35.157.126.229\/second-level-modules\/"},"modified":"2024-09-09T08:46:25","modified_gmt":"2024-09-09T08:46:25","slug":"cyber-guru-awareness-second-level-modules","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/","title":{"rendered":"Second-level modules"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_margin=&#8221;150px||||false|false&#8221; custom_padding=&#8221;|||10%|false|false&#8221; custom_padding_tablet=&#8221;|||10%|false|false&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;42px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Second-level modules<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Security Awareness Training \/ <span style=\"color: #f18a00;\">Second-level modules<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/13-clean-desk.webp&#8221; title_text=&#8221;clean-desk&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A basic step to ensure information security, data protection and compliance with privacy regulations involves paying particular attention to your workstation and not leaving critical or even sensitive information available for unauthorised people to access.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/14-smart-working.webp&#8221; title_text=&#8221;smart-working&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>With the widespread use of smart working, meaning mainly teleworking or remote work, it has become necessary to focus attention on this particular issue. Working outside the reassuring walls of the office exposes all users to increased cyber risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/15-social-collaboration.webp&#8221; title_text=&#8221;social-collaboration&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Smart working has generated a rapid increase in the use of information-sharing and collaboration tools, among all videoconferencing tools. This use has gone beyond the professional dimension to definitively take hold in the personal sphere, with many associated risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/19-Smishing-Vishing-new.webp&#8221; title_text=&#8221;19 Smishing &#038; Vishing new&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>This is another particular Phishing technique that strikes through messaging systems such as WhatsApp, Messenger, Telegram and SMS, or telephony systems. To understand how even messaging systems \u2013 in some ways considered &#8220;secure&#8221; \u2013 can hide dangerous pitfalls.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/18-spear-phishing.webp&#8221; title_text=&#8221;18-spear-phishing&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We return to the topic of Phishing with Spear Phishing, <span>a sophisticated technique that affects a specific individual or a specific group of individuals. In this type of attack, the emphasis is on those preparatory techniques needed to collect sensitive information through deception.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/18-ransomware.webp&#8221; title_text=&#8221;ransomware&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This is the most insidious form of malware, which causes the most damage and blackmails individuals and organisations with no easy way out. <span>This technique is increasingly widespread and aggressive, and in recent times has been used in a growing number of serious attacks.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/19-multi-factor-authentication.webp&#8221; title_text=&#8221;19-multi-factor-authentication&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Encouraging the use<\/span><span> of the most advanced authentication systems helps both to strengthen the overall level of security of individuals and organisations, and to inform users about the new techniques hackers employ to overcome these systems, leveraging the human factor. <\/span> <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/fake-news.webp&#8221; title_text=&#8221;fake-news&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]FAKE NEWS is a dangerous phenomenon that can have negative repercussions both for individuals and for organisations. To defend yourself, it is essential to recognise fake news through an investigative approach that helps correctly assess any information found online.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/16-iot-device.webp&#8221; title_text=&#8221;iot-device&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Household appliances, cameras, wearable devices, increasingly smart cars: even &#8216;things&#8217; are destined to communicate more and more. If appropriate behaviours are not adopted, each interconnected device can become a potential security vulnerability. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/22-bluetooth-wifi.webp&#8221; title_text=&#8221;bluetooth-wifi&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>These two technological components are now indispensable to ensure connection on the move, personal mobility and digital transformation, but they can conceal pitfalls if users do not adopt an informed attitude.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/15-information-classification.webp&#8221; title_text=&#8221;information-classification&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Information classification is one of the key factors in information security management, but also one of the least understood by users. It is <span>essential not only to comply with standards and regulations but also to protect Personal Identifiable Information.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/23-data-protection.webp&#8221; title_text=&#8221;data-protection&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We are back to talking about data protection with a view to security, more specifically Privacy and the relationship with various quality and information security regulations, especially the GDPR. We deal with <span>original and more sophisticated content than in the first level.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8221; alt=&#8221;More&#8221; title_text=&#8221;More&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-200px&#8221; horizontal_offset=&#8221;85px&#8221; vertical_offset_tablet=&#8221;-55px&#8221; vertical_offset_phone=&#8221;-90px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-55px&#8221; horizontal_offset_phone=&#8221;-50px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; position_origin_a_tablet=&#8221;top_left&#8221; position_origin_a_phone=&#8221;top_left&#8221; position_origin_a_last_edited=&#8221;on|phone&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|phone&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|phone&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;absolute&#8221; positioning_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Line&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;70px|170px|0px|170px|false|true&#8221; custom_padding_tablet=&#8221;|100px||100px|false|true&#8221; custom_padding_phone=&#8221;70px|20px|0px|20px|false|true&#8221; border_radii=&#8221;off|10px|10px||&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik|300|||||||&#8221; text_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Inter|700|||||||&#8221; header_2_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;58px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;48px&#8221; header_2_font_size_phone=&#8221;32px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_line_height_tablet=&#8221;58px&#8221; header_2_line_height_phone=&#8221;35px&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Want to know more?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_tablet=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|70px|0px|false|true&#8221; border_radii=&#8221;off|||15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;1px&#8221; box_shadow_vertical=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIzMTQ3In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DOWNLOAD PRESENTATION&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;REQUEST DEMO&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8221; alt=&#8221;Want to know&#8221; title_text=&#8221;Want to know&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-20px&#8221; horizontal_offset=&#8221;-100px&#8221; vertical_offset_tablet=&#8221;-20px&#8221; vertical_offset_phone=&#8221;-80px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-100px&#8221; horizontal_offset_phone=&#8221;-130px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;25%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Second-level modulesSecurity Awareness Training \/ Second-level modulesA basic step to ensure information security, data protection and compliance with privacy regulations involves paying particular attention to your workstation and not leaving critical or even sensitive information available for unauthorised people to access.With the widespread use of smart working, meaning mainly teleworking or remote work, it has [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24080","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Second-level modules - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Second-level modules\" \/>\n<meta property=\"og:description\" content=\"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T08:46:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-second-level-modules\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-second-level-modules\\\/\",\"name\":\"Second-level modules - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"datePublished\":\"2023-01-04T18:07:06+00:00\",\"dateModified\":\"2024-09-09T08:46:25+00:00\",\"description\":\"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-second-level-modules\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-second-level-modules\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-second-level-modules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Second-level modules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Second-level modules - Cyber Guru","description":"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/","og_locale":"en_US","og_type":"article","og_title":"Second-level modules","og_description":"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.","og_url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T08:46:25+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/","url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/","name":"Second-level modules - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"datePublished":"2023-01-04T18:07:06+00:00","dateModified":"2024-09-09T08:46:25+00:00","description":"Protect your sensitive information with security awareness training. Find out how second-level forms can help you prevent phishing attacks and protect your data.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-second-level-modules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Second-level modules"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=24080"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24080\/revisions"}],"predecessor-version":[{"id":39600,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24080\/revisions\/39600"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=24080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}