{"id":24083,"date":"2023-01-04T18:21:55","date_gmt":"2023-01-04T18:21:55","guid":{"rendered":"http:\/\/35.157.126.229\/third-level-modules\/"},"modified":"2024-09-09T08:48:46","modified_gmt":"2024-09-09T08:48:46","slug":"cyber-guru-awareness-third-level-modules","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/","title":{"rendered":"Third-level modules"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_margin=&#8221;150px||||false|false&#8221; custom_padding=&#8221;|||10%|false|false&#8221; custom_padding_tablet=&#8221;|||10%|false|false&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;42px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Third-level modules<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Security Awareness Training \/ <span style=\"color: #f18a00;\">Third-level modules<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/28-real-scam.webp&#8221; title_text=&#8221;real-scam&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>By presenting some real cases of cyber scams, we want to promote awareness of how concrete the danger can be. We will also mention some best practices that would have prevented people falling victim to the scam.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/29-phone-scam.webp&#8221; title_text=&#8221;phone-scam&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Interactions between cyber techniques and more traditional ones like call ranking are known as combined attacks. The latter are particularly devious because they tend to undermine the distrust some individuals develop for digital communications and push the victim into making a mistake.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/26-social-cyberbullying.webp&#8221; title_text=&#8221;social-cyberbullying&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This <span>issue, which seems to concern strictly the personal sphere with a social and cultural character, may also have repercussions on security and lead to legal or image damage for your organisation.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/25-privacy.webp&#8221; title_text=&#8221;privacy&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The use of digital technologies, the web and social media comes at a price in terms of loss of privacy. An informed attitude in this regard enables us to enjoy a balanced relationship with innovation without sacrificing too much confidentiality.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/27-legal-aspect.webp&#8221; title_text=&#8221;legal-aspect&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Copyright infringement, non-compliance with regulations, unlawful use of software and defamation are just some examples of the legal aspects related to uninformed use of digital technologies and the risks of committing crimes, with a negative impact on people and the organisation. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/30-physical-security.webp&#8221; title_text=&#8221;physical-security&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Physical security also helps ensure the protection of individuals and organisations by preventing unauthorised access to premises, resources or information. Although physical security within organisations is governed by specific regulations, there are general rules and best practices to reduce risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/31-e-commerce.webp&#8221; title_text=&#8221;e-commerce&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The risks increase, as does the extent of potential harm, when an activity is directly linked to a flow of money as in the case of e-commerce. We address the issue by considering the various types of e-commerce, from B2C to B2B, with the greatest impact on the organisation.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/32-holiday-business-trip.webp&#8221; title_text=&#8221;holiday-business-trip&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Our cyber vulnerability always increases in situations such as organising holidays and business trips. We address the issue by aiming to cover the entire event cycle, from planning to returning home or to the office, and taking a good look at all the risks involved in each phase.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/33-cyber-hygiene.webp&#8221; title_text=&#8221;cyber-hygiene&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Keeping devices in a proper state of hygiene helps to achieve greater productivity, but above all reduces information security risks. A set of best practices on how to maintain proper hygiene of our devices and data.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/34-backup-restore.webp&#8221; title_text=&#8221;backup-restore&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The right data backup and recovery strategy protects us from the risk of suffering damage in the event of a cyber attack. It is a defence weapon that prevents our device from being held to ransom or losing important data in the face of a trivial technological incident.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/24-social-engineering-2.webp&#8221; title_text=&#8221;24-social-engineering-2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>We talk again about Social Engineering, starting with some examples taken from reality. This provides additional elements of awareness about Cyber Crime techniques, neatly summarising elements already covered in the third-level modules.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/35-best-practice.webp&#8221; title_text=&#8221;best-practice&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]The entire training course is focused on best practices, understood as virtuous behaviours that can mitigate cyber risks. This module summarises the concept by emphasising 12 best practices that can concretely help reduce cyber risk.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8221; alt=&#8221;More&#8221; title_text=&#8221;More&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-200px&#8221; horizontal_offset=&#8221;85px&#8221; vertical_offset_tablet=&#8221;-55px&#8221; vertical_offset_phone=&#8221;-90px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-55px&#8221; horizontal_offset_phone=&#8221;-50px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; position_origin_a_tablet=&#8221;top_left&#8221; position_origin_a_phone=&#8221;top_left&#8221; position_origin_a_last_edited=&#8221;on|phone&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|phone&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|phone&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;absolute&#8221; positioning_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Line&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;70px|170px|0px|170px|false|true&#8221; custom_padding_tablet=&#8221;|100px||100px|false|true&#8221; custom_padding_phone=&#8221;70px|20px|0px|20px|false|true&#8221; border_radii=&#8221;off|10px|10px||&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik|300|||||||&#8221; text_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Inter|700|||||||&#8221; header_2_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;58px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;48px&#8221; header_2_font_size_phone=&#8221;32px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_line_height_tablet=&#8221;58px&#8221; header_2_line_height_phone=&#8221;35px&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Want to know more?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_tablet=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|70px|0px|false|true&#8221; border_radii=&#8221;off|||15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;1px&#8221; box_shadow_vertical=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIzMTQ3In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DOWNLOAD PRESENTATION&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;REQUEST DEMO&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8221; alt=&#8221;Want to know&#8221; title_text=&#8221;Want to know&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-20px&#8221; horizontal_offset=&#8221;-100px&#8221; vertical_offset_tablet=&#8221;-20px&#8221; vertical_offset_phone=&#8221;-80px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-100px&#8221; horizontal_offset_phone=&#8221;-130px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;25%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Third-level modulesSecurity Awareness Training \/ Third-level modulesBy presenting some real cases of cyber scams, we want to promote awareness of how concrete the danger can be. We will also mention some best practices that would have prevented people falling victim to the scam.Interactions between cyber techniques and more traditional ones like call ranking are known [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24083","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Third-level modules - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization&#039;s reputation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Third-level modules\" \/>\n<meta property=\"og:description\" content=\"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization&#039;s reputation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T08:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-third-level-modules\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-third-level-modules\\\/\",\"name\":\"Third-level modules - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"datePublished\":\"2023-01-04T18:21:55+00:00\",\"dateModified\":\"2024-09-09T08:48:46+00:00\",\"description\":\"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization's reputation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-third-level-modules\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-third-level-modules\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-third-level-modules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Third-level modules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Third-level modules - Cyber Guru","description":"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization's reputation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/","og_locale":"en_US","og_type":"article","og_title":"Third-level modules","og_description":"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization's reputation.","og_url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T08:48:46+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/","url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/","name":"Third-level modules - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"datePublished":"2023-01-04T18:21:55+00:00","dateModified":"2024-09-09T08:48:46+00:00","description":"Discover the importance of security awareness training and its impact on preventing cyber scams and protecting your organization's reputation.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-third-level-modules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Third-level modules"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=24083"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24083\/revisions"}],"predecessor-version":[{"id":39601,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24083\/revisions\/39601"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=24083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}