{"id":17495,"date":"2022-04-24T13:49:00","date_gmt":"2022-04-24T13:49:00","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=17495"},"modified":"2023-05-09T16:04:58","modified_gmt":"2023-05-09T16:04:58","slug":"for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/","title":{"rendered":"For an increasingly dark web, the only defence is quality training: here are our best practices."},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><strong>Our best practices for a more secure 2022<\/strong><\/h2>\n<\/p>\n<p>Cyber attacks are the world&#8217;s most dangerous weapon. <strong>JP Morgan<\/strong> did not hold back on 16 December at its International Council. At the annual conference of the <em>European Systemic Risk Board<\/em>, Christine Lagarde spoke of cybercrime as the greatest threat to financial stability. Knowing your best practices is key.<\/p>\n<\/p>\n<p>The study produced by <strong>IBM security<\/strong>, Cost of a Data Breach Report 2021, showed that in the last year, cyber security attacks led to the highest costs ever associated with data breaches in the report&#8217;s 17-year history, <strong>with an average of $4.24 million per incident. <\/strong>According to the study, this escalation is mainly due to the reorganisation of remote work following the pandemic.<\/p>\n<\/p>\n<h5><strong>Which are the victims of the main cyber attacks<\/strong><\/h5>\n<\/p>\n<p>In 2021, Italy suffered <strong>5,434 significant cyber attacks against IT services<\/strong>, critical infrastructures of national interest, sensitive infrastructures of regional interest and large enterprises. Such numbers come from the study of the Postal Police, <strong>Cnaipic<\/strong>, the National Cybercrime Centre for Infrastructure Protection. It also issued 110,524 security alerts on possible cyber threats and received 60 requests for international cooperation.<\/p>\n<\/p>\n<p>Same numbers apply to <strong>financial cybercrime<\/strong>. In 2021, there were 126 cyber attacks on the financial systems of large and medium-sized enterprises. Suche number result in a total of more than <strong>36 million euros stolen<\/strong>.<\/p>\n<\/p>\n<h5><strong>Known techniques, but still very effective\u00a0<\/strong>\u00a0<\/h5>\n<\/p>\n<p>We witnessed and increase of 27% of <strong>phishing<\/strong>, <strong>smishing<\/strong> and <strong>vishing<\/strong> in Italy. This resulted in a total of over 18,000 cases of theft of home banking credentials, credit card numbers and private keys to cryptocurrency wallets: 781 people have been investigated for such crimes.<\/p>\n<\/p>\n<p>Furthermore, in the first 11 months of 2021, the total number of <strong>targeted ransomware attacks<\/strong> increased by 81%, compared to the same period in 2020.<\/p>\n<\/p>\n<p>These are scary figures, but they should not take us by surprise. After all, already a year ago, in January 2021, the <strong>World Economic Forum&#8217;s Global Risk Report in Davos<\/strong> revealed that cyber risk is one of the ten greatest dangers to the planet and its greatest nourishment lies in the unpreparedness of users and especially businesses.<\/p>\n<\/p>\n<p>There is a solution, and it has only one name: <strong>training<\/strong>.<\/p>\n<\/p>\n<h5><strong>3 best practices of Cyber Security Awareness<\/strong><\/h5>\n<\/p>\n<p>We believe that a Cyber Security Awareness course should be part of every good business resolution for the new year. An effective and engaging training course capable of truly securing data and economic resources. In this regard, we have selected three good practices to start 2022.<\/p>\n<\/p>\n<h6><strong>1. Involve all staff in the fight against cyber crime<\/strong><\/h6>\n<\/p>\n<p>In every company, employees are key to stopping the spread of cyber attacks.\u00a0 It is they who are most likely to fall for increasingly ingenious scams, opening the door to cyber crime. Phishing, stolen credentials, social media scams, and so on, can be just the beginning of a bigger nightmare.<\/p>\n<\/p>\n<p>Making Cyber Security Awareness training a priority, so that everyone in your company can acquire a real culture of cyber security, is therefore crucial. Training will be necessary for all employees, from the low tier to top management, to prevent even one click from causing serious damage to everyone<\/p>\n<\/p>\n<h6><strong>2. Prioritise automated Cyber Security Awareness training courses<\/strong><\/h6>\n<\/p>\n<p>The automation of Cyber Security Awareness training programmes must be considered a key element. This ix fundamental for effectively conveying targeted and quality content. Automation doesn&#8217;t only mean to benefit from the analysis of all the metrics needed to optimise training, but also having all the automatic tools needed to encourage participation and involvement of all users.<\/p>\n<\/p>\n<p>It is therefore essential not to underestimate the importance of automation. Automation ensures maximum training effectiveness in training the awareness, responsiveness and resistance of individuals and organisations to cyber attacks, with minimum organisational effort.<\/p>\n<\/p>\n<h6><strong>3. Choosing continuous training to maximise investment<\/strong><\/h6>\n<\/p>\n<p>Continuous training is characterised by the distribution of the entire training course in micro sessions. This learning technique is among the best known and best known in the field of memory science. It is called the &#8220;distributed learning&#8221; technique, commonly known as the &#8220;spacing effect&#8221;. It consists of diluting the time spent studying by breaking it up into several micro sessions rather than concentrating it in one or a few longer sessions. The effect is a greater capacity to learn and retain knowledge in the memory, which can even double in certain situations.<\/p>\n<\/p>\n<p>Safeguarding investment in training therefore means avoiding classic training methods concentrated in a few long sessions, and favouring more effective methods instead. In order to train the entire workforce to recognise and manage cyber attacks, it will be crucial to use learning techniques and methodologies that are recognised as being among the most effective and reliable.<strong><\/strong><\/p>\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our best practices for a more secure 2022 Cyber attacks are the world&#8217;s most dangerous weapon. JP Morgan did not hold back on 16 December at its International Council. At the annual conference of the European Systemic Risk Board, Christine Lagarde spoke of cybercrime as the greatest threat to financial stability. Knowing your best practices [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":17496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:heading -->\n<h2><strong>Our best practices for a more secure 2022<\/strong><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Cyber attacks are the world's most dangerous weapon. <strong>JP Morgan<\/strong> did not hold back on 16 December at its International Council. At the annual conference of the <em>European Systemic Risk Board<\/em>, Christine Lagarde spoke of cybercrime as the greatest threat to financial stability. Knowing your best practices is key.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The study produced by <strong>IBM security<\/strong>, Cost of a Data Breach Report 2021, showed that in the last year, cyber security attacks led to the highest costs ever associated with data breaches in the report's 17-year history, <strong>with an average of $4.24 million per incident. <\/strong>According to the study, this escalation is mainly due to the reorganisation of remote work following the pandemic.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>Which are the victims of the main cyber attacks<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>In 2021, Italy suffered <strong>5,434 significant cyber attacks against IT services<\/strong>, critical infrastructures of national interest, sensitive infrastructures of regional interest and large enterprises. Such numbers come from the study of the Postal Police, <strong>Cnaipic<\/strong>, the National Cybercrime Centre for Infrastructure Protection. It also issued 110,524 security alerts on possible cyber threats and received 60 requests for international cooperation.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Same numbers apply to <strong>financial cybercrime<\/strong>. In 2021, there were 126 cyber attacks on the financial systems of large and medium-sized enterprises. Suche number result in a total of more than <strong>36 million euros stolen<\/strong>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>Known techniques, but still very effective&nbsp;<\/strong>&nbsp;<\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>We witnessed and increase of 27% of <strong>phishing<\/strong>, <strong>smishing<\/strong> and <strong>vishing<\/strong> in Italy. This resulted in a total of over 18,000 cases of theft of home banking credentials, credit card numbers and private keys to cryptocurrency wallets: 781 people have been investigated for such crimes.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Furthermore, in the first 11 months of 2021, the total number of <strong>targeted ransomware attacks<\/strong> increased by 81%, compared to the same period in 2020.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>These are scary figures, but they should not take us by surprise. After all, already a year ago, in January 2021, the <strong>World Economic Forum's Global Risk Report in Davos<\/strong> revealed that cyber risk is one of the ten greatest dangers to the planet and its greatest nourishment lies in the unpreparedness of users and especially businesses. <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>There is a solution, and it has only one name: <strong>training<\/strong>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5><strong>3 best practices of Cyber Security Awareness<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>We believe that a Cyber Security Awareness course should be part of every good business resolution for the new year. An effective and engaging training course capable of truly securing data and economic resources. In this regard, we have selected three good practices to start 2022.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":6} -->\n<h6><strong>1. Involve all staff in the fight against cyber crime<\/strong><\/h6>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>In every company, employees are key to stopping the spread of cyber attacks.&nbsp; It is they who are most likely to fall for increasingly ingenious scams, opening the door to cyber crime. Phishing, stolen credentials, social media scams, and so on, can be just the beginning of a bigger nightmare.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Making Cyber Security Awareness training a priority, so that everyone in your company can acquire a real culture of cyber security, is therefore crucial. Training will be necessary for all employees, from the low tier to top management, to prevent even one click from causing serious damage to everyone<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":6} -->\n<h6><strong>2. Prioritise automated Cyber Security Awareness training courses<\/strong><\/h6>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>The automation of Cyber Security Awareness training programmes must be considered a key element. This ix fundamental for effectively conveying targeted and quality content. Automation doesn't only mean to benefit from the analysis of all the metrics needed to optimise training, but also having all the automatic tools needed to encourage participation and involvement of all users.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It is therefore essential not to underestimate the importance of automation. Automation ensures maximum training effectiveness in training the awareness, responsiveness and resistance of individuals and organisations to cyber attacks, with minimum organisational effort.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":6} -->\n<h6><strong>3. Choosing continuous training to maximise investment<\/strong><\/h6>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Continuous training is characterised by the distribution of the entire training course in micro sessions. This learning technique is among the best known and best known in the field of memory science. It is called the \"distributed learning\" technique, commonly known as the \"spacing effect\". It consists of diluting the time spent studying by breaking it up into several micro sessions rather than concentrating it in one or a few longer sessions. The effect is a greater capacity to learn and retain knowledge in the memory, which can even double in certain situations.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Safeguarding investment in training therefore means avoiding classic training methods concentrated in a few long sessions, and favouring more effective methods instead. In order to train the entire workforce to recognise and manage cyber attacks, it will be crucial to use learning techniques and methodologies that are recognised as being among the most effective and reliable.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:group {\"backgroundColor\":\"very-light-gray\"} -->\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a aria-label=\" (apre in una nuova scheda)\" rel=\"noreferrer noopener\" href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\"><strong>To learn more about Cyber Guru Awareness <\/strong><\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-phishing\/\"><strong>To learn more about Cyber Guru Phishing<\/strong><\/a>  <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"center\",\"textColor\":\"luminous-vivid-orange\"} -->\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><a href=\"https:\/\/www.cyberguru.eu\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>To learn more about Cyber Guru Channel<\/strong><\/a><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[475,467,468,485],"class_list":["post-17495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-attacks-en","tag-cyber-crime-en-2","tag-cyber-security-en-2","tag-dark-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>For an increasingly dark web, the only defence is quality training: here are our best practices.<\/title>\n<meta name=\"description\" content=\"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"For an increasingly dark web, the only defence is quality training: here are our best practices.\" \/>\n<meta property=\"og:description\" content=\"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-24T13:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-09T16:04:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Cyber Guru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Guru\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/\"},\"author\":{\"name\":\"Cyber Guru\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"headline\":\"For an increasingly dark web, the only defence is quality training: here are our best practices.\",\"datePublished\":\"2022-04-24T13:49:00+00:00\",\"dateModified\":\"2023-05-09T16:04:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/\"},\"wordCount\":877,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/best-practice-cyber-security-awareness.webp\",\"keywords\":[\"Cyber attacks\",\"Cyber Crime\",\"Cyber Security\",\"dark web\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/\",\"name\":\"For an increasingly dark web, the only defence is quality training: here are our best practices.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/best-practice-cyber-security-awareness.webp\",\"datePublished\":\"2022-04-24T13:49:00+00:00\",\"dateModified\":\"2023-05-09T16:04:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\"},\"description\":\"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/best-practice-cyber-security-awareness.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/best-practice-cyber-security-awareness.webp\",\"width\":500,\"height\":290,\"caption\":\"best practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/04\\\/24\\\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"For an increasingly dark web, the only defence is quality training: here are our best practices.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/7ee941e099c92eb9ea57fceee4ec4736\",\"name\":\"Cyber Guru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g\",\"caption\":\"Cyber Guru\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/cyber-guru\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"For an increasingly dark web, the only defence is quality training: here are our best practices.","description":"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"For an increasingly dark web, the only defence is quality training: here are our best practices.","og_description":"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-04-24T13:49:00+00:00","article_modified_time":"2023-05-09T16:04:58+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp","type":"image\/webp"}],"author":"Cyber Guru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber Guru"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/"},"author":{"name":"Cyber Guru","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"headline":"For an increasingly dark web, the only defence is quality training: here are our best practices.","datePublished":"2022-04-24T13:49:00+00:00","dateModified":"2023-05-09T16:04:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/"},"wordCount":877,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp","keywords":["Cyber attacks","Cyber Crime","Cyber Security","dark web"],"articleSection":["Security Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/","name":"For an increasingly dark web, the only defence is quality training: here are our best practices.","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp","datePublished":"2022-04-24T13:49:00+00:00","dateModified":"2023-05-09T16:04:58+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736"},"description":"Our best practices for a safer 2022, which we hope will keep you as safe as possible from the risks of the dark web...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/08\/best-practice-cyber-security-awareness.webp","width":500,"height":290,"caption":"best practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/04\/24\/for-an-increasingly-dark-web-the-only-defence-is-quality-training-here-are-our-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"For an increasingly dark web, the only defence is quality training: here are our best practices."}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/7ee941e099c92eb9ea57fceee4ec4736","name":"Cyber Guru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5bcbfd3ec7ac7fa68adccd624c2ccab51a63012445e6ec3372c348524942a49?s=96&d=mm&r=g","caption":"Cyber Guru"},"url":"https:\/\/www.cyberguru.it\/en\/author\/cyber-guru\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=17495"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17495\/revisions"}],"predecessor-version":[{"id":30279,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/17495\/revisions\/30279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/17496"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=17495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=17495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=17495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}