{"id":28838,"date":"2023-03-08T16:05:54","date_gmt":"2023-03-08T16:05:54","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=28838"},"modified":"2024-05-02T15:52:48","modified_gmt":"2024-05-02T15:52:48","slug":"cyber-card-25-clean-desk","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/","title":{"rendered":"Cyber Card #25 &#8211; Clean Desk"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; min_height=&#8221;1363.1px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<!-- divi:columns --><\/p>\n<div class=\"wp-block-columns\">\n<p><!-- divi:column --><\/p>\n<div class=\"wp-block-column\">\n<p><!-- divi:paragraph -->How much sensitive information is available in a classic workstation? Actually, much more than you might imagine.<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph -->Being aware of a few good behavioural practices can help us reduce the risk of our sensitive data or that of our company falling into the hands of malicious attackers.<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph --><em><strong>This infographic will give you some useful tips to avoid being the one who provides useful information to hackers!<\/strong><\/em><em><strong><\/strong><\/em><\/p>\n<p><em><strong><\/strong><\/em><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:image {\"id\":28925,\"width\":823,\"height\":1164,\"sizeSlug\":\"large\",\"linkDestination\":\"media\"} --><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN.png\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><!-- \/divi:image --><\/p>\n<\/div>\n<p><!-- \/divi:column --><\/p>\n<\/div>\n<p><!-- \/divi:columns -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How much sensitive information is available in a classic workstation? Actually, much more than you might imagine. Being aware of a few good behavioural practices can help us reduce the risk of our sensitive data or that of our company falling into the hands of malicious attackers. This infographic will give you some useful tips [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":29653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[71,432],"tags":[487,585,470,637,165],"class_list":["post-28838","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-card","category-cyber-card-en","tag-cyber-awareness-en-2","tag-cyber-card-en","tag-cyber-security-awareness-en-3","tag-infografica-en","tag-infografica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #25 - Clean Desk<\/title>\n<meta name=\"description\" content=\"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #25 - Clean Desk\" \/>\n<meta property=\"og:description\" content=\"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-08T16:05:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T15:52:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"v.orefice\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"v.orefice\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/\"},\"author\":{\"name\":\"v.orefice\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\"},\"headline\":\"Cyber Card #25 &#8211; Clean Desk\",\"datePublished\":\"2023-03-08T16:05:54+00:00\",\"dateModified\":\"2024-05-02T15:52:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/\"},\"wordCount\":162,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25EN-1.png\",\"keywords\":[\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"infografica\",\"infografica\"],\"articleSection\":[\"Card\",\"Cyber Card\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/\",\"name\":\"Cyber Card #25 - Clean Desk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25EN-1.png\",\"datePublished\":\"2023-03-08T16:05:54+00:00\",\"dateModified\":\"2024-05-02T15:52:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\"},\"description\":\"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25EN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/25EN-1.png\",\"width\":1680,\"height\":945,\"caption\":\"Anteprima Cyber Card 25 inglese\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/03\\\/08\\\/cyber-card-25-clean-desk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #25 &#8211; Clean Desk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/cab21e2e908ff83a6249abef7122dab2\",\"name\":\"v.orefice\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g\",\"caption\":\"v.orefice\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/v-orefice\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #25 - Clean Desk","description":"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #25 - Clean Desk","og_description":"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...","og_url":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-03-08T16:05:54+00:00","article_modified_time":"2024-05-02T15:52:48+00:00","og_image":[{"width":1680,"height":945,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png","type":"image\/png"}],"author":"v.orefice","twitter_card":"summary_large_image","twitter_misc":{"Written by":"v.orefice","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/"},"author":{"name":"v.orefice","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2"},"headline":"Cyber Card #25 &#8211; Clean Desk","datePublished":"2023-03-08T16:05:54+00:00","dateModified":"2024-05-02T15:52:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/"},"wordCount":162,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png","keywords":["Cyber Awareness","cyber card","Cyber Security Awareness","infografica","infografica"],"articleSection":["Card","Cyber Card"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/","url":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/","name":"Cyber Card #25 - Clean Desk","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png","datePublished":"2023-03-08T16:05:54+00:00","dateModified":"2024-05-02T15:52:48+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2"},"description":"How much sensitive information is available in a classic workstation? Actually, much more than you might imagine...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/25EN-1.png","width":1680,"height":945,"caption":"Anteprima Cyber Card 25 inglese"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2023\/03\/08\/cyber-card-25-clean-desk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #25 &#8211; Clean Desk"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/cab21e2e908ff83a6249abef7122dab2","name":"v.orefice","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0c9b223bd0ab6d08fa346d70cc15fae682ef8494f09e5cbfa57536b5c3b4bb1?s=96&d=mm&r=g","caption":"v.orefice"},"url":"https:\/\/www.cyberguru.it\/en\/author\/v-orefice\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/28838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=28838"}],"version-history":[{"count":16,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/28838\/revisions"}],"predecessor-version":[{"id":29666,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/28838\/revisions\/29666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/29653"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=28838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=28838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=28838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}