{"id":30464,"date":"2023-04-26T10:10:29","date_gmt":"2023-04-26T10:10:29","guid":{"rendered":"https:\/\/www.cyberguru.it\/2023\/04\/26\/password-the-armoured-data-protection-door\/"},"modified":"2023-12-12T12:04:04","modified_gmt":"2023-12-12T12:04:04","slug":"password-the-armoured-data-protection-door","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/","title":{"rendered":"Password: the armoured data protection door"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><em>Let&#8217;s learn to keep it robust<\/em><\/h2>\n\n<p>Technology, in addition to making the world less mysterious and smaller, has undoubtedly made our lives easier and less tiring. But, as wise people say, nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case, a risk.<\/p>\n\n<p>So, if it is true that a click is now enough to perform practically any action or to access a lot of knowledge, it is also true that every click we make leaves a trace that can allow someone else to identify us, track us, find out many things about us and, above all, infiltrate our lives. <strong>In short, in the age of the internet, living incognito has become a luxury that few can afford<\/strong>.<\/p>\n\n<p>The digitised data in our devices, whether personal or corporate, represents a digital extension of our person or of the company for which we work and becomes our <strong>digital fingerprint<\/strong>. It&#8217;s a real identity that must be safeguarded and protected to prevent someone from stealing it and using it to carry out actions that we never wanted to do. Among these, there is certainly the action of <strong>moving through corporate networks without being discovered. This activity is very widely practiced by hackers who manage to play the role of an employee after gaining access to their credentials. <\/strong>For this reason, <strong>identity security<\/strong> has become one of the priorities of <strong>CISOs<\/strong>. <\/p>\n\n<p>But <strong>identity theft<\/strong> can have many other serious consequences, including: the creation of fake profiles, privacy violations, and the manipulation and alteration of data. For companies, in addition to those mentioned, we can add data theft for ransom, or for profit, or aimed at unfair competition. In short, phishing attacks aim at the theft or exploitation of digital identities and can result in serious losses for users, suppliers and even prevent customers from using online services. And all this is always due to human error, distraction, or an underestimation of risks.<\/p>\n\n<p><strong>From the latest 2022 edition of the Data Breach Investigations Report (the fifteenth) it emerged, in fact, that the majority of data breaches occurred due to natural persons who inadvertently and recklessly &#8220;collaborated&#8221; with the attack. <\/strong>They practically left the front door open.<\/p>\n\n<p>In fact, among the human errors that enable hackers to steal or damage identities, there is certainly that of not taking enough care of passwords and login credentials and using them in the wrong way.<\/p>\n\n<p>True, we are all overloaded with passwords and credentials: according to the data, the average person has about 70. Remembering them all is a big problem.<\/p>\n\n<p>For this reason, we often give in to laziness and thus always use the same ones or choose simple ones in order to remember them more easily. It&#8217;s a very common mistake, but one that should never be made.<\/p>\n\n<p><strong>Some puzzling statistics show how much the password security situation has worsened in recent years:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Cybercriminals exploited 1.7 billion login credentials (including passwords) in 2021 <a href=\"https:\/\/spycloud.com\/thank-you-2022-annual-identity-exposure-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">(Spycloud Survey<\/a>).<\/li>\n\n\n\n<li>The most commonly-used unencrypted password is &#8220;password&#8221; <a href=\"https:\/\/spycloud.com\/thank-you-2022-annual-identity-exposure-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">(Spycloud survey<\/a>).<\/li>\n\n\n\n<li>45% of users do not change passwords after a breach (LastPass Study).<\/li>\n\n\n\n<li>60% of users reuse passwords <a href=\"https:\/\/spycloud.com\/thank-you-2022-annual-identity-exposure-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">(Spycloud Survey<\/a>).<\/li>\n\n\n\n<li>84% use the same password for multiple accounts (Bitwarden Survey).<\/li>\n\n\n\n<li>Human error, which includes sharing passwords and using weak passwords, is behind 95% of cyberattacks, according to the &#8220;<a href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Threat Intelligence<\/a>&#8221; survey.<\/li>\n<\/ul>\n\n<p>These data make clear how important it is to fight cybercrime and protect our data, keep strong and secure passwords, which is equivalent to equipping yourself with a robust security door to protect your home, making sure to always close it properly.<\/p>\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>Below, we list some of the most common errors in the use of passwords and relevant tips for dealing with them<\/strong><\/h3>\n\n<p><strong>Do not share passwords<br\/><\/strong>A survey conducted by Yubico and Ponemon found that 49% of cybersecurity officers and 51% of employees share passwords with colleagues to access company accounts. It&#8217;s always a good idea not to do this.<\/p>\n\n<p><strong>Don&#8217;t use the same password for multiple accounts.<br\/><\/strong>60% of employees admit to reusing passwords for multiple accounts. You can overcome the difficulty of remembering them all through a password manager.<\/p>\n\n<p><strong>Don&#8217;t leave the password written down on the desk<br\/><\/strong>Often, for convenience, the password is written on a piece of paper and left in plain sight, which encourages any passing person to copy it. In addition, if the employee uses the same password for many accounts, they are exposed to multiple violations.<\/p>\n\n<p><strong>Do not ever give passwords to anyone else, even if you are asked for them<br\/><\/strong>Scammers often trick employees, through social engineering, into providing personal information, including passwords. Be careful not to fall into the trap.<\/p>\n\n<p><strong>Make passwords hard to guess<br\/><\/strong>The most popular password is <strong>123456<\/strong>. It&#8217;s a choice that makes the cybercriminal&#8217;s job easy. It is advisable in a company to encourage the use of more complex passwords.<\/p>\n\n<p><strong>Change passwords when in doubt<br\/>Security policies should ensure that employees change passwords if they believe they have been victims of phishing.<\/strong><\/p>\n\n<p><strong>Make password recovery questions more difficult<br\/><\/strong>Password recovery is often a goal of cybercriminals; the methods used to recover passwords require users to enter details such as the mother&#8217;s maiden name, information that can easily be found by scammers. It is therefore necessary to have a robust password recovery system.<\/p>\n\n<p><strong>Do not lose passwords due to unsecured connections<br\/><\/strong>A password could be stolen if a person uses an unsecured Internet connection, as public ones often are. In these cases, it is better to use a website that offers greater security guarantees, such as HTTPS or a VPN.<\/p>\n\n<p><strong>Do not use common words in a password<br\/><\/strong>The use of common words in creating a password is exploited by hackers, who use malicious programmes to try to break into an account using passwords and common words.<\/p>\n\n<p>These suggestions listed, although they seem to be easily understandable, are actually very complex and need specific training and preparation to be assimilated and metabolised. Especially in a company or an organisation, where the stakes are very high, as is the possibility of making mistakes, you can no longer ignore specific training on these aspects. <strong>Starting from the established fact that at the origin of the attack, there is always human error<\/strong>, it is mainly in this regard that it is necessary to intervene in a preventive manner. <strong>The real protection barrier is, in fact, represented by sufficiently trained and continuously updated employees<\/strong>. An armoured door to protect the company that will give hackers a run for their money.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s learn to keep it robust Technology, in addition to making the world less mysterious and smaller, has undoubtedly made our lives easier and less tiring. But, as wise people say, nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case, [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":30199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[467,470,687],"class_list":["post-30464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-crime-en-2","tag-cyber-security-awareness-en-3","tag-password-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Password: the armoured data protection door<\/title>\n<meta name=\"description\" content=\"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password: the armoured data protection door\" \/>\n<meta property=\"og:description\" content=\"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T10:10:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-12T12:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"783\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Password: the armoured data protection door\",\"datePublished\":\"2023-04-26T10:10:29+00:00\",\"dateModified\":\"2023-12-12T12:04:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/\"},\"wordCount\":1085,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/password.jpg\",\"keywords\":[\"Cyber Crime\",\"Cyber Security Awareness\",\"Password\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/\",\"name\":\"Password: the armoured data protection door\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/password.jpg\",\"datePublished\":\"2023-04-26T10:10:29+00:00\",\"dateModified\":\"2023-12-12T12:04:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/password.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/password.jpg\",\"width\":1200,\"height\":783,\"caption\":\"Password: la porta blindata a protezione dei dati\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/04\\\/26\\\/password-the-armoured-data-protection-door\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Password: the armoured data protection door\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Password: the armoured data protection door","description":"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/","og_locale":"en_US","og_type":"article","og_title":"Password: the armoured data protection door","og_description":"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.","og_url":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-04-26T10:10:29+00:00","article_modified_time":"2023-12-12T12:04:04+00:00","og_image":[{"width":1200,"height":783,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg","type":"image\/jpeg"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Password: the armoured data protection door","datePublished":"2023-04-26T10:10:29+00:00","dateModified":"2023-12-12T12:04:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/"},"wordCount":1085,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg","keywords":["Cyber Crime","Cyber Security Awareness","Password"],"articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/","url":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/","name":"Password: the armoured data protection door","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg","datePublished":"2023-04-26T10:10:29+00:00","dateModified":"2023-12-12T12:04:04+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"Nothing is free and, by a strange law of compensation, where there is an advantage, there is always a loss, or in any case a risk.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/04\/password.jpg","width":1200,"height":783,"caption":"Password: la porta blindata a protezione dei dati"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2023\/04\/26\/password-the-armoured-data-protection-door\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Password: the armoured data protection door"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/30464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=30464"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/30464\/revisions"}],"predecessor-version":[{"id":30465,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/30464\/revisions\/30465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/30199"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=30464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=30464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=30464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}