{"id":49708,"date":"2025-08-28T13:17:48","date_gmt":"2025-08-28T13:17:48","guid":{"rendered":"https:\/\/www.cyberguru.it\/2025\/08\/28\/cyber-card-31-smart-home\/"},"modified":"2025-08-29T14:29:17","modified_gmt":"2025-08-29T14:29:17","slug":"cyber-card-31-smart-home","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/","title":{"rendered":"Cyber Card #31 &#8211; Smart Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; min_height=&#8221;1363.1px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span>Smart Home: Beware of Hidden Risks<\/span><\/h2>\n<p><span>Homes are becoming increasingly connected and functional, but unfortunately also more exposed to digital risks. <\/span><\/p>\n<p><span>Every connected device can become an entry point for cybercriminals: cameras used to violate privacy and spy remotely, Smart TVs used to spread malware, voice assistants manipulated to execute fraudulent commands, unsecured routers that expose the entire home network. Even smart plugs or &#8220;unsupported&#8221; light bulbs can be exploited to launch cyber attacks. <\/span><\/p>\n<p>Protecting comfort and privacy requires awareness, best practices, and daily attention.<\/p>\n<p><span>Here are <\/span><span>some simple rules to avoid falling into the trap!<\/span><\/p>\n<p><span><\/span><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/CyberCard_31_EN-scaled.webp\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/CyberCard_31_EN-scaled.webp\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><em><strong>This Cyber Card can help you develop the right digital awareness!<\/strong><\/em><\/p>\n<p><!-- \/divi:image -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smart Home: Beware of Hidden Risks Homes are becoming increasingly connected and functional, but unfortunately also more exposed to digital risks. Every connected device can become an entry point for cybercriminals: cameras used to violate privacy and spy remotely, Smart TVs used to spread malware, voice assistants manipulated to execute fraudulent commands, unsecured routers that [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":49654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[],"class_list":["post-49708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Smart Home: Rules to Protect your Home - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #31 - Smart Home\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T13:17:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T14:29:17+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #31 &#8211; Smart Home\",\"datePublished\":\"2025-08-28T13:17:48+00:00\",\"dateModified\":\"2025-08-29T14:29:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/\"},\"wordCount\":223,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/EN.png\",\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/\",\"name\":\"Smart Home: Rules to Protect your Home - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/EN.png\",\"datePublished\":\"2025-08-28T13:17:48+00:00\",\"dateModified\":\"2025-08-29T14:29:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/EN.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/EN.png\",\"width\":1920,\"height\":1080,\"caption\":\"Anteprima_ CyberCard_31_EN\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/08\\\/28\\\/cyber-card-31-smart-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #31 &#8211; Smart Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Smart Home: Rules to Protect your Home - Cyber Guru","description":"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #31 - Smart Home","og_description":"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.","og_url":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2025-08-28T13:17:48+00:00","article_modified_time":"2025-08-29T14:29:17+00:00","og_image":[{"width":1920,"height":1080,"url":"http:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #31 &#8211; Smart Home","datePublished":"2025-08-28T13:17:48+00:00","dateModified":"2025-08-29T14:29:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/"},"wordCount":223,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png","articleSection":["Cyber Card"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/","url":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/","name":"Smart Home: Rules to Protect your Home - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png","datePublished":"2025-08-28T13:17:48+00:00","dateModified":"2025-08-29T14:29:17+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Learn how to protect your Smart Home from digital risks with simple rules and daily best practices.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/EN.png","width":1920,"height":1080,"caption":"Anteprima_ CyberCard_31_EN"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2025\/08\/28\/cyber-card-31-smart-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #31 &#8211; Smart Home"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/49708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=49708"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/49708\/revisions"}],"predecessor-version":[{"id":49719,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/49708\/revisions\/49719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/49654"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=49708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=49708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=49708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}