{"id":7934,"date":"2021-04-21T08:15:38","date_gmt":"2021-04-21T06:15:38","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=7934"},"modified":"2021-04-21T08:15:38","modified_gmt":"2021-04-21T06:15:38","slug":"cyberkriminalitaet-das-sind-die-gefahrenquellen","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/it\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","title":{"rendered":"Cibercriminalit\u00e0: ecco le fonti di pericolo"},"content":{"rendered":"<figure id=\"attachment_7935\" aria-describedby=\"caption-attachment-7935\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7935\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" alt=\"\" width=\"680\" height=\"389\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-16x9.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-306x175.jpg 306w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-612x350.jpg 612w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator-300x172.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7935\" class=\"wp-caption-text\">Lavora in pace al PC: Le apparenze sono ingannevoli. Perch\u00e9 il crimine informatico sta diventando sempre pi\u00f9 sofisticato. (Immagine: Swisscom \/ Cyber Security Threat Radar 2020\/2021)<\/figcaption><\/figure>\n<p>La marea di minacce informatiche continua senza sosta. <a href=\"https:\/\/www.organisator.ch\/cyber-vorfaelle-tipps-zur-richtigen-reaktion\/\">Le grandi aziende e le PMI sono ancora prese di mira dagli hacker<\/a>. Lo spostamento di molti impiegati nell'ufficio di casa, legato alla pandemia, ha offerto ai criminali informatici una superficie di attacco pi\u00f9 ampia. Di conseguenza, hanno adattato i loro metodi di attacco alle nuove circostanze.<\/p>\n<h2>Cibercriminalit\u00e0: alto numero di attacchi<\/h2>\n<p>L'ultimo Cyber Security Threat Radar mostra: Il numero di attacchi rimane ad un livello costantemente alto. Mentre i metodi di attacco individuali \u2500 piuttosto classici \u2500 sono in declino, gli approcci intelligenti e spesso controllati dall'AI sono sempre pi\u00f9 utilizzati. Le aziende e le organizzazioni sono quindi ulteriormente sfidate a tenere traccia - i metodi degli attaccanti sono in continua evoluzione.<\/p>\n<h2><strong>Nuove condizioni, nuovi metodi di attacco <\/strong><\/h2>\n<p>L'eterogeneit\u00e0 del posto di lavoro, per esempio, \u00e8 ora una delle maggiori sfide nella sicurezza informatica. La distribuzione immediata all'home office \u00e8 stata una delle pi\u00f9 grandi sfide che i dipartimenti IT e di sicurezza hanno dovuto superare nel recente passato. L'home office e i modelli di lavoro mobile e agile, come il \"bring your own device\", offrono grandi opportunit\u00e0 \u2500 ma aprono anche nuove superfici di attacco. E gli attaccanti stanno abilmente sfruttando questo sviluppo a loro vantaggio.<\/p>\n<h2>Attacchi basati sull'AI in aumento<\/h2>\n<p>Gli attacchi che utilizzano l'intelligenza artificiale, i cosiddetti attacchi basati sull'AI, stanno anche venendo sempre pi\u00f9 alla ribalta e sono classificati come una minaccia crescente nel Cyber Security Threat Radar. Sono utilizzati, per esempio, nella disinformazione mirata, come quelli noti di deepfakes. Recentemente, il canale Tiktok \"Deeptomcruise\" ha fatto scalpore. Sui video, Tom Cruise ha mostrato trucchi di magia e ha giocato a golf. Ma il vero trucco magico era il video stesso: Per una volta, la star di Hollywood non era davanti alla telecamera per questo, non lo sapeva nemmeno. \u00c8 un falso quasi perfetto creato grazie all'intelligenza artificiale. Attraverso di essa, i criminali informatici sono in grado di creare automaticamente un profilo artificiale da una grande variet\u00e0 di informazioni che \u00e8 molto difficile da riconoscere come falso. Il rapporto spiega quali contromisure le aziende possono prendere contro queste e altre sfide.<\/p>\n<h2><strong>Bussola nel mondo cibernetico <\/strong><\/h2>\n<p>Con il Cyber Security Threat Radar, gli specialisti di Swisscom hanno determinato la situazione attuale delle minacce in Svizzera. Il rapporto spiega la motivazione dei criminali informatici e rivela il loro modus operandi. Esso guarda e osserva le tendenze e le sfide, le valuta e fornisce una panoramica della situazione delle minacce e del loro sviluppo in Svizzera mettendo in comune le conoscenze degli esperti.Mostra anche quali contromisure sono particolarmente efficaci per rilevare gli attacchi nel miglior modo possibile e in una fase iniziale.<\/p>\n<p><em>Fonte: Cyber Security Threat Radad 2020\/21 di <a href=\"http:\/\/www.swisscom.ch\">Swisscom<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Flut an Cyberbedrohungen ist ungebrochen hoch. Grosse Firmen und KMU stehen nach wie vor im Visier von Hackern. Der pandemiebedingte Wechsel vieler Angestellten ins Homeoffice bot der Cyberkriminalit\u00e4t eine willkommene gr\u00f6ssere Angriffsfl\u00e4che. Entsprechend haben sie ihre Angriffsmethoden den neuen Gegebenheiten angepasst. Cyberkriminalit\u00e4t: Hohe Zahl an Angriffen Der neuste Cyber Security Threat Radar zeigt: Die [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cyberkriminalit\u00e4t","_yoast_wpseo_metadesc":"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.","articlekey":"","footnotes":""},"categories":[27],"tags":[142,260,286],"class_list":["post-7934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-cyber-crime","tag-ict-sicherheit","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen - Organisator<\/title>\n<meta name=\"description\" content=\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/it\/gestione-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\" \/>\n<meta property=\"og:description\" content=\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/it\/gestione-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-21T06:15:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"#Cyberkriminalit\u00e4t: Das sind die #Gefahrenquellen\" \/>\n<meta name=\"twitter:description\" content=\"#Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie #Cyberkriminelle ihre Angriffsmethoden angepasst haben.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\",\"datePublished\":\"2021-04-21T06:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\",\"name\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"datePublished\":\"2021-04-21T06:15:38+00:00\",\"description\":\"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg\",\"width\":680,\"height\":389,\"caption\":\"In Ruhe am PC arbeiten: Der Schein tr\u00fcgt. Denn die Cyberkriminalit\u00e4t wird immer ausgefeilter. (Bild: Swisscom \\\/ Cyber Security Threat Radar 2020\\\/2021)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2021-04-21\\\/cyberkriminalitaet-das-sind-die-gefahrenquellen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/it\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime: ecco le fonti di pericolo - Organizzatore","description":"La criminalit\u00e0 informatica rimane un problema: il Cyber Security Threat Radar di Swisscom mostra come i criminali informatici abbiano adattato i loro metodi di attacco.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/it\/gestione-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","og_locale":"it_IT","og_type":"article","og_title":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen","og_description":"Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie Cyberkriminelle ihre Angriffsmethoden angepasst haben.","og_url":"https:\/\/www.organisator.ch\/it\/gestione-2\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2021-04-21T06:15:38+00:00","og_image":[{"width":680,"height":389,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"#Cyberkriminalit\u00e4t: Das sind die #Gefahrenquellen","twitter_description":"#Cyberkriminalit\u00e4t bleibt ein Thema: Der Cyber Security Threat Radar von Swisscom zeigt, wie #Cyberkriminelle ihre Angriffsmethoden angepasst haben.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen","datePublished":"2021-04-21T06:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"},"wordCount":458,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT"],"articleSection":["IT"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","url":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/","name":"Cybercrime: ecco le fonti di pericolo - Organizzatore","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","datePublished":"2021-04-21T06:15:38+00:00","description":"La criminalit\u00e0 informatica rimane un problema: il Cyber Security Threat Radar di Swisscom mostra come i criminali informatici abbiano adattato i loro metodi di attacco.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/04\/Cyberkriminalitaet-Das-sind-die-Gefahrenquellen_Organisator.jpg","width":680,"height":389,"caption":"In Ruhe am PC arbeiten: Der Schein tr\u00fcgt. Denn die Cyberkriminalit\u00e4t wird immer ausgefeilter. (Bild: Swisscom \/ Cyber Security Threat Radar 2020\/2021)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2021-04-21\/cyberkriminalitaet-das-sind-die-gefahrenquellen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Cyberkriminalit\u00e4t: Das sind die Gefahrenquellen"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizzatore","description":"Competente. Pratico. In 10 numeri all'anno, ORGANISATOR presenta i temi essenziali per i manager delle PMI.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizzatore","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"Tommaso.berner","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/it\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/posts\/7934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/comments?post=7934"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/posts\/7934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/media\/7935"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/media?parent=7934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/categories?post=7934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/it\/wp-json\/wp\/v2\/tags?post=7934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}