{"id":315,"date":"2018-06-12T10:01:37","date_gmt":"2018-06-12T10:01:37","guid":{"rendered":"https:\/\/www.zaskolit.cz\/?p=315"},"modified":"2018-06-20T11:08:54","modified_gmt":"2018-06-20T09:08:54","slug":"5-castych-omylu-v-digitalni-bezpecnosti","status":"publish","type":"post","link":"https:\/\/www.digitalnisebeobrana.cz\/en\/5-castych-omylu-v-digitalni-bezpecnosti\/","title":{"rendered":"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION"},"content":{"rendered":"<h3><span class=\"ez-toc-section\" id=\"1_This_will_be_solved_by_the_IT_department\"><\/span><span style=\"font-size: large;\">1. This will be solved by the IT department<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"western\" style=\"padding-left: 30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-329\" src=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg 300w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-600x424.jpg 600w, https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Even the best IT guy cannot prevent data leakage from corporate infrastructure if the attack is conducted through an unskilled employee. Just like a security agency worker can\u2019t prevent key theft or employee magnetic card entry.<br \/>\nA secure network is a necessary basis (as well as a lock in the door), but the most common attack is conducted in a different way than through corporate systems. One of the most famous hackers, Kevin Mitnick, describes in his book \u201cThe Art of Deception\u201d, many surprisingly simple tricks on how to get data that should be kept secret. The majority of them have one thing in common &#8211; getting information from uneducated staff who <b>didn\u2019t even think they were doing something wrong.<\/b><!--more--><\/p>\n<p class=\"western\" style=\"padding-left: 30px;\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><i>&#8220;Many social engineering attacks are intricate, involving a number of steps and elaborate planning, combining a mix of manipulation and technological know-how.\u00a0 <\/i><\/span><\/span><i>But I always find it striking that a skillful social engineer can often achieve his goal with a simple, straightforward, direct attack. Just asking outright for the information may be all that&#8217;s needed\u2014as you&#8217;ll see.<br \/>\n<\/i><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><i>Testifying before Congress not long ago, I explained that I could often get passwords and other pieces of sensitive information from companies by pretending to be someone else and <\/i><\/span><\/span><span style=\"color: #000000;\"><i>just asking for it.&#8221;<\/i><\/span><\/p>\n<p class=\"western\" style=\"padding-left: 30px;\">If data is already leaked, <b>repression often takes place in the form of punishment of the employee<\/b> through whom the data has been leaked. This means that if an employee finds he has been the victim of an attack, he tries to hide such an incident rather than informing his supervisor or IT department so that he can respond quickly and minimize the damage company has suffered. Time in such a case plays a huge role.<\/p>\n<p class=\"western\" style=\"padding-left: 30px;\"><b>Solution<\/b>: A trained employee who knows possible attacks, reduces considerably the risk of data leakage exponentially.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_We_have_secure_passwords\"><\/span><span style=\"font-size: large;\">2. We have secure passwords<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"padding-left: 30px;\">One thing is that most users still don\u2019t know how to create really safe passwords (even in 2017, the first place among the most used ones, was the password &#8220;123456&#8221;), but even a security policy that enforces long passwords consisting of upper and lower case letters, numbers and special characters is not self-sacrificial. If a user is forced to use a strong password, they are often used in other accounts. Then it is enough to leak the user database and their passwords from a service and the attacker has the keys to other user&#8217;s accounts.<br \/>\nAlternatively, he uses the &#8220;Remember Password&#8221; feature in your browser. This is a handy feature that will allow us not to remember all the passwords, but there are also many free tools and techniques available to allow the attacker to easily get to these passwords.<\/p>\n<p class=\"western\" style=\"padding-left: 30px;\"><b>Solution<\/b>: Use a dedicated password manager and two-step verification.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Im_not_afraid_of_data_loss_I_regularly_back_up_to_a_shared_disk\"><\/span><span style=\"font-size: large;\">3. I&#8217;m not afraid of data loss, I regularly back up to a shared disk<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"padding-left: 30px;\">Backup is an important part of data protection. However, if an attack occurs and the disk is connected to a backup computer, data may be deleted or corrupted even on the backup disk (typically ransomware &#8211; the attacker encrypts your data and requests a ransom for decryption).<br \/>\nAt the same time, there is a risk that if the backup disk is stolen, the attacker can get to the data that is to remain hidden.<\/p>\n<p style=\"padding-left: 30px;\"><b>Solution<\/b>: Backup &amp; Unplug. The backup disk should only be connected for the duration of the backup. Then it should be disconnected from the system so that the attacker can\u2019t get to the data. And the data on the disk should be securely encrypted, so even in case theft disk, it will not be readable and usable for the attacker.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_I_unlock_the_phone_safely_with_a_gesture_fingerprint\"><\/span><span style=\"font-size: large;\">4. I unlock the phone safely with a gesture \/ fingerprint<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><b>We have more and more personal and business data on mobile phones<\/b>, we are constantly logged in our emails or social networks. If an attacker gets to the phone, he has almost unlimited power over our virtual life. That&#8217;s why the thorough security of our phone is one of the most important things in digital security.<br \/>\nDo you unlock the phone by gesture (linking the dots on the display)? Such unlocking often leaves a trace on the display that is well visible at the right angle to the light. Unlocking such a phone by the attacker is a matter of a few moments.<br \/>\nFingerprint appears to be a safe alternative, everyone is unique. The problem is that fingerprint reconstruction is very easy &#8211; and it does not necessarily need to take a fingerprint, for example from a glass (or the phone itself). For example, a photo with sufficient resolution (and today&#8217;s phones have it) can also be used as a template for making a copy of the fingerprint. In addition, researchers at New York University and Michigan State University have managed to create a universal fingerprint that is able to unlock 65% of the devices.<\/p>\n<p style=\"padding-left: 30px;\"><b>Solution<\/b>: Secure your mobile phone with a strong password and encrypt your memory.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_I_do_not_need_updates_everything_works\"><\/span><span style=\"font-size: large;\">5. I do not need updates, everything works<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"padding-left: 30px;\">Software errors often occurs. These may lead to a security breach. If there is no correction at the time of such an error, it is a so-called 0-day exploit. If an ethical hacker encounters such an error, he usually contacts the developer and they have time to fix and release the software update before the vulnerability is out in the open. After some time, the vulnerability is released, and at that point, the outdated software is open to anyone who wants to get data or control it.<\/p>\n<p style=\"padding-left: 30px;\"><b>Solution<\/b>: Update as often as possible, don\u2019t postpone it. The times when most important programs have ceased to work after updating the operating system, for example, is the mostly a thing of the past.<span style=\"color: #000000;\"> Developers communicate and notify each other of the changes in the operating system in advance so they have enough time to prepare and publish their own updates.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. O to se postar\u00e1 IT odd\u011blen\u00ed Ani ten nejlep\u0161\u00ed firemn\u00ed &#8220;aj\u0165\u00e1k&#8221; nem\u016f\u017ee zabranit \u00faniku dat z firemn\u00ed infrastruktury, pokud je \u00fatok veden p\u0159es nepro\u0161kolen\u00e9ho zam\u011bstnance. Stejn\u011b jako pracovn\u00edk bezpe\u010dnostn\u00ed agentury nem\u016f\u017ee zabr\u00e1nit kr\u00e1de\u017ei kl\u00ed\u010d\u016f nebo vstupn\u00ed magnetick\u00e9 karty zam\u011bstnanc\u016f. Zabezpe\u010den\u00e1 s\u00ed\u0165 je nutn\u00fd z\u00e1klad (stejn\u011b jako nap\u0159. z\u00e1mek ve dve\u0159\u00edch), ale nej\u010dast\u011bj\u0161\u00ed \u00fatok je &hellip;<br \/><a href=\"https:\/\/www.digitalnisebeobrana.cz\/en\/5-castych-omylu-v-digitalni-bezpecnosti\/\" class=\"more-link pen_button pen_element_default pen_icon_arrow_double\">Continue reading <span class=\"screen-reader-text\">5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-315","post","type-post","status-publish","format-standard","hentry","category-blog"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"en","enabled_languages":["cs","en"],"languages":{"cs":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/\" \/>\n<meta property=\"og:site_name\" content=\"DIGITAL SELF-DEFENSE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalnisebeobrana\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/digitalnisebeobrana\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-12T10:01:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-20T09:08:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sodomak\" \/>\n<meta name=\"twitter:site\" content=\"@sodomak\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/\"},\"author\":{\"name\":\"Milan\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"headline\":\"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION\",\"datePublished\":\"2018-06-12T10:01:37+00:00\",\"dateModified\":\"2018-06-20T09:08:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/\"},\"wordCount\":2172,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/information-boards-105139_640-300x212.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/\",\"name\":\"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/information-boards-105139_640-300x212.jpg\",\"datePublished\":\"2018-06-12T10:01:37+00:00\",\"dateModified\":\"2018-06-20T09:08:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/information-boards-105139_640-300x212.jpg\",\"contentUrl\":\"https:\\\/\\\/www.zaskolit.cz\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/information-boards-105139_640-300x212.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/5-castych-omylu-v-digitalni-bezpecnosti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 \u010dast\u00fdch omyl\u016f v digit\u00e1ln\u00ed bezpe\u010dnosti a jejich \u0159e\u0161en\u00ed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/\",\"name\":\"DIGITAL SELF-DEFENSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/en\\\/#\\\/schema\\\/person\\\/e932432719ebfc02a9b05e7b12047736\",\"name\":\"Milan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"url\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\",\"width\":613,\"height\":73,\"caption\":\"Milan\"},\"logo\":{\"@id\":\"https:\\\/\\\/www.digitalnisebeobrana.cz\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo.png\"},\"description\":\"Jmenuji se Milan P\u016flkr\u00e1bek, pamatuji si po\u010d\u00edta\u010de bez internetu, Internet bez Google a mobiln\u00ed komunikaci bez \u0161ifrov\u00e1n\u00ed. M\u00e1m za sebou v\u00edce ne\u017e dvacet let profesion\u00e1ln\u00ed praxe v IT, p\u0159edn\u00e1\u0161\u00edm a p\u00ed\u0161u \u010dl\u00e1nky o IT bezpe\u010dnosti, kryptom\u011bn\u00e1ch a nov\u00fdch technologi\u00edch. Od roku 2014 jsem sou\u010d\u00e1st\u00ed nezikov\u00e9 organizace Paraleln\u00ed Polis v Praze.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/digitalnisebeobrana\\\/\",\"https:\\\/\\\/x.com\\\/sodomak\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/","og_locale":"en_US","og_type":"article","og_title":"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE","og_url":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/","og_site_name":"DIGITAL SELF-DEFENSE","article_publisher":"https:\/\/www.facebook.com\/digitalnisebeobrana\/","article_author":"https:\/\/www.facebook.com\/digitalnisebeobrana\/","article_published_time":"2018-06-12T10:01:37+00:00","article_modified_time":"2018-06-20T09:08:54+00:00","og_image":[{"url":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg","type":"","width":"","height":""}],"author":"Milan","twitter_card":"summary_large_image","twitter_creator":"@sodomak","twitter_site":"@sodomak","twitter_misc":{"Written by":"Milan","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#article","isPartOf":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/"},"author":{"name":"Milan","@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"headline":"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION","datePublished":"2018-06-12T10:01:37+00:00","dateModified":"2018-06-20T09:08:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/"},"wordCount":2172,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"image":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/","url":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/","name":"5 FREQUENT MISTAKES IN DIGITAL SECURITY AND THEIR SOLUTION - DIGITAL SELF-DEFENSE","isPartOf":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg","datePublished":"2018-06-12T10:01:37+00:00","dateModified":"2018-06-20T09:08:54+00:00","breadcrumb":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#primaryimage","url":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg","contentUrl":"https:\/\/www.zaskolit.cz\/wp-content\/uploads\/2018\/06\/information-boards-105139_640-300x212.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalnisebeobrana.cz\/5-castych-omylu-v-digitalni-bezpecnosti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalnisebeobrana.cz\/en\/"},{"@type":"ListItem","position":2,"name":"5 \u010dast\u00fdch omyl\u016f v digit\u00e1ln\u00ed bezpe\u010dnosti a jejich \u0159e\u0161en\u00ed"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#website","url":"https:\/\/www.digitalnisebeobrana.cz\/en\/","name":"DIGITAL SELF-DEFENSE","description":"","publisher":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalnisebeobrana.cz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.digitalnisebeobrana.cz\/en\/#\/schema\/person\/e932432719ebfc02a9b05e7b12047736","name":"Milan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","url":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","contentUrl":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png","width":613,"height":73,"caption":"Milan"},"logo":{"@id":"https:\/\/www.digitalnisebeobrana.cz\/wp-content\/uploads\/2022\/01\/logo.png"},"description":"Jmenuji se Milan P\u016flkr\u00e1bek, pamatuji si po\u010d\u00edta\u010de bez internetu, Internet bez Google a mobiln\u00ed komunikaci bez \u0161ifrov\u00e1n\u00ed. M\u00e1m za sebou v\u00edce ne\u017e dvacet let profesion\u00e1ln\u00ed praxe v IT, p\u0159edn\u00e1\u0161\u00edm a p\u00ed\u0161u \u010dl\u00e1nky o IT bezpe\u010dnosti, kryptom\u011bn\u00e1ch a nov\u00fdch technologi\u00edch. Od roku 2014 jsem sou\u010d\u00e1st\u00ed nezikov\u00e9 organizace Paraleln\u00ed Polis v Praze.","sameAs":["https:\/\/www.facebook.com\/digitalnisebeobrana\/","https:\/\/x.com\/sodomak"]}]}},"_links":{"self":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":15,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/315\/revisions"}],"predecessor-version":[{"id":353,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/posts\/315\/revisions\/353"}],"wp:attachment":[{"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/media?parent=315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/categories?post=315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalnisebeobrana.cz\/en\/wp-json\/wp\/v2\/tags?post=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}