{"id":1698,"date":"2022-12-28T07:58:12","date_gmt":"2022-12-28T07:58:12","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/?post_type=module&#038;p=1698"},"modified":"2023-06-29T14:06:07","modified_gmt":"2023-06-29T14:06:07","slug":"tecnologie-e-protezioni","status":"publish","type":"module","link":"https:\/\/guide.trustvalley.swiss\/it\/module\/tecnologie-e-protezioni\/","title":{"rendered":"Tecnologie e protezioni"},"content":{"rendered":"\n<p>Il presente modulo mira a fornire un approfondimento su come le PMI possono proteggersi dai ciberattacchi. Valuta alternative e soluzioni concrete da attuare per proteggersi dagli attacchi classici, come password, \u00abhardening\u00bb, segmentazione della rete e gestione dei log, solo per citarne alcuni.<\/p>\n","protected":false},"featured_media":1293,"template":"","searchablecategory":[],"class_list":["post-1698","module","type-module","status-publish","has-post-thumbnail","hentry"],"taxonomy_info":[],"featured_image_src_large":["https:\/\/guide.trustvalley.swiss\/wp-content\/uploads\/2022\/12\/guide-cyber-icons_4.png",1000,1000,false],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/module\/1698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/module"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/types\/module"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/media\/1293"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/media?parent=1698"}],"wp:term":[{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/it\/wp-json\/wp\/v2\/searchablecategory?post=1698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}