{"id":7961,"date":"2022-05-18T15:18:24","date_gmt":"2022-05-18T13:18:24","guid":{"rendered":"https:\/\/www.open-knowledge.it\/?p=7961"},"modified":"2022-05-18T15:18:24","modified_gmt":"2022-05-18T13:18:24","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"[vc_section full_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;full-width&#8221; css=&#8221;.vc_custom_1652871471560{background-image: url(https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Cover-1.jpg?id=7931) !important;}&#8221;][vc_row][vc_column width=&#8221;5\/6&#8243;][vc_column_text]\n<h1><span style=\"color: #ffffff;\" class=\"centrato\"> Digital learning that makes the difference: <\/span><\/h1>\n[\/vc_column_text][vc_column_text]<span style=\"color: #ffffff;\"><span data-contrast=\"auto\" class=\"TextRun SCXW240659103 BCX0\" xml:lang=\"IT-IT\" lang=\"IT-IT\"><span class=\"NormalTextRun SCXW240659103 BCX0\" data-ccp-charstyle=\"normaltextrun\"> When safety becomes PHYGITAL<br \/>\n<\/span><\/span><\/span> <span data-contrast=\"auto\" class=\"TextRun SCXW240659103 BCX0\" xml:lang=\"IT-IT\" lang=\"IT-IT\"><span class=\"NormalTextRun SCXW240659103 BCX0\" data-ccp-charstyle=\"eop\">\u202f<\/span><\/span><span class=\"EOP SCXW240659103 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][wgl_spacing spacer_size=&#8221;30px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_column_text]<span style=\"color: #808080;\">\n\t\t<!-- custom -->\n\t\t<div class=\"custom_blog_list_metas\">\n\t\t\t<!-- data -->\n\t\t\t<span class=\"date_post\">\n\t\t\t\t<img decoding=\"async\" srcset=\" \/img\/Calendar@2x.png 2x \" src=\"\/img\/Calendar.png\" \/>\n\t\t\t\t18 May 2022 \n\t\t\t<\/span>\n\t\t\t<!-- readtime -->\n\t\t\t<span class=\"readtime\">\n\t\t\t\t<img decoding=\"async\" srcset=\" \/img\/Watch@2x.png 2x \" src=\"\/img\/Watch.png\" \/>\n\t\t\t\t<span class=\"span-reading-time rt-reading-time\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">min.<\/span><\/span>\n\t\t\t<\/span>\n\t\t<\/div>\t\n\t\t<!-- custom end -->\n\t<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;30px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<span>Imagine standing in line at a supermarket waiting to pay for your groceries. Suddenly, amid the confusion of the busy counters on a Saturday afternoon, the gentleman in front of you appears to be genuinely concerned. He turns towards you and with a rather loud voice and a sense of urgency in his tone, he explains that <strong>he immediately needs your personal information<\/strong> to verify the safety of your credit card: it might have been cloned!<\/span><\/p>\n<p><strong><span>What would you do?<\/span><\/strong><\/p>\n<p><span>Without any doubt, you would think twice before <strong>giving your personal information<\/strong> to a total stranger. Probably you would act defensively and try to get away from the situation as soon as possible. Could you imagine? No person would ever fall into such a trap while grocery shopping in real life. <\/span><\/p>\n<p><span>In our <strong>physical world, we tend to protect ourselves from potential threats through defensive behaviours<\/strong>, while in the virtual world that may not always be the case, as we often forget that there are other billions of users connected daily.<\/span><\/p>\n<p><span>Why is that? Digital technology and its services have made a tremendous impact on our lives, for example, did you know that\u2026<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;30px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_single_image image=&#8221;7965&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1652878291377{margin-bottom: 60px !important;}&#8221;][vc_column_text]<span>As we can see from this data, we have <strong>fully embraced digitalization <\/strong>in our lives and the internet has become a part of our daily routine. Think about it: Every day, we stay in touch with friends and family, work, study, play, shop, and pay bills via a mobile device or a computer.<\/span><\/p>\n<p><span>While the internet offers us many benefits, it also <strong>exposes us to a number of security risks<\/strong> that we are not even aware of. These include the integrity of our identity, our privacy, and the security of our electronic communications, especially financial transactions, as well as the potential exposure to offensive and illegal content and behaviour.<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;20px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_column_text]<span>While in real life we <strong>protect ourselves from potential risks<\/strong> by, for example, installing an alarm system or securing our bicycle with a chain, we should do the same in our digital world, as the Internet has become the easiest, cheapest, and fastest way to steal and gain unauthorized access to our personal information. Think about it: <strong>protecting our digital security<\/strong> is something that can no longer be ignored. We need to be aware of it and develop healthy habits in this regard as well.<\/span><\/p>\n<p><span>The <strong>2020 pandemic has accelerated this development<\/strong>: not only did we have to move our office work to our home, but we also had to stay connected all the time.<\/span><\/p>\n<p><span>For these reasons, organizations\u2019 cybersecurity can <strong>no longer be the responsibility of only the IT (Information Technology) department in companies<\/strong> but must also involve the awareness of each one of us: in many cases, simply having antivirus software or a firewall is not enough, because it is the employees who take the first step to protect themselves against potential risks from cyberattacks.<\/span><\/p>\n<p><span>In 2021, when we were asked to supply cybersecurity training to employees of a multinational pharmaceutical company around the world, we at OpenKnowledge took on the challenge and developed the idea of a modular digital learning path that would promote conscious digital readiness in our daily digital world.<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;20px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_column_text]<span>The company already had mandatory cybersecurity training for all employees internationally. With the advent of new ways of working remotely, the company felt the need <strong>to increase, promote and spread digital awareness<\/strong>. In response to this need, we at OpenKnowledge decided to provide employees and their families with new tools and best practices to protect themselves when working remotely, so that their data is safe, and all sensitive assets of the company are protected.<\/span>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1652878396799{margin-top: 60px !important;margin-bottom: 30px !important;}&#8221;]\n<h4><strong>The key to the OpenKnowledge approach<\/strong><\/h4>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1652878413284{margin-bottom: 30px !important;}&#8221;]<span>The challenge for us was to create an engaging and interactive learning experience.<\/span><\/p>\n<p><em><span>What did we do and how did we achieve the project outcomes?<\/span><\/em><\/p>\n<p><span>We <strong>developed 6 digital learning pills<\/strong>, each<strong> 15 minutes<\/strong> long, to spark curiosity and maintain the user\u2019s attention throughout the entire training. For the training to be effective, we worked on five key elements:<\/span>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1652878463374{margin-bottom: 30px !important;}&#8221;]\n<ul>\n<li><span>use of a <strong>flexible and responsive development tool<\/strong><\/span><\/li>\n<li><strong><span>modularity <\/span><\/strong><span>and <strong>briefness of the content provided<\/strong><\/span><\/li>\n<li><span>focus on <strong>aims and outputs for each module<\/strong><\/span><\/li>\n<li><span>use of <strong>engagement and involvement techniques<\/strong> to enhance and exploit user interaction<\/span><\/li>\n<li><span>use of <strong>real-world scenarios<\/strong> in which the users can confront themselves and act<\/span><\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1652878491048{margin-bottom: 30px !important;}&#8221;]<span>Another key element is the use of captivating <strong>storytelling and concept<\/strong>: we imagined a small microcosm, like that of an apartment building, where the user is called to help the neighbours struggling with different types of cyber threats and attacks.<\/span><\/p>\n<p><span>Every learning pill introduces a fundamental aspect of the cybersecurity topic in a targeted and easily understandable way. It follows a specific design and structure:<\/span>[\/vc_column_text][vc_raw_html css=&#8221;.vc_custom_1652878570643{padding-top: 30px !important;}&#8221;]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[\/vc_raw_html][vc_raw_html css=&#8221;.vc_custom_1652878692099{padding-top: 30px !important;}&#8221;]JTNDc3BhbiUyMHN0eWxlJTNEJTIydGV4dC1hbGlnbiUzQSUyMGxlZnQlM0IlMjBjb2xvciUzQSUyMC13ZWJraXQtcmFkaWFsLWdyYWRpZW50JTI4ODAlMjUlMjA4MCUyNSUyQ2NpcmNsZSUyMGZhcnRoZXN0LWNvcm5lciUyQyUyM2ZmMDA3YSUyMDEwJTI1JTJDJTIzNjQxMjk2JTIwNzAlMjUlMjklMjAlMjFpbXBvcnRhbnQlM0IlMjBmb250LXNpemUlM0ElMjAzZW0lM0IlMjB2ZXJ0aWNhbC1hbGlnbiUzQSUyMGJhc2VsaW5lJTNCJTIwZm9udC13ZWlnaHQlM0ElMjA2MDAlM0IlMjIlMjBjbGFzcyUzRCUyMmRvdCUyMiUzRSUyMCVFMiU5NyU4RiVDMiVBMCUzQyUyRnNwYW4lM0UlMEElM0NwJTIwc3R5bGUlM0QlMjJtYXJnaW4tbGVmdCUzQSUyMDNlbSUzQiUyMG1hcmdpbi10b3AlM0ElMjAtM2VtJTIyJTNFJTIwQW4lMjAlM0NzdHJvbmclM0UlMjBpbnRlcmFjdGl2ZSUyMCUzQyUyRnN0cm9uZyUzRSUyMHNlY3Rpb24lMjB3aGVyZSUyMHVzZXJzJTIwY2FuJTIwY29tcGFyZSUyMHRoZWlyJTIwbGV2ZWwlMjBvZiUyMGRpZ2l0YWwlMjByZWFkaW5lc3MlMjAlM0NzdHJvbmclM0UlMjAlMjhzZWxmLWFzc2Vzc21lbnQlMjklMjAlM0MlMkZzdHJvbmclM0UlMjBhbmQlMkMlMjB0aHJvdWdoJTIwJTNDc3Ryb25nJTNFJTIwYnJhbmNoaW5nJTIwc2NlbmFyaW9zJTIwJTNDJTJGc3Ryb25nJTNFJTJDJTIwc2VlJTIwdGhlJTIwaW1tZWRpYXRlJTIwaW1wYWN0JTIwb2YlMjB0aGVpciUyMGRlY2lzaW9ucy4lMjAlM0MlMkZwJTNFJTBB[\/vc_raw_html][vc_raw_html css=&#8221;.vc_custom_1652878752679{padding-top: 30px !important;}&#8221;]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[\/vc_raw_html][wgl_spacing spacer_size=&#8221;40px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_column_text]<span>The <strong>digital transformation has led to an increase in cyber-criminal activities<\/strong>, each one different from the others and with its own distinct characteristics. Therefore, we decided to focus on a specific and concrete topic for each learning pill.<\/span><\/p>\n<p><span>After providing a general overview of topics related to <strong>privacy and the overall digitalization<\/strong>, we went ahead to take a deep dive into the mobile sphere, focusing on the pitfalls that can be hidden behind the \u201cblack mirrors\u201d that are truly present everywhere. Finally, we turned our attention to Social Engineering techniques: what is social engineering and how can we recognize and unmask these techniques?<\/span>[\/vc_column_text][vc_column_text]<span>A central part of the course covered the importance of protecting oneself when working remotely: companies had to implement remote working policies, thus accepting new challenges both from an organizational and a security point of view. In fact, remote working does not mean being safer when working online&#8230; on the contrary, it can often imply being more responsible for one\u2019s own actions.<\/span><\/p>\n<p><span>The more <strong>aspects of our daily lives we share on the internet<\/strong>, the more personal information we give to the outside world. And the more personal information we share over the web, the more chance there is of a hacker getting into our world and causing us potential damage. Therefore, at the end of the training course, we considered to also talk about all the risks involved in oversharing, when it comes to sensitive data.<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;20px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_column_text]<span>The aim of each pill is therefore to create a <strong>collection of tips &amp; tricks and best practices<\/strong> that anyone can make one\u2019s own, to become an everyday hero able to expose potential attacks, recognize hidden risks and protect themselves, their families, and colleagues from potential digital threats.<\/span><\/p>\n<p><span>Our approach to the digital world should not frighten us: through new awareness, consciousness, and behaviours, it is possible to make our virtual world increasingly safe.<\/span>[\/vc_column_text][wgl_spacing spacer_size=&#8221;40px&#8221; responsive_mobile=&#8221;true&#8221; size_mobile=&#8221;60px&#8221;][vc_raw_html css=&#8221;.vc_custom_1652876464537{margin-bottom: 30px !important;}&#8221;]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[\/vc_raw_html][vc_empty_space height=&#8221;35px&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1642168135550{margin-bottom: 30px !important;}&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1652878867443{margin-top: 60px !important;margin-bottom: 30px !important;}&#8221;]\n<h4>Authors<\/h4>\n[\/vc_column_text][vc_column_text]Benedetta Milani, Monica Cucchi[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Crypto payments are fast, secure and anonymous, they are cheaper to process and hence are widely used by businesses in all areas. Best of all, there is no chance of Chargeback or fraud! We are proud to provide one of best crypto payment&#8230;<\/p>\n","protected":false},"author":17,"featured_media":7926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107,108],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital learning that makes the difference: when safety becomes PHYGITAL<\/title>\n<meta name=\"description\" content=\"in our lives and the internet has become a part of our daily routine. Think about it: Every day, we stay in touch with friends and family, work, study, play, shop, and pay bills via a mobile device or a computer.While the internet offers us many benefits, it also exposes us to a number of security risks that we are not even aware of. These include the integrity of our identity, our privacy, and the security of our electronic communications, especially financial transactions, as well as the potential exposure to offensive and illegal content and behaviour.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital learning that makes the difference: when safety becomes PHYGITAL\" \/>\n<meta property=\"og:description\" content=\"Digital security protection is something that can no longer be ignored: we must be aware and create healthy habits in this context as well.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OpenKnowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T13:18:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Post-FB-LIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2501\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"opnk-tech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Digital learning that makes the difference: when safety becomes PHYGITAL\" \/>\n<meta name=\"twitter:description\" content=\"Digital security protection is something that can no longer be ignored: we must be aware and create healthy habits in this context as well.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Post-FB-LIN.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"opnk-tech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/\",\"url\":\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/\",\"name\":\"Digital learning that makes the difference: when safety becomes PHYGITAL\",\"isPartOf\":{\"@id\":\"https:\/\/www.open-knowledge.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg\",\"datePublished\":\"2022-05-18T13:18:24+00:00\",\"dateModified\":\"2022-05-18T13:18:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.open-knowledge.it\/#\/schema\/person\/7cbcba7da0fe1ad190deef9aed014e77\"},\"description\":\"in our lives and the internet has become a part of our daily routine. Think about it: Every day, we stay in touch with friends and family, work, study, play, shop, and pay bills via a mobile device or a computer.While the internet offers us many benefits, it also exposes us to a number of security risks that we are not even aware of. These include the integrity of our identity, our privacy, and the security of our electronic communications, especially financial transactions, as well as the potential exposure to offensive and illegal content and behaviour.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg\",\"contentUrl\":\"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg\",\"width\":1521,\"height\":1522},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.open-knowledge.it\/#website\",\"url\":\"https:\/\/www.open-knowledge.it\/\",\"name\":\"OpenKnowledge\",\"description\":\"We make your digital future possible\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.open-knowledge.it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.open-knowledge.it\/#\/schema\/person\/7cbcba7da0fe1ad190deef9aed014e77\",\"name\":\"opnk-tech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.open-knowledge.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/748dbb4bc09c7c6f7a4e6f175aac6556?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/748dbb4bc09c7c6f7a4e6f175aac6556?s=96&d=mm&r=g\",\"caption\":\"opnk-tech\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital learning that makes the difference: when safety becomes PHYGITAL","description":"in our lives and the internet has become a part of our daily routine. Think about it: Every day, we stay in touch with friends and family, work, study, play, shop, and pay bills via a mobile device or a computer.While the internet offers us many benefits, it also exposes us to a number of security risks that we are not even aware of. These include the integrity of our identity, our privacy, and the security of our electronic communications, especially financial transactions, as well as the potential exposure to offensive and illegal content and behaviour.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Digital learning that makes the difference: when safety becomes PHYGITAL","og_description":"Digital security protection is something that can no longer be ignored: we must be aware and create healthy habits in this context as well.","og_url":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/","og_site_name":"OpenKnowledge","article_published_time":"2022-05-18T13:18:24+00:00","og_image":[{"width":2501,"height":1309,"url":"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Post-FB-LIN.jpg","type":"image\/jpeg"}],"author":"opnk-tech","twitter_card":"summary_large_image","twitter_title":"Digital learning that makes the difference: when safety becomes PHYGITAL","twitter_description":"Digital security protection is something that can no longer be ignored: we must be aware and create healthy habits in this context as well.","twitter_image":"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Post-FB-LIN.jpg","twitter_misc":{"Written by":"opnk-tech","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/","url":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/","name":"Digital learning that makes the difference: when safety becomes PHYGITAL","isPartOf":{"@id":"https:\/\/www.open-knowledge.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg","datePublished":"2022-05-18T13:18:24+00:00","dateModified":"2022-05-18T13:18:24+00:00","author":{"@id":"https:\/\/www.open-knowledge.it\/#\/schema\/person\/7cbcba7da0fe1ad190deef9aed014e77"},"description":"in our lives and the internet has become a part of our daily routine. Think about it: Every day, we stay in touch with friends and family, work, study, play, shop, and pay bills via a mobile device or a computer.While the internet offers us many benefits, it also exposes us to a number of security risks that we are not even aware of. These include the integrity of our identity, our privacy, and the security of our electronic communications, especially financial transactions, as well as the potential exposure to offensive and illegal content and behaviour.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.open-knowledge.it\/en\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.open-knowledge.it\/en\/cyber-security\/#primaryimage","url":"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg","contentUrl":"https:\/\/www.open-knowledge.it\/wp-content\/uploads\/2022\/05\/OKblog_CyberSec_Anteprima.jpg","width":1521,"height":1522},{"@type":"WebSite","@id":"https:\/\/www.open-knowledge.it\/#website","url":"https:\/\/www.open-knowledge.it\/","name":"OpenKnowledge","description":"We make your digital future possible","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.open-knowledge.it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.open-knowledge.it\/#\/schema\/person\/7cbcba7da0fe1ad190deef9aed014e77","name":"opnk-tech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.open-knowledge.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/748dbb4bc09c7c6f7a4e6f175aac6556?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/748dbb4bc09c7c6f7a4e6f175aac6556?s=96&d=mm&r=g","caption":"opnk-tech"}}]}},"_links":{"self":[{"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/posts\/7961"}],"collection":[{"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/comments?post=7961"}],"version-history":[{"count":3,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/posts\/7961\/revisions"}],"predecessor-version":[{"id":7969,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/posts\/7961\/revisions\/7969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/media\/7926"}],"wp:attachment":[{"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/media?parent=7961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/categories?post=7961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.open-knowledge.it\/en\/wp-json\/wp\/v2\/tags?post=7961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}