{"id":626,"date":"2025-02-05T09:28:45","date_gmt":"2025-02-05T09:28:45","guid":{"rendered":"https:\/\/phishia.fr\/?page_id=626"},"modified":"2025-11-03T08:28:50","modified_gmt":"2025-11-03T08:28:50","slug":"phishing","status":"publish","type":"page","link":"https:\/\/phishia.fr\/it\/gestione-e-conformita\/formazione-di-sensibilizzazione\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"626\" class=\"elementor elementor-626\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0d55e6 e-flex e-con-boxed e-con e-parent\" data-id=\"d0d55e6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d2f750 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5d2f750\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4dfe5be e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4dfe5be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-47422dd e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"47422dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46a7789 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"46a7789\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c242c elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"66c242c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbc721f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"dbc721f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il phishing \u00e8 un attacco informatico comune che mira a ingannare gli utenti per ottenere informazioni riservate tramite e-mail, messaggi o siti web fraudolenti.<\/p><p>Ora il principale vettore di intrusione nelle aziende (94% dei casi), \u00e8 diventato pi\u00f9 sofisticato.<\/p><p>La formazione del personale attraverso l'esperienza \u00e8 una protezione essenziale contro questa minaccia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-beb1e60 e-con-full e-flex e-con e-child\" data-id=\"beb1e60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-281a009 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"281a009\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/it\/contatto\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ho un progetto<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9152919 e-con-full e-flex e-con e-child\" data-id=\"9152919\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-52ab7b4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"52ab7b4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b993d90 elementor-widget elementor-widget-text-editor\" data-id=\"b993d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia lavora con <span style=\"text-decoration: underline;\"><a href=\"https:\/\/avantdecliquer.com\">Prima di fare clic<\/a><\/span>\u00a0per abilitare <strong>CIO, CISO, DPO e senior manager<\/strong> ridurre drasticamente il rischio informatico.<\/p><p>Avant De Clic \u00e8 una soluzione riconosciuta e certificata dall'ANSSI e dal programma francese di Cyber Malveillance.<\/p><p>Prima di fare clic offre un <strong>una serie di campagne di sensibilizzazione sul phishing adattate ai livelli di competenza dei dipendenti<\/strong> in aziende con 1000 modelli. Queste campagne vanno da programmi di base per i neofiti della sicurezza informatica a campagne avanzate per i pi\u00f9 esperti. Questo approccio personalizzato garantisce che tutti i membri dell'azienda ricevano la giusta formazione per rafforzare la loro capacit\u00e0 di riconoscere e contrastare gli attacchi di phishing.<\/p><p>Inoltre, possiamo progettare <strong>campagne su misura<\/strong> per soddisfare le esigenze specifiche di ogni azienda.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-032d56a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"032d56a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e27fb7e elementor-widget elementor-widget-image\" data-id=\"e27fb7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/avantdecliquer.com\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"592\" height=\"595\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1.png\" class=\"attachment-medium_large size-medium_large wp-image-135\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1.png 592w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1-298x300.png 298w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1-150x150.png 150w\" sizes=\"(max-width: 592px) 100vw, 592px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-169822f elementor-widget elementor-widget-image\" data-id=\"169822f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-1897\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-768x768.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-300x300.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-150x150.png 150w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi.png 800w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc4f7c elementor-widget elementor-widget-image\" data-id=\"dcc4f7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"767\" height=\"488\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance.png\" class=\"attachment-medium_large size-medium_large wp-image-1898\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance.png 767w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance-300x191.png 300w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f040a5 e-con-full e-grid e-con e-child\" data-id=\"9f040a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6b6780d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6b6780d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e16d162 elementor-widget elementor-widget-heading\" data-id=\"e16d162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Obiettivo: ridurre il rischio di attacchi informatici di un fattore pari al 10<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a77afe elementor-widget elementor-widget-text-editor\" data-id=\"7a77afe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia organizza campagne progressive di sensibilizzazione sul phishing, liberando il reparto IT da questo compito. Questo servizio aiuta le aziende a conformarsi al RGPD adottando misure organizzative adeguate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bc60d4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3bc60d4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd151b3 elementor-widget elementor-widget-heading\" data-id=\"dd151b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Crescita su 12 mesi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de72f9 elementor-widget elementor-widget-text-editor\" data-id=\"2de72f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dopo dodici mesi, i risultati mostrano un notevole miglioramento. Grazie alle campagne di phishing scaglionate, i dipendenti sono diventati pi\u00f9 vigili di fronte alle minacce online, riducendo significativamente il rischio di attacchi riusciti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-153ef61 e-con-full e-flex e-con e-child\" data-id=\"153ef61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9d7abb7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9d7abb7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e048f4b elementor-widget elementor-widget-heading\" data-id=\"e048f4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Imparare facendo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b80f206 elementor-widget elementor-widget-text-editor\" data-id=\"b80f206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ecco un esempio di e-mail di phishing che possiamo inviarvi come parte della campagna:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23b035 elementor-widget elementor-widget-image\" data-id=\"a23b035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTg5OSwidXJsIjoiaHR0cHM6XC9cL3BoaXNoaWEuZnJcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjVcLzAzXC9GaXJlU2hvdC1DYXB0dXJlLTAwOC1QaGlzaGlhLUNhbXBhZ25lLWRlLVBoaXNoaW5nLXd3dy5waGlzaGlhLmZyXy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1351\" height=\"691\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png\" class=\"attachment-full size-full wp-image-1899\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png 1351w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-300x153.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-1024x524.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-768x393.png 768w\" sizes=\"(max-width: 1351px) 100vw, 1351px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8e9dc elementor-widget elementor-widget-text-editor\" data-id=\"5d8e9dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Se l'utente clicca sul link, viene reindirizzato a una pagina di accesso o a una pagina di sensibilizzazione. In tutti i casi, i loro progressi saranno tracciati in modo da poter proporre campagne in base al loro livello esatto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9b542e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"e9b542e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c35e0d6 e-con-full e-flex e-con e-child\" data-id=\"c35e0d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b127bb3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b127bb3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd10ef7 elementor-widget elementor-widget-heading\" data-id=\"cd10ef7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Il nostro blog<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e286e2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e286e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6cbce2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"b6cbce2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Scoprite le ultime novit\u00e0 e tendenze in materia di gestione e conformit\u00e0.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bb07bc elementor-grid-tablet-1 elementor-widget-tablet__width-initial elementor-grid-3 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"3bb07bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:208,&quot;masonry&quot;:&quot;yes&quot;,&quot;columns_tablet&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4300 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4300 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2026\/02\/SECTEUR-PUBLIC-COLLECTIVITES.png\");}<\/style><style id=\"loop-208\">.elementor-208 .elementor-element.elementor-element-5df6e6f{--display:flex;--min-height:0px;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;}.elementor-widget-post-info .elementor-icon-list-item:not(:last-child):after{border-color:var( --e-global-color-text );}.elementor-widget-post-info .elementor-icon-list-icon i{color:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-text, .elementor-widget-post-info .elementor-icon-list-text a{color:var( --e-global-color-secondary );}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon{width:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon i{font-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon svg{--e-icon-list-icon-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text, .elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text a{color:var( --e-global-color-ae5c0d5 );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-item{font-family:\"Space Grotesk\", Sans-serif;font-size:14px;font-weight:600;text-transform:uppercase;letter-spacing:2.2px;}.elementor-208 .elementor-element.elementor-element-5a4044e > .elementor-widget-container{margin:0px 0px 0px 0px;padding:7px 10px 4px 10px;background-color:#1446A066;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-ae5c0d5 );border-radius:8px 8px 8px 8px;}.elementor-208 .elementor-element.elementor-element-5a4044e.elementor-element{--align-self:flex-start;}body:not(.rtl) .elementor-208 .elementor-element.elementor-element-5a4044e{left:10px;}body.rtl .elementor-208 .elementor-element.elementor-element-5a4044e{right:10px;}.elementor-208 .elementor-element.elementor-element-5a4044e{top:10px;}.elementor-208 .elementor-element.elementor-element-cafbeac{--display:flex;--min-height:300px;--border-radius:5px 5px 5px 5px;box-shadow:0px 8px 24px 0px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.2);}.elementor-208 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .elementor-208 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-secondary );background-repeat:no-repeat;background-size:cover;}.elementor-208 .elementor-element.elementor-element-cafbeac:hover{box-shadow:0px 8px 24px 8px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.3);}.elementor-208 .elementor-element.elementor-element-466dfd9{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:flex-start;--gap:25px 25px;--row-gap:25px;--column-gap:25px;}.elementor-widget-image .widget-image-caption{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-c50e89f img{width:30px;filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );}.elementor-208 .elementor-element.elementor-element-c50e89f > .elementor-widget-container{margin:-5px 15px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-208 .elementor-element.elementor-element-0dd511b{text-align:start;}.elementor-208 .elementor-element.elementor-element-0dd511b .elementor-heading-title{font-family:\"Montserrat\", Sans-serif;font-size:16px;font-weight:500;color:var( --e-global-color-text );}@media(max-width:767px){.elementor-208 .elementor-element.elementor-element-466dfd9{--flex-direction:row;--container-widget-width:initial;--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--flex-wrap:nowrap;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4300 post-4300 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/aipd-perche-lanalisi-dimpatto-e-lo-scudo-giuridico-per-gli-enti-locali-nel-2026\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/aipd-perche-lanalisi-dimpatto-e-lo-scudo-giuridico-per-gli-enti-locali-nel-2026\/\">AIPD: Perch\u00e9 le valutazioni d'impatto saranno lo scudo legale per le autorit\u00e0 locali nel 2026<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4123 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4123 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4123 post-4123 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite category-surveillance tag-aeronautique\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/it\/blog\/tag\/aeronautica\/\" class=\"elementor-post-info__terms-list-item\">Aeronautica<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/\">L'effetto domino del cyber. Perch\u00e9 l'EASA e la Parte IS richiedono il monitoraggio dei fornitori.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-3854 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-3854 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Capture-decran-2024-10-03-a-17.32.55.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-3854 post-3854 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite tag-sante\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/it\/blog\/tag\/salute\/\" class=\"elementor-post-info__terms-list-item\">Salute<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/programma-di-assistenza-area-2-finanziamento-per-la-vostra-struttura-di-assistenza-medica-e-sociale\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/programma-di-assistenza-area-2-finanziamento-per-la-vostra-struttura-di-assistenza-medica-e-sociale\/\">Programma CaRE - Area 2: finanziamenti per la vostra struttura medico-sociale.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e54602d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e54602d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/it\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vedi tutti i nostri articoli<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing Le phishing est une attaque cybern\u00e9tique courante visant \u00e0 tromper les utilisateurs pour obtenir des informations confidentielles via des courriels, messages ou sites frauduleux. Devenu le principal vecteur d&rsquo;intrusion dans les entreprises (94% des cas), il s&rsquo;est sophistiqu\u00e9. Sensibiliser le personnel par l&rsquo;exp\u00e9rience est une protection essentielle contre cette menace. J&rsquo;ai un projet Phishia [&hellip;]<\/p>","protected":false},"author":2,"featured_media":414,"parent":624,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-626","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing - Phishia<\/title>\n<meta name=\"description\" content=\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d&#039;entr\u00e9e dans les SI des entreprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/gestione-e-conformita\/formazione-di-sensibilizzazione\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing - Phishia\" \/>\n<meta property=\"og:description\" content=\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d&#039;entr\u00e9e dans les SI des entreprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/gestione-e-conformita\/formazione-di-sensibilizzazione\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T08:28:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\",\"url\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\",\"name\":\"Phishing - Phishia\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"datePublished\":\"2025-02-05T09:28:45+00:00\",\"dateModified\":\"2025-11-03T08:28:50+00:00\",\"description\":\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d'entr\u00e9e dans les SI des entreprises.\",\"breadcrumb\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/phishia.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sensibilisation et formation\",\"item\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/phishia.fr\/#website\",\"url\":\"https:\/\/phishia.fr\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/phishia.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/phishia.fr\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\/\/phishia.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/phishia\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing - Phishia","description":"Gli attacchi di phishing sono diventati sempre pi\u00f9 sofisticati e, soprattutto, il mezzo principale per accedere ai sistemi informativi aziendali.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/gestione-e-conformita\/formazione-di-sensibilizzazione\/phishing\/","og_locale":"it_IT","og_type":"article","og_title":"Phishing - Phishia","og_description":"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d'entr\u00e9e dans les SI des entreprises.","og_url":"https:\/\/phishia.fr\/it\/gestione-e-conformita\/formazione-di-sensibilizzazione\/phishing\/","og_site_name":"Phishia","article_modified_time":"2025-11-03T08:28:50+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/","url":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/","name":"Phishing - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","datePublished":"2025-02-05T09:28:45+00:00","dateModified":"2025-11-03T08:28:50+00:00","description":"Gli attacchi di phishing sono diventati sempre pi\u00f9 sofisticati e, soprattutto, il mezzo principale per accedere ai sistemi informativi aziendali.","breadcrumb":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/"},{"@type":"ListItem","position":3,"name":"Sensibilisation et formation","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/"},{"@type":"ListItem","position":4,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/pages\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":16,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/pages\/626\/revisions"}],"predecessor-version":[{"id":3626,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/pages\/626\/revisions\/3626"}],"up":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/pages\/624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}