{"id":12656,"date":"2024-01-16T19:45:30","date_gmt":"2024-01-16T19:45:30","guid":{"rendered":"https:\/\/legacy.boit.cz\/how-to-protect-your-data-and-digital-identity\/"},"modified":"2024-07-31T11:51:08","modified_gmt":"2024-07-31T11:51:08","slug":"how-to-protect-your-data-and-digital-identity","status":"publish","type":"post","link":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/","title":{"rendered":"How to protect your data and digital identity"},"content":{"rendered":"\n<p>In this webinar, our IT security champion <strong>Pavel Mat\u011bj\u00ed\u010dek<\/strong> focused on several important topics in the field of cyber security.\nIn the introduction, you can learn how to <strong>recognize phishing<\/strong> and avoid falling into the traps of modern cyber attacks not only via email.\nNext, the <strong>future without passwords<\/strong> was discussed &#8211; what alternatives await us and when will it come?\nIs it even possible?\nThere was also talk about how to <strong>protect your online identity<\/strong> and what technology it is good to equip yourself with.    <\/p>\n\n<!--more-->\n\n<h2 class=\"wp-block-heading\">Webinar recording<\/h2>\n\n<div style=\"padding:56.25% 0 0 0;position:relative;\"><iframe src=\"https:\/\/player.vimeo.com\/video\/903241166?h=a581dba3a3&#038;badge=0&#038;autopause=0&#038;player_id=0&#038;app_id=58479\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" style=\"position:absolute;top:0;left:0;width:100%;height:100%;\" title=\"How to protect data - BOT+jsemnaznacky\"><\/iframe><\/div><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script>\n\n<h2 class=\"wp-block-heading\">How to spot phishing?<\/h2>\n\n<p>Recently, due to the increasing number of attacks, it has become <strong>more difficult to distinguish<\/strong> what type of fraud we are dealing with.\nSo what exactly is phishing?\nIt is one of the so-called <strong>social engineering<\/strong> methods that uses manipulation to get your login details or other important data.\nThose there are times when its recognition was easy.\nThe attack was characterized by poor, broken, or machine-translated English, and this &#8220;improvement&#8221; is mainly due to the improvement of automatic translators.      <\/p>\n\n<p>The fraudulent email or message usually requires you to go to a&nbsp;<strong>fraudulent website<\/strong> where you log in, open a&nbsp;malicious <strong>attachment full of malware<\/strong>, etc.\nThis either <strong>steals your login credentials<\/strong> or compromises the malware.\nThe phishing will have served its purpose and you will have let yourself off the hook.\nThese attacks are successful about <strong>60% of the<\/strong> time.   <\/p>\n\n<h3 class=\"wp-block-heading\">Types of phishing<\/h3>\n\n<h4 class=\"wp-block-heading\">Familiar classics and current novelties<\/h4>\n\n<p>Here we have a&nbsp;classic that every user has seen at least once &#8211; an <strong>email<\/strong> arrives, written in such a&nbsp;way that everyone can find some part of it and is therefore<strong> easily believable<\/strong>.\nIt still contains occasional grammatical errors, the click-through sometimes lacks an HTTPS certificate, and usually <strong>doesn&#8217;t target you personally<\/strong>.\nIt can be an official email from an institution, a&nbsp;product offer, etc.  <\/p>\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"790\" height=\"623\" src=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\" alt=\"\" class=\"wp-image-9747\" srcset=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png 790w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52-300x237.png 300w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52-768x606.png 768w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52-720x568.png 720w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><\/figure>\n\n<p>Then there is<strong> spear phishing<\/strong>, which is <strong>specific and targeted<\/strong> either at you or your organisation.\nSo the attackers have already gone to some trouble to find out information about you and often impersonate <strong>someone you know<\/strong>.\nThis type of phishing is professionally handled, the fraudulent sites have a&nbsp;valid certificate and are <strong>very difficult to distinguish<\/strong> from the genuine ones.\nThe sender often uses so-called <strong>homoglyphs<\/strong>, i.e. characters that are very similar to each other so that you cannot tell them apart when you read them.   <\/p>\n\n<h3 class=\"wp-block-heading\">Phishing is no longer just emails<\/h3>\n\n<p>Before Christmas, we saw a&nbsp;mass load of <strong>smishing<\/strong>, i.e. phishing by SMS messages.\nWith this type of attack, attackers try to bypass the anti-spam and anti-phishing tools that are on computers and rely on the fact that ordinary users do not have anything like this on their phones.\nAgain, they use various tricks to get you <strong>to click through<\/strong> &#8211; <em>copy this link into your browser<\/em>, etc.    <\/p>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"761\" height=\"641\" src=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/alza-cz-podvod-sms-phishing-1.webp\" alt=\"\" class=\"wp-image-9748\" srcset=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/alza-cz-podvod-sms-phishing-1.webp 761w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/alza-cz-podvod-sms-phishing-1-300x253.webp 300w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/alza-cz-podvod-sms-phishing-1-720x606.webp 720w\" sizes=\"(max-width: 761px) 100vw, 761px\" \/><\/figure>\n\n<p><strong>Vishing <\/strong>is not a&nbsp;scam message but a&nbsp;<strong>phone call<\/strong> designed to get as much information out of you as possible, which is then often used for the next attack.\nThe other possibility is that the attacker is directly asking you to take an action &#8211; open an email, log in somewhere, download an app to your desktop&#8230; <\/p>\n\n<p>A hot new trend that is now enjoying unprecedented growth is <strong>quishing<\/strong>, a&nbsp;form <strong>of QR code fraud<\/strong> that takes you to a&nbsp;scammer&#8217;s&nbsp;site where you then lose your details.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"790\" height=\"405\" src=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/QR-Phishing1.webp\" alt=\"\" class=\"wp-image-9749\" srcset=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/QR-Phishing1.webp 790w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/QR-Phishing1-300x154.webp 300w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/QR-Phishing1-768x394.webp 768w, https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/QR-Phishing1-720x369.webp 720w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><\/figure>\n\n<p>Currently, we can also encounter many other models of social engineering that are no less insidious, such as the so-called <strong>OMG cable<\/strong>.\nThis looks like a&nbsp;perfectly ordinary cable that you use to connect your phone to your computer, but the catch is that it <strong>can create a&nbsp;separate Wi-Fi hotspot<\/strong> that an attacker can connect to remotely and record everything you type, including passwords or other sensitive data.   <\/p>\n\n<h2 class=\"wp-block-heading\">Interested in more?<\/h2>\n\n<p><a href=\"https:\/\/spajk.cz\/phishing-quishing-spam-a-scam-co-je-co-a-jak-se-v-tom-vyznat\/\">Phishing, quishing, SPAM and SCAM &#8211; what is what and how to know what it is<\/a><br\/><a href=\"https:\/\/supertekboy.com\/2020\/07\/15\/url-impersonation-homoglyph-attacks\/\">More about homoglyphs<\/a><br\/><a href=\"https:\/\/www.irongeek.com\/homoglyph-attack-generator.php\">Homoglyph Generator<\/a><br\/><a href=\"https:\/\/crm.boit.cloud\/url-analyzer\/\">URL Analyzer<\/a><br\/><a href=\"https:\/\/mha.azurewebsites.net\/\">Email Header Analyzer<\/a><br\/><a href=\"https:\/\/chromewebstore.google.com\/detail\/vt4browsers\/efbjojhplkelaegfbieplglfidafgoka?pli=1\">VirusTotal<\/a><\/p>\n\n<h2 class=\"wp-block-heading\">Is there a&nbsp;future without passwords?<\/h2>\n\n<p>The trouble with passwords is that they are needed in large numbers and are difficult to remember.\nA&nbsp;good <strong>secure password<\/strong> should be around 15 characters long, should be random and should contain a&nbsp;variety of characters.\nThat&#8217;s&nbsp;why it is more than advisable to choose and use a&nbsp;<strong>password manager<\/strong> that will do the hard work for you, plus help you spot fraudulent sites.\nIt is definitely not advisable to use the same passwords across all different user accounts!   <\/p>\n\n<h3 class=\"wp-block-heading\">How long will the passwords be with us?<\/h3>\n\n<p>But passwords will definitely be with us for a&nbsp;long time; many institutions and services still haven&#8217;t discovered two-factor authentication and still have passwords posted on monitors and the like.\nSome services are already approaching logging in with so-called\n&#8220;passkey.&#8221; <strong>A passkey <\/strong>is a&nbsp;digital record that securely links your information to a&nbsp;service using, for example, a&nbsp;fingerprint, facial scan, or other display lock to replace manual password entry.\nBut then there are a&nbsp;number of services that don&#8217;t use this option and won&#8217;t for a&nbsp;long time.   <\/p>\n\n<h2 class=\"wp-block-heading\">Useful links<\/h2>\n\n<p><a href=\"https:\/\/spajk.cz\/bitwarden-spravce-hesel-zdarma\/\"><\/a><a href=\"https:\/\/spajk.cz\/bitwarden-spravce-hesel-zdarma\/\">Password Manager &#8211; how to do it?<\/a><br\/><a href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\"><\/a><a href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\">How secure is my password?<\/a><br\/><a href=\"https:\/\/tech.co\/password-managers\/how-long-hacker-crack-password\"><\/a><a href=\"https:\/\/tech.co\/password-managers\/how-long-hacker-crack-password\">How long would it take to crack my password?<\/a><br\/><a href=\"https:\/\/www.stickypassword.com\/cs\/\"><\/a><a href=\"https:\/\/www.stickypassword.com\/cs\/\">Sticky Password<\/a><br\/><a href=\"https:\/\/bitwarden.com\/\"><\/a><a href=\"https:\/\/bitwarden.com\/\">Bitwarden<\/a><br\/><a href=\"https:\/\/vimeo.com\/473828583\/417d12ab63?share=copy\"><\/a><a href=\"https:\/\/vimeo.com\/473828583\/417d12ab63?share=copy\">How to use bitwarden?<\/a><br\/><a href=\"https:\/\/support.apple.com\/cs-cz\/guide\/iphone\/iph5acc5b28c\/17.0\/ios\/17.0\"><\/a><a href=\"https:\/\/support.apple.com\/cs-cz\/guide\/iphone\/iph5acc5b28c\/17.0\/ios\/17.0\">Passkey for iPhone<\/a><br\/><a href=\"https:\/\/myaccount.google.com\/signinoptions\/passkeys\"><\/a><a href=\"https:\/\/myaccount.google.com\/signinoptions\/passkeys\">Passkey for Android<\/a><br\/><a href=\"https:\/\/haveibeenpwned.com\/\"><\/a><a href=\"https:\/\/haveibeenpwned.com\/\">have i&nbsp;been pwned?<\/a><br\/><a href=\"https:\/\/www.seznamzpravy.cz\/clanek\/tech-technologie-internet-zmente-si-hesla-a-prchejte-po-pul-roce-lastpass-priznal-co-jim-ukradli-227282\"><\/a><a href=\"https:\/\/www.seznamzpravy.cz\/clanek\/tech-technologie-internet-zmente-si-hesla-a-prchejte-po-pul-roce-lastpass-priznal-co-jim-ukradli-227282\">Why not use LastPass?<\/a><br\/><a href=\"https:\/\/spajk.cz\/digitalni-pozustalost-myslete-na-ni-nez-to-prijde\/\"><\/a><a href=\"https:\/\/spajk.cz\/digitalni-pozustalost-myslete-na-ni-nez-to-prijde\/\">Digital legacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this webinar, our IT security champion Pavel Mat\u011bj\u00ed\u010dek focused on several important topics in the field of cyber security. In the introduction, you can learn how to recognize phishing and avoid falling into the traps of modern cyber attacks not only via email. Next, the future without passwords was discussed &#8211; what alternatives await [&hellip;]<\/p>\n","protected":false},"author":223,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-12656","post","type-post","status-publish","format-standard","hentry","category-magazine"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT<\/title>\n<meta name=\"description\" content=\"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT\" \/>\n<meta property=\"og:description\" content=\"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"BOIT | Bezpe\u010dnost a ochrana IT\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-16T19:45:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-31T11:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\" \/>\n<meta name=\"author\" content=\"Veronika Veinlichov\u00e1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Veronika Veinlichov\u00e1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\"},\"author\":{\"name\":\"Veronika Veinlichov\u00e1\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/#\/schema\/person\/cb7d3d2439d6e31ce0b4f8c04266eacb\"},\"headline\":\"How to protect your data and digital identity\",\"datePublished\":\"2024-01-16T19:45:30+00:00\",\"dateModified\":\"2024-07-31T11:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\",\"articleSection\":[\"Magazine\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\",\"url\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\",\"name\":\"How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\",\"datePublished\":\"2024-01-16T19:45:30+00:00\",\"dateModified\":\"2024-07-31T11:51:08+00:00\",\"description\":\"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage\",\"url\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\",\"contentUrl\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/legacy.boit.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your data and digital identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/#website\",\"url\":\"https:\/\/legacy.boit.cz\/en\/\",\"name\":\"BOIT | Bezpe\u010dnost a ochrana IT\",\"description\":\"Everything for cyber security in one place\",\"publisher\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.boit.cz\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/#organization\",\"name\":\"BOIT | Bezpe\u010dnost a ochrana IT\",\"url\":\"https:\/\/legacy.boit.cz\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/bm_boit_logo_rgb_color.png\",\"contentUrl\":\"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/bm_boit_logo_rgb_color.png\",\"width\":561,\"height\":178,\"caption\":\"BOIT | Bezpe\u010dnost a ochrana IT\"},\"image\":{\"@id\":\"https:\/\/legacy.boit.cz\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.boit.cz\/en\/#\/schema\/person\/cb7d3d2439d6e31ce0b4f8c04266eacb\",\"name\":\"Veronika Veinlichov\u00e1\",\"url\":\"https:\/\/legacy.boit.cz\/en\/author\/verca\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT","description":"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT","og_description":"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.","og_url":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/","og_site_name":"BOIT | Bezpe\u010dnost a ochrana IT","article_published_time":"2024-01-16T19:45:30+00:00","article_modified_time":"2024-07-31T11:51:08+00:00","og_image":[{"url":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png","type":"","width":"","height":""}],"author":"Veronika Veinlichov\u00e1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Veronika Veinlichov\u00e1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#article","isPartOf":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/"},"author":{"name":"Veronika Veinlichov\u00e1","@id":"https:\/\/legacy.boit.cz\/en\/#\/schema\/person\/cb7d3d2439d6e31ce0b4f8c04266eacb"},"headline":"How to protect your data and digital identity","datePublished":"2024-01-16T19:45:30+00:00","dateModified":"2024-07-31T11:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/"},"wordCount":902,"publisher":{"@id":"https:\/\/legacy.boit.cz\/en\/#organization"},"image":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png","articleSection":["Magazine"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/","url":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/","name":"How to protect your data and digital identity - BOIT | Bezpe\u010dnost a ochrana IT","isPartOf":{"@id":"https:\/\/legacy.boit.cz\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage"},"image":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png","datePublished":"2024-01-16T19:45:30+00:00","dateModified":"2024-07-31T11:51:08+00:00","description":"A recording of the webinar and a short summary article to help you stay safe online. The keynote speaker is respected expert Pavel Mat\u011bj\u00ed\u010dek.","breadcrumb":{"@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#primaryimage","url":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png","contentUrl":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/Snimek-obrazovky-2022-07-19-v-15.10.52.png"},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.boit.cz\/en\/how-to-protect-your-data-and-digital-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/legacy.boit.cz\/en\/"},{"@type":"ListItem","position":2,"name":"How to protect your data and digital identity"}]},{"@type":"WebSite","@id":"https:\/\/legacy.boit.cz\/en\/#website","url":"https:\/\/legacy.boit.cz\/en\/","name":"BOIT | Bezpe\u010dnost a ochrana IT","description":"Everything for cyber security in one place","publisher":{"@id":"https:\/\/legacy.boit.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.boit.cz\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/legacy.boit.cz\/en\/#organization","name":"BOIT | Bezpe\u010dnost a ochrana IT","url":"https:\/\/legacy.boit.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legacy.boit.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/bm_boit_logo_rgb_color.png","contentUrl":"https:\/\/legacy.boit.cz\/wp-content\/uploads\/2024\/01\/bm_boit_logo_rgb_color.png","width":561,"height":178,"caption":"BOIT | Bezpe\u010dnost a ochrana IT"},"image":{"@id":"https:\/\/legacy.boit.cz\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/legacy.boit.cz\/en\/#\/schema\/person\/cb7d3d2439d6e31ce0b4f8c04266eacb","name":"Veronika Veinlichov\u00e1","url":"https:\/\/legacy.boit.cz\/en\/author\/verca\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/posts\/12656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/users\/223"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/comments?post=12656"}],"version-history":[{"count":1,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/posts\/12656\/revisions"}],"predecessor-version":[{"id":12657,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/posts\/12656\/revisions\/12657"}],"wp:attachment":[{"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/media?parent=12656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/categories?post=12656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/legacy.boit.cz\/en\/wp-json\/wp\/v2\/tags?post=12656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}