{"id":3124,"date":"2025-03-13T15:52:57","date_gmt":"2025-03-13T14:52:57","guid":{"rendered":"https:\/\/ukotek.com\/?page_id=3124"},"modified":"2025-03-13T17:48:48","modified_gmt":"2025-03-13T16:48:48","slug":"seguridad-moderna-resistente-al-phishing","status":"publish","type":"page","link":"https:\/\/ukotek.com\/it\/soluciones\/seguridad-moderna-resistente-al-phishing\/","title":{"rendered":"Sicurezza moderna a prova di phishing"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3124\" class=\"elementor elementor-3124\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5434624 e-flex e-con-boxed e-con e-parent\" data-id=\"5434624\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-578b51a elementor-widget elementor-widget-spacer\" data-id=\"578b51a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cac65dd e-flex e-con-boxed e-con e-parent\" data-id=\"cac65dd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3813b42 e-con-full e-flex e-con e-child\" data-id=\"3813b42\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb7717 elementor-widget elementor-widget-heading\" data-id=\"4cb7717\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Sicurezza moderna a prova di phishing<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f55f4f0 elementor-widget elementor-widget-heading\" data-id=\"f55f4f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Evitare il furto d'identit\u00e0 con Yubikey<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2305f73 e-con-full e-flex e-con e-child\" data-id=\"2305f73\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9207cc8 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9207cc8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"521\" height=\"139\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\" class=\"attachment-full size-full wp-image-3126\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png 521w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1-300x80.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1-18x5.png 18w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-490fdf3 e-flex e-con-boxed e-con e-parent\" data-id=\"490fdf3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4c8fe2 elementor-pagination-position-outside elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"d4c8fe2\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;transition&quot;:&quot;fade&quot;,&quot;autoplay_speed&quot;:2000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Diapositive\" dir=\"ltr\" data-animation=\"\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-4355350 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Sapevate che i metodi MFA di base sono vulnerabili al phishing?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-de8bff6 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">L'attuale MFA blocca gli attacchi di phishing pi\u00f9 sofisticati?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-2b2f965 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Come garantire un accesso remoto sicuro senza affidarsi ai dispositivi mobili?<\/h3><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-755d3ab e-flex e-con-boxed e-con e-parent\" data-id=\"755d3ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-513587b e-con-full e-flex e-con e-child\" data-id=\"513587b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09843c5 elementor-widget elementor-widget-text-editor\" data-id=\"09843c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yubico ridefinisce l'autenticazione, offrendo soluzioni resistenti al phishing basate su hardware (Yubikey) che eliminano le vulnerabilit\u00e0 dei metodi MFA tradizionali, come gli SMS e le applicazioni di autenticazione, garantendo una sicurezza solida e affidabile per le organizzazioni di qualsiasi dimensione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-744f705 elementor-widget elementor-widget-premium-addon-button\" data-id=\"744f705\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRichiesta di consulenza\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d4616c e-con-full e-flex e-con e-child\" data-id=\"1d4616c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-872cd5d elementor-widget elementor-widget-text-editor\" data-id=\"872cd5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>DATI CHIAVE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-069e353 premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"069e353\" data-element_type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\r\n\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-5629bd8 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Prevenci\u00f3n total: Bloquea intentos de phishing con tecnolog\u00eda FIDO2 y WebAuthn.\"> Prevenzione totale: blocca i tentativi di phishing con la tecnologia FIDO2 e WebAuthn. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bc4eed1 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Escalabilidad: F\u00e1cil de implementar con opciones llave en mano.\"> Scalabilit\u00e0: facile da implementare con opzioni \"chiavi in mano\". <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bb67e4a premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Compatible: M\u00e1s de 1.000 integraciones\"> Compatibilit\u00e0: oltre 1.000 integrazioni <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-70c1743 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Ideal para entornos h\u00edbridos y remotos.\"> Ideale per ambienti ibridi e remoti. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-feaa6a1 e-flex e-con-boxed e-con e-parent\" data-id=\"feaa6a1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-acb3f48 e-con-full e-flex e-con e-child\" data-id=\"acb3f48\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-376f28c elementor-widget elementor-widget-text-editor\" data-id=\"376f28c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SFIDA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c0e16 elementor-widget elementor-widget-text-editor\" data-id=\"29c0e16\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I metodi di autenticazione come gli SMS e i codici monouso sono vulnerabili agli attacchi di phishing, al malware, allo spoofing delle SIM e agli attacchi man-in-the-middle. Una ricerca di Google, NYU e UCSD basata su 350.000 casi dimostra che queste soluzioni non sono efficaci contro il furto di account e gli attacchi mirati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c45709b e-con-full e-flex e-con e-child\" data-id=\"c45709b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5848a5 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"c5848a5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"706\" height=\"353\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1.png\" class=\"attachment-full size-full wp-image-3131\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1.png 706w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1-300x150.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1-18x9.png 18w\" sizes=\"(max-width: 706px) 100vw, 706px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b2843e e-flex e-con-boxed e-con e-parent\" data-id=\"7b2843e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a66f0ec e-con-full e-flex e-con e-child\" data-id=\"a66f0ec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b85668 elementor-widget elementor-widget-text-editor\" data-id=\"9b85668\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SOLUZIONE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c27239f elementor-widget elementor-widget-heading\" data-id=\"c27239f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Yubico: autenticazione resistente al phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a38dbeb elementor-widget elementor-widget-text-editor\" data-id=\"a38dbeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La distribuzione di YubiKey e l'onboarding degli utenti \u00e8 facile grazie alla nostra consulenza di esperti, agli abbonamenti aziendali e ai servizi chiavi in mano. Adattiamo il processo alle vostre esigenze, assicurandovi una transizione senza problemi verso un'autenticazione pi\u00f9 sicura.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abcc59b e-flex e-con-boxed e-con e-parent\" data-id=\"abcc59b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-638094f e-con-full e-flex e-con e-child\" data-id=\"638094f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-399a7b9 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"399a7b9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"643\" height=\"465\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1.png\" class=\"attachment-full size-full wp-image-3132\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1.png 643w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1-300x217.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1-18x12.png 18w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-196fc44 e-con-full e-flex e-con e-child\" data-id=\"196fc44\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-832be35 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"832be35\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"> Protezione contro il phishing:<\/h3><p class=\"elementor-image-box-description\">Sostituisce gli autenticatori mobili con la YubiKey, basata su standard aperti come FIDO2 e WebAuthn.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63315cf elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"63315cf\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sicurezza dell'accesso remoto<\/h3><p class=\"elementor-image-box-description\">Consente un MFA resistente al phishing per VPN e accesso remoto con PIV, OTP, FIDO U2F e FIDO2.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e7919d elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"0e7919d\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Accesso sicuro ai computer<\/h3><p class=\"elementor-image-box-description\">Aggiunge l'autenticazione a pi\u00f9 fattori su Mac, Windows e sistemi di directory come Active Directory ed Entra AD.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f03986 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"5f03986\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Gestione sicura delle password<\/h3><p class=\"elementor-image-box-description\">Integra YubiKey con gestori come 1Password, Dashlane e LastPass, evitando i rischi dovuti a politiche deboli.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6982e13 e-flex e-con-boxed e-con e-parent\" data-id=\"6982e13\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f54b72 e-con-full e-flex e-con e-child\" data-id=\"9f54b72\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ecd28 elementor-widget elementor-widget-heading\" data-id=\"b8ecd28\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Il nostro processo<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-484905e e-grid e-con-full e-con e-child\" data-id=\"484905e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3164aeb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3164aeb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"143\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01.png\" class=\"attachment-full size-full wp-image-3141\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01.png 113w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01-9x12.png 9w\" sizes=\"(max-width: 113px) 100vw, 113px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">1. Pianificazione<\/h3><p class=\"elementor-image-box-description\">Assicura la preparazione e l'allineamento prima dell'esecuzione.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2326f98 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2326f98\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"168\" height=\"113\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02.png\" class=\"attachment-full size-full wp-image-3140\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02.png 168w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02-18x12.png 18w\" sizes=\"(max-width: 168px) 100vw, 168px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">2. Convalida<\/h3><p class=\"elementor-image-box-description\">Testate con un piccolo gruppo di utenti prima dell'implementazione completa.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb0bcf elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0bb0bcf\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"112\" height=\"133\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03.png\" class=\"attachment-full size-full wp-image-3139\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03.png 112w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03-10x12.png 10w\" sizes=\"(max-width: 112px) 100vw, 112px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">3. Integrazione<\/h3><p class=\"elementor-image-box-description\">Assicurarsi che le applicazioni chiave siano compatibili con YubiKey.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faaa265 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"faaa265\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"149\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04.png\" class=\"attachment-full size-full wp-image-3138\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04.png 80w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04-6x12.png 6w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">4. Lancio<\/h3><p class=\"elementor-image-box-description\">Distribuire le chiavi con servizi chiavi in mano o con partner di canale.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc437b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"acc437b\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"166\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05.png\" class=\"attachment-full size-full wp-image-3137\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05.png 100w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05-7x12.png 7w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">5. Adozione<\/h3><p class=\"elementor-image-box-description\">Incoraggiare l'uso con la formazione e le migliori pratiche.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8a3753 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c8a3753\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"143\" height=\"144\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06.png\" class=\"attachment-full size-full wp-image-3136\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06.png 143w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06-12x12.png 12w\" sizes=\"(max-width: 143px) 100vw, 143px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">6. Valutazione<\/h3><p class=\"elementor-image-box-description\">Misura l'impatto sulla sicurezza e sul valore aziendale.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e4a63d e-flex e-con-boxed e-con e-parent\" data-id=\"9e4a63d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e3a5b14 e-con-full e-flex e-con e-child\" data-id=\"e3a5b14\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16df70d elementor-widget elementor-widget-heading\" data-id=\"16df70d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UKOTEK - partner ufficiale di YUBICO in Spagna<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b890969 elementor-widget elementor-widget-text-editor\" data-id=\"b890969\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Con oltre 20 anni di esperienza nel settore della cybersecurity, il team di Ukotek assiste le organizzazioni nell'implementazione di soluzioni avanzate per proteggere i loro asset digitali e garantire la loro continuit\u00e0 operativa.<\/p><p>Siamo specializzati nella fornitura di tecnologie innovative che proteggono le aziende dalle minacce informatiche in continua evoluzione. Il nostro team di esperti fornisce consulenza e assistenza tecnica personalizzata per garantire a ogni cliente una protezione ottimale.<\/p><p>Offriamo soluzioni scalabili adattate alle esigenze di ogni organizzazione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7645c3b e-con-full e-flex e-con e-child\" data-id=\"7645c3b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f6425 elementor-widget elementor-widget-heading\" data-id=\"e3f6425\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Desidero ricevere maggiori informazioni su YUBICO<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2599036 elementor-widget elementor-widget-html\" data-id=\"2599036\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script> <script> hbspt.forms.create({ portalId: \"144892228\", formId: \"bfdc8528-4f7e-4dc2-bdbb-37ae10e30056\" }); <\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-3124","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seguridad moderna resistente al phishing - Ukotek<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/soluciones\/seguridad-moderna-resistente-al-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad moderna resistente al phishing - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/soluciones\/seguridad-moderna-resistente-al-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T16:48:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"139\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\",\"url\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\",\"name\":\"Seguridad moderna resistente al phishing - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\",\"datePublished\":\"2025-03-13T14:52:57+00:00\",\"dateModified\":\"2025-03-13T16:48:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/ukotek.com\/soluciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seguridad moderna resistente al phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad moderna resistente al phishing - Ukotek","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/soluciones\/seguridad-moderna-resistente-al-phishing\/","og_locale":"it_IT","og_type":"article","og_title":"Seguridad moderna resistente al phishing - Ukotek","og_description":"Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]","og_url":"https:\/\/ukotek.com\/it\/soluciones\/seguridad-moderna-resistente-al-phishing\/","og_site_name":"Ukotek","article_modified_time":"2025-03-13T16:48:48+00:00","og_image":[{"width":521,"height":139,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/","url":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/","name":"Seguridad moderna resistente al phishing - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","datePublished":"2025-03-13T14:52:57+00:00","dateModified":"2025-03-13T16:48:48+00:00","breadcrumb":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/ukotek.com\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Seguridad moderna resistente al phishing"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/3124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=3124"}],"version-history":[{"count":16,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/3124\/revisions"}],"predecessor-version":[{"id":3167,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/3124\/revisions\/3167"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=3124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}