{"id":9359,"date":"2017-03-20T08:29:56","date_gmt":"2017-03-20T06:29:56","guid":{"rendered":"https:\/\/infopolicy.net\/?p=9359"},"modified":"2017-03-20T08:29:56","modified_gmt":"2017-03-20T06:29:56","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/infografika-mesyatsa-kiberbezopasnos\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"\u0413\u0438\u0433\u0430\u043d\u0442\u0441\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0441 \u043e\u0433\u0440\u043e\u043c\u043d\u044b\u043c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0430\u0441\u043f\u0435\u043a\u0442\u044b \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\r\n\r\n\u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0433\u0440\u0430\u0444\u0438\u043a\u0430\u0445 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0411\u0435\u043b\u0430\u0440\u0443\u0441\u044c:\r\n\r\n<!--more-->\r\n\r\n<a href=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg\">\r\n<img src=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg\" alt=\"\" width=\"800\" height=\"8730\" class=\"alignnone size-full wp-image-9360\" \/><\/a>\r\n\r\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a:\r\n<a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/cyber-security-statistics\/\">https:\/\/www.comparitech.com\/blog\/information-security\/cyber-security-statistics\/<\/a>","_ru_post_name":"infografika-mesyatsa-kiberbezopasnos","_ru_post_excerpt":"","_ru_post_title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043c\u0435\u0441\u044f\u0446\u0430: \u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438 \u0441\u0432\u043e\u0431\u043e\u0434\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21,10,14],"tags":[],"class_list":["post-9359","post","type-post","status-publish","format-standard","","category-security","category-belarus","category-infographic"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-2qX","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":12594,"url":"https:\/\/infopolicy.net\/en\/kiberbezopasnost-v-velikobritanii-2020\/","url_meta":{"origin":9359,"position":0},"title":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0432 \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438, 2020","author":"infopolicy","date":"12.03.2020","format":false,"excerpt":"\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Ipsos \"Cyber Security Skills in the UK Labour Market 2020\": \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.gov.uk\/government\/publications\/cyber-security-skills-in-the-uk-labour-market-2020","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ipsos-cybersecurity.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6512,"url":"https:\/\/infopolicy.net\/en\/infografika-mesyatsa-chelovecheskaya-sto\/","url_meta":{"origin":9359,"position":1},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043c\u0435\u0441\u044f\u0446\u0430: \u0427\u0435\u043b\u043e\u0432\u0435\u0447\u0435\u0441\u043a\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 IT \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438","author":"infopolicy","date":"12.10.2014","format":false,"excerpt":"\u041a\u0430\u0440\u0442\u0438\u043d\u043a\u0430 \u043e\u0442 Dell \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437\u0430\u0445: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/techpageone.dell.com\/technology\/infographic-the-human-side-of-it-security\/","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/human-side-of-it-security-month-infographic.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/human-side-of-it-security-month-infographic.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/human-side-of-it-security-month-infographic.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/human-side-of-it-security-month-infographic.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":19482,"url":"https:\/\/infopolicy.net\/en\/10-zhenshhin-v-oblasti-kiberbezopasnosti-p\/","url_meta":{"origin":9359,"position":2},"title":"10 \u0436\u0435\u043d\u0449\u0438\u043d \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u0438 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f","author":"infopolicy","date":"29.06.2022","format":false,"excerpt":"#WomenInICT #FemTech #CyberWomen \u041f\u0440\u0438\u0431\u043b\u0438\u0436\u0435\u043d\u0438\u0435 \u0432\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u044b \u0433\u043e\u0434\u0430 \u0434\u0430\u0435\u0442 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0430\u043c \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0445\u043e\u0440\u043e\u0448\u0443\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043e\u0446\u0435\u043d\u0438\u0442\u044c \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0441\u0432\u043e\u0438\u0445 \u043f\u043b\u0430\u043d\u043e\u0432 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 , \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d\u0438 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0438\u0445 \u0441 \u0440\u0435\u0430\u043b\u0438\u044f\u043c\u0438 \u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u0430 \u0443\u0433\u0440\u043e\u0437. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Log4Shell \u0438 Spring4Shell, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u0441\u043d\u043e\u0432\u0443 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/06\/cybersecurity.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/06\/cybersecurity.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/06\/cybersecurity.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/06\/cybersecurity.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3481,"url":"https:\/\/infopolicy.net\/en\/kak-zashhitit-lichnye-dannye-v-internet\/","url_meta":{"origin":9359,"position":3},"title":"\u041a\u0430\u043a \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435","author":"infopolicy","date":"31.07.2013","format":false,"excerpt":"\u041f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Windows, \u043d\u043e \u043d\u0430 \u0444\u043e\u043d\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0439: Belarus internet infested with spammers \u042d\u0442\u043e \u0445\u043e\u0440\u043e\u0448\u0430\u044f \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/alanonymousmith.livejournal.com\/26824.html","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2013\/07\/security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2013\/07\/security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2013\/07\/security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2013\/07\/security.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6515,"url":"https:\/\/infopolicy.net\/en\/infografika-nedeli-kak-krupnejshie-ko\/","url_meta":{"origin":9359,"position":4},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0435\u0434\u0435\u043b\u0438: \u041a\u0430\u043a \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0441\u0442\u0438\u043c\u0443\u043b\u0438\u0440\u0443\u044e\u0442 \u0441\u0432\u043e\u0438\u0445 \u0440\u0430\u0431\u043e\u0442\u043d\u0438\u043a\u043e\u0432","author":"infopolicy","date":"12.10.2014","format":false,"excerpt":"\u042d\u0442\u043e \u043d\u0435\u0437\u0430\u043c\u044b\u0441\u043b\u043e\u0432\u0430\u0442\u0430\u044f \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0430 \u043f\u043e\u0440\u0430\u0434\u0443\u0435\u0442 \u0432\u0441\u0435\u0445: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/infopolicy.net\/wp-content\/uploads\/2014\/10\/human-side-of-it-security-month-infographic.jpg","rel":"","context":"In &quot;\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430&quot;","block_context":{"text":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430","link":"https:\/\/infopolicy.net\/en\/category\/infographic\/"},"img":{"alt_text":"V2-How-Major-Companies-Motivate-Their-Employees","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/V2-How-Major-Companies-Motivate-Their-Employees.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/V2-How-Major-Companies-Motivate-Their-Employees.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/V2-How-Major-Companies-Motivate-Their-Employees.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2014\/10\/V2-How-Major-Companies-Motivate-Their-Employees.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":16629,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-sotsialnye-media-i-ki\/","url_meta":{"origin":9359,"position":5},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430 \u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","author":"infopolicy","date":"18.03.2021","format":false,"excerpt":"\u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u044b \u043e\u043f\u0440\u043e\u0441\u0430 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0421\u0438\u0434\u043d\u0435\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u0421\u0428\u0410, \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438 \u0438 \u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u0438 \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.socialmediatoday.com\/news\/survey-finds-a-third-of-people-dont-trust-social-media-companies-with-thei\/596830\/","rel":"","context":"In &quot;\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430&quot;","block_context":{"text":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430","link":"https:\/\/infopolicy.net\/en\/category\/infographic\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2021\/03\/Social_Media_and_Cybersecurity-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/9359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=9359"}],"version-history":[{"count":2,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/9359\/revisions"}],"predecessor-version":[{"id":9362,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/9359\/revisions\/9362"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=9359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=9359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=9359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}