{"id":9880,"date":"2025-07-16T14:14:13","date_gmt":"2025-07-16T14:14:13","guid":{"rendered":"https:\/\/awareness.kpmg.it\/?page_id=9880"},"modified":"2026-02-24T07:57:58","modified_gmt":"2026-02-24T07:57:58","slug":"mur-phishing-awareness","status":"publish","type":"page","link":"https:\/\/awareness.kpmg.it\/index.php\/mur-phishing-awareness\/","title":{"rendered":"MUR Phishing Awareness"},"content":{"rendered":"\n\n\t<section class=\"section\" id=\"section_1519891657\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row row-collapse\"  id=\"row-1096996662\">\n\n\n\t<div id=\"col-914298916\" class=\"col medium-2 small-12 large-2\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_728711967\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2025\/07\/MUR-bianco_0.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_728711967 {\n  width: 21%;\n}\n@media (min-width:550px) {\n  #image_728711967 {\n    width: 50%;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1519891657 {\n  padding-top: 10px;\n  padding-bottom: 10px;\n  background-color: rgb(0, 29, 68);\n}\n<\/style>\n\t<\/section>\n\t\n\n\n\t<section class=\"section dark hide-for-small\" id=\"section_157849115\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<button class=\"scroll-for-more z-5 icon absolute bottom h-center\" aria-label=\"Scroll for more\"><i class=\"icon-angle-down\" style=\"font-size:42px;\" ><\/i><\/button>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row align-middle align-center\"  id=\"row-564971577\">\n\n\n\t<div id=\"col-808564376\" class=\"col medium-8 small-10 large-9\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-4026333729\" class=\"text\">\n\t\t\n\n<h1>Awareness Campaign<\/h1>\n\t\t\n<style>\n#text-4026333729 {\n  font-size: 2.45rem;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3190193750\" class=\"text\">\n\t\t\n\n<p style=\"text-align: justify\">L\u2019e-mail ricevuta potrebbe aver avuto finalit\u00e0 fraudolente, mirate a sottrarre i tuoi dati personali e quelli del tuo Istituto. Al fine di incrementare la consapevolezza sui rischi informatici, il Ministero dell\u2019Universit\u00e0 e Ricerca ha avviato un programma di formazione, con l\u2019obiettivo di accrescere le capacit\u00e0 dei dipendenti nel riconoscere e fare attenzione alle e-mail di Phishing.\n<\/p>\n\t\t\n<style>\n#text-3190193750 {\n  text-align: left;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-808564376 > .col-inner {\n  padding: 0px 0px 0px 0px;\n  margin: 0px 10px 0px 10px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-507775527\" class=\"col medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner text-left\" style=\"background-color:rgb(255, 255, 255);\" >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_233370163\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2025\/10\/Progetto-senza-titolo-12.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_233370163 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_157849115 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n  min-height: 200px;\n  background-color: rgb(34, 102, 165);\n}\n@media (min-width:550px) {\n  #section_157849115 {\n    padding-top: 120px;\n    padding-bottom: 120px;\n    min-height: 200px;\n  }\n}\n@media (min-width:850px) {\n  #section_157849115 {\n    padding-top: 60px;\n    padding-bottom: 60px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section show-for-small\" id=\"section_1986235556\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<button class=\"scroll-for-more z-5 icon absolute bottom h-center\" aria-label=\"Scroll for more\"><i class=\"icon-angle-down\" style=\"font-size:42px;\" ><\/i><\/button>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row\"  id=\"row-899904322\">\n\n\n\t<div id=\"col-1799975506\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-733668751\" class=\"text\">\n\t\t\n\n<h1>Awareness Campaign<\/h1>\n\t\t\n<style>\n#text-733668751 {\n  font-size: 2.6rem;\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-733668751 > * {\n  color: rgb(255, 255, 255);\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3382644157\" class=\"text\">\n\t\t\n\n<p>L\u2019e-mail ricevuta potrebbe aver avuto finalit\u00e0 fraudolente, mirate a sottrarre i tuoi dati personali e quelli del tuo Istituto. Al fine di incrementare la consapevolezza sui rischi informatici, il Ministero dell\u2019Universit\u00e0 e Ricerca ha avviato un programma di formazione, con l\u2019obiettivo di accrescere le capacit\u00e0 dei dipendenti nel riconoscere e fare attenzione alle e-mail di Phishing.\n<\/p>\n\t\t\n<style>\n#text-3382644157 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-3382644157 > * {\n  color: rgb(255, 255, 255);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1986235556 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n  background-color: #2266a5;\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_484414428\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row row-large align-middle\"  id=\"row-1415301171\">\n\n\n\t<div id=\"col-384476550\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"gap-1659873411\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1659873411 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"text-2439147570\" class=\"text\">\n\t\t\n\n<h1>Che cos&#8217;\u00e8 il Phishing?<\/h1>\n\t\t\n<style>\n#text-2439147570 {\n  font-size: 1.45rem;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1858878630\" class=\"text\">\n\t\t\n\n<p>Il <b>phishing<\/b> \u00e8 un tipo di attacco informatico che si verifica quando un malintenzionato si finge  un\u2019entit\u00e0 affidabile per ingannare le vittime e indurle a fornire informazioni personali, finanziarie o di accesso. Questo attacco pu\u00f2 avvenire tramite diversi mezzi di comunicazione, incluse le e-mail, i messaggi di testo, le telefonate o i siti web fraudolenti.\n<\/p>\n\t\t\n<style>\n#text-1858878630 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-1858878630 > * {\n  color: rgb(0,0,0);\n}\n@media (min-width:550px) {\n  #text-1858878630 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-301853707\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n\n<div style=\"padding:56.25% 0 0 0;position:relative;\"><iframe src=\"https:\/\/player.vimeo.com\/video\/825430472?h=a65e280eea&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen style=\"position:absolute;top:0;left:0;width:100%;height:100%;\" title=\"Phishing\"><\/iframe><\/div>\n<p><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script><\/p>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_484414428 {\n  padding-top: 60px;\n  padding-bottom: 60px;\n  background-color: rgb(193, 193, 193);\n}\n#section_484414428 .section-bg-overlay {\n  background-color: rgba(255, 255, 255, 0.85);\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_755412601\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row\"  id=\"row-1308863874\">\n\n\n\t<div id=\"col-1296755913\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1407946981\" class=\"text\">\n\t\t\n\n<h2>Perch\u00e8 il phishing \u00e8 cos\u00ec pericoloso?<\/h2>\n\t\t\n<style>\n#text-1407946981 {\n  font-size: 1.7rem;\n  color: rgb(255, 255, 255);\n}\n#text-1407946981 > * {\n  color: rgb(255, 255, 255);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-equal\"  id=\"row-1177788920\">\n\n\n\t<div id=\"col-2066853623\" class=\"col medium-6 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3673754898\" class=\"text\">\n\t\t\n\n<h3>FURTO D&#8217;IDENTITA&#8217;<\/h3>\n\t\t\n<style>\n#text-3673754898 {\n  font-size: 1.45rem;\n  text-align: center;\n  color: rgb(230, 76, 145);\n}\n#text-3673754898 > * {\n  color: rgb(230, 76, 145);\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-812363826\" class=\"text\">\n\t\t\n\n<p style=\"text-align: center;\">Gli attaccanti possono servirsi di e-mail ingannevoli per convincerti a fornire informazioni personali, come numeri di previdenza sociale, credenziali bancarie e password di accesso ai tuoi account.\n<\/p>\n\t\t\n<style>\n#text-812363826 {\n  color: rgb(0,0,0);\n}\n#text-812363826 > * {\n  color: rgb(0,0,0);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-243469061\" class=\"col medium-6 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-811044881\" class=\"text\">\n\t\t\n\n<h3>INSTALLAZIONE MALWARE<\/h3>\n\t\t\n<style>\n#text-811044881 {\n  font-size: 1.45rem;\n  text-align: center;\n  color: rgb(230, 76, 145);\n}\n#text-811044881 > * {\n  color: rgb(230, 76, 145);\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3760317796\" class=\"text\">\n\t\t\n\n<p>Le e-mail di Phishing possono contenere un link che, se cliccato, installa un malware sul tuo dispositivo, capace di   scaricare altri software dannosi in grado di spiare le tue attivit\u00e0 sui dispositivi.\n<\/p>\n\t\t\n<style>\n#text-3760317796 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-3760317796 > * {\n  color: rgb(0,0,0);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1734960925\" class=\"col medium-6 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2940808814\" class=\"text\">\n\t\t\n\n<h3>PERDITE FINANZIARIE<\/h3>\n\t\t\n<style>\n#text-2940808814 {\n  font-size: 1.45rem;\n  text-align: center;\n  color: rgb(230, 76, 145);\n}\n#text-2940808814 > * {\n  color: rgb(230, 76, 145);\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2625568562\" class=\"text\">\n\t\t\n\n<p>Gli attaccanti potrebbero convincerti ad effettuare pagamenti diretti sfruttando falsi pretesti, come la risoluzione di problemi inesistenti o la minaccia di conseguenze negative.\n<\/p>\n\t\t\n<style>\n#text-2625568562 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-2625568562 > * {\n  color: rgb(0,0,0);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-1177788920 > .col > .col-inner {\n  padding: 25px 25px 25px 25px;\n  background-color: rgb(255,255,255);\n}\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_755412601 {\n  padding-top: 60px;\n  padding-bottom: 60px;\n  background-color: rgb(230, 76, 145);\n}\n<\/style>\n\t<\/section>\n\t\n\t<div id=\"gap-304044341\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-304044341 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t<section class=\"section\" id=\"section_1027517908\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<h1 style=\"text-align: center;\"><strong>Come potevo riconoscere l&#8217;email di phishing?<\/strong><\/h1>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1027517908 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n<div class=\"row\"  id=\"row-1273301130\">\n\n\n\t<div id=\"col-1093338896\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1163654144\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1086\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2026\/02\/Certificati-di-formazione-2025.png\" class=\"attachment-medium_large size-medium_large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1163654144 {\n  width: 83%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-928782343\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"row\"  id=\"row-1085474650\">\n\n\n\t<div id=\"col-1764128647\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1187893700\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2025\/07\/Pentagono-giallo.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1187893700 {\n  width: 28%;\n}\n@media (min-width:550px) {\n  #image_1187893700 {\n    width: 100%;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1764128647 > .col-inner {\n  margin: 20px 0px -20px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1630649503\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2741696806\" class=\"text\">\n\t\t\n\n<p>\u00a0<\/p>\n<p><span data-teams=\"true\">L\u2019indirizzo e-mail del mittente <strong>non\u00a0<\/strong>\u00e8 un <strong>dominio ufficiale dell&#8217;Istituto.<\/strong><\/span><\/p>\n\n\t\t\n<style>\n#text-2741696806 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-2741696806 > * {\n  color: rgb(0,0,0);\n}\n@media (min-width:550px) {\n  #text-2741696806 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"is-divider divider clearfix\" style=\"max-width:100%;\"><\/div>\n\n<div class=\"row\"  id=\"row-660232482\">\n\n\n\t<div id=\"col-1968499138\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1421764145\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2025\/07\/Pentagono-blu.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1421764145 {\n  width: 28%;\n}\n@media (min-width:550px) {\n  #image_1421764145 {\n    width: 100%;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1968499138 > .col-inner {\n  margin: 20px 0px -20px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-262556658\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1834061889\" class=\"text\">\n\t\t\n\n<p>\u00a0<\/p>\n<p><span data-teams=\"true\">L\u2019e-mail ha come <strong>obiettivo<\/strong> quello di creare un senso di urgenza, incidendo sulle emozioni del ricevente.<\/span><\/p>\n\t\t\n<style>\n#text-1834061889 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-1834061889 > * {\n  color: rgb(0,0,0);\n}\n@media (min-width:550px) {\n  #text-1834061889 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-262556658 > .col-inner {\n  margin: 10px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"is-divider divider clearfix\" style=\"max-width:100%;\"><\/div>\n\n<div class=\"row\"  id=\"row-1419369439\">\n\n\n\t<div id=\"col-857976604\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_867881189\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" style=\"margin:20px 0px -20px 0px;\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/awareness.kpmg.it\/wp-content\/uploads\/2025\/07\/Pentagono-rosa.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_867881189 {\n  width: 28%;\n}\n@media (min-width:550px) {\n  #image_867881189 {\n    width: 100%;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1265382106\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2596488907\" class=\"text\">\n\t\t\n\n<p>\u00a0<\/p>\n<p><span data-teams=\"true\">L\u2019URL del link non appartiene al <strong>dominio dell&#8217;Istituto <\/strong>e la pagina di conferma che hai visitato non era quella ufficiale.<\/span><\/p>\n\n\t\t\n<style>\n#text-2596488907 {\n  text-align: center;\n  color: rgb(0,0,0);\n}\n#text-2596488907 > * {\n  color: rgb(0,0,0);\n}\n@media (min-width:550px) {\n  #text-2596488907 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t<section class=\"section\" id=\"section_1377140901\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row\"  id=\"row-1742948589\">\n\n\n\t<div id=\"col-126012440\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1447748061\" class=\"text\">\n\t\t\n\n<h1>Come Difendersi?<\/h1>\n\t\t\n<style>\n#text-1447748061 {\n  font-size: 1.7rem;\n  color: rgb(255, 255, 255);\n}\n#text-1447748061 > * {\n  color: rgb(255, 255, 255);\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n<div class=\"row align-equal row-solid\"  id=\"row-1466858535\">\n\n\n\t<div id=\"col-1352737307\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3816062419\" class=\"text\">\n\t\t\n\n<h3>Verifica sempre il mittente<\/h3>\n<p><strong>Non fidarti ciecamente di email o messaggi sospetti.<\/strong> Controlla l&#8217;indirizzo email del mittente e verifica che corrisponda a quello di entit\u00e0 legittime, soprattutto se viene richiesta azione immediata o informazioni personali.<\/p>\n\t\t\n<style>\n#text-3816062419 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-3816062419 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-3816062419 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1232912503\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-2901977742\" class=\"text\">\n\t\t\n\n<h3>Non cliccare su link o allegati sospetti<\/h3>\n<p><strong>Evita di aprire allegati email o cliccare su link non richiesti.<\/strong> Questi potrebbero contenere malware che, una volta attivato, pu\u00f2 infettare il tuo dispositivo o crittografare i tuoi file.<\/p>\n\t\t\n<style>\n#text-2901977742 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-2901977742 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-2901977742 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-166000400\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1985700207\" class=\"text\">\n\t\t\n\n<h3>Sii scettico riguardo le richieste urgenti<\/h3>\n<p><strong>Diffida delle comunicazioni che richiedono azioni immediate o che minacciano conseguenze negative.<\/strong> Queste sono tattiche comuni usate nei tentativi di phishing per spingerti a compiere azioni senza riflettere.<\/p>\n\t\t\n<style>\n#text-1985700207 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-1985700207 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-1985700207 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-693448686\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1404331712\" class=\"text\">\n\t\t\n\n<h3>Utilizza password complesse e uniche<\/h3>\n<p><strong>Crea password lunghe, complesse e uniche per ogni account.<\/strong> Considera l&#8217;uso di frasi d&#8217;accesso e evita di riutilizzare le stesse password su pi\u00f9 siti per ridurre il rischio di accessi non autorizzati.<\/p>\n\t\t\n<style>\n#text-1404331712 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-1404331712 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-1404331712 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1523911135\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-1979389292\" class=\"text\">\n\t\t\n\n<h3>Sii cauto con le informazioni personali<\/h3>\n<p><strong>Limita le informazioni che condividi online e in particolare sui social media.<\/strong> Gli attaccanti possono usare dettagli personali per rendere i tentativi di phishing pi\u00f9 convincenti.<\/p>\n\t\t\n<style>\n#text-1979389292 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-1979389292 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-1979389292 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-969398723\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3967148637\" class=\"text\">\n\t\t\n\n<h3>Controlla la sicurezza dei Siti Web<\/h3>\n<p><strong>Assicurati che i siti web su cui inserisci informazioni sensibili utilizzino HTTPS.<\/strong> Cerca il lucchetto di sicurezza nella barra degli indirizzi del tuo browser prima di inserire dati.<\/p>\n\t\t\n<style>\n#text-3967148637 {\n  text-align: center;\n  color: rgb(255, 255, 255);\n}\n#text-3967148637 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-3967148637 {\n    text-align: left;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-1466858535 > .col > .col-inner {\n  padding: 30px 30px 30px 30px;\n}\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1377140901 {\n  padding-top: 60px;\n  padding-bottom: 60px;\n  background-color: rgb(0, 176, 240);\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section dark\" id=\"section_291961036\">\n\t\t<div class=\"section-bg fill\" >\n\t\t\t\t\t\t\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n\t<div id=\"text-452064098\" class=\"text show-for-small\">\n\t\t\n\n<h1>Ministero dell&#8217;Universit\u00e0 e della Ricerca<\/h1>\n\t\t\n<style>\n#text-452064098 {\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2933534747\" class=\"text hide-for-small\">\n\t\t\n\n<h1>\u00a0 \u00a0 \u00a0Ministero dell&#8217;Universit\u00e0 e della Ricerca<\/h1>\n\t\t\t<\/div>\n\t\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_291961036 {\n  padding-top: 20px;\n  padding-bottom: 20px;\n  background-color: #001d44;\n}\n@media (min-width:550px) {\n  #section_291961036 {\n    padding-top: 20px;\n    padding-bottom: 20px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-blank-landingpage.php","meta":{"footnotes":""},"class_list":["post-9880","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/pages\/9880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/comments?post=9880"}],"version-history":[{"count":42,"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/pages\/9880\/revisions"}],"predecessor-version":[{"id":11803,"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/pages\/9880\/revisions\/11803"}],"wp:attachment":[{"href":"https:\/\/awareness.kpmg.it\/index.php\/wp-json\/wp\/v2\/media?parent=9880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}