{"id":3767,"date":"2020-06-15T11:37:24","date_gmt":"2020-06-15T15:37:24","guid":{"rendered":"https:\/\/knowledgeflow.org\/sharpen-your-cybersafety-arsenal-2\/"},"modified":"2024-07-15T13:29:15","modified_gmt":"2024-07-15T17:29:15","slug":"sharpen-your-cybersafety-arsenal","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/uk\/sharpen-your-cybersafety-arsenal\/","title":{"rendered":"\u0423\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u044c\u0442\u0435 \u0441\u0432\u0456\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0434\u043b\u044f \u043d\u0435\u043f\u0435\u0440\u0435\u0432\u0435\u0440\u0448\u0435\u043d\u043e\u0433\u043e \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0445\u0438\u0441\u0442\u0443"},"content":{"rendered":"<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/10\/cropped-kcf-primary-logo-500x250-1.png.webp\" alt=\"Knowledgeflow Cybersafety Foundation.\" style=\"width:176px;height:auto\" title=\"\"><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>\u0412\u0456\u0434\u0442\u043e\u0447\u0456\u0442\u044c \u0441\u0432\u0456\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438<\/strong><\/h5>\n\n\n\n<p>\u0423 \u0441\u0443\u0447\u0430\u0441\u043d\u0443 \u0446\u0438\u0444\u0440\u043e\u0432\u0443 \u0435\u043f\u043e\u0445\u0443 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 - \u0446\u0435 \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u043f\u0446\u0456\u044f, \u0430 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456\u0441\u0442\u044c. \u041d\u0430 <a href=\"https:\/\/knowledgeflow.org\/\">KnowledgeFlow<\/a>\u043c\u0438 \u043d\u0430\u0434\u0430\u0454\u043c\u043e \u0432\u0430\u043c \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456 \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0438 \u0442\u0430 \u0437\u043d\u0430\u043d\u043d\u044f \u0434\u043b\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432\u0456\u0434 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437. \u041d\u0430\u0448\u0456 \u0440\u0435\u0441\u0443\u0440\u0441\u0438 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0456 \u0442\u0430\u043a\u0438\u043c \u0447\u0438\u043d\u043e\u043c, \u0449\u043e\u0431 \u0431\u0443\u0442\u0438 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u0438\u043c\u0438, \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0438\u043c\u0438 \u0442\u0430 \u043f\u0440\u043e\u0441\u0442\u0438\u043c\u0438 \u0443 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u0456, \u0449\u043e\u0431 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u0442\u0438 \u0432\u0430\u043c \u0431\u0443\u0442\u0438 \u043d\u0430 \u043a\u0440\u043e\u043a \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u0443 \u043a\u0456\u0431\u0435\u0440\u0437\u043b\u043e\u0447\u0438\u043d\u0446\u0456\u0432.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u0422\u0440\u0438 \u043f\u0440\u043e\u0441\u0442\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u043b\u044f \u043f\u043e\u0441\u0438\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438.<\/h5>\n\n\n\n<p>1. \u0406\u0433\u043d\u043e\u0440\u0443\u0439\u0442\u0435 \u0442\u0435\u0440\u043c\u0456\u043d\u043e\u0432\u0456 \u0456\u043c\u0435\u0439\u043b\u0438, \u044f\u043a\u0456 \u0432\u0438\u043c\u0430\u0433\u0430\u044e\u0442\u044c \u0432\u0456\u0434 \u0432\u0430\u0441 \u0432\u0436\u0438\u0442\u0438 \u0437\u0430\u0445\u043e\u0434\u0456\u0432 <em>\u0417\u0430\u0440\u0430\u0437.<\/em>.<\/p>\n\n\n\n<p>2. \u042f\u043a\u0449\u043e \u0432\u0438\u0442\u0456\u043a \u0434\u0430\u043d\u0438\u0445 \u0441\u0442\u043e\u0441\u0443\u0454\u0442\u044c\u0441\u044f \u0432\u0430\u0448\u0438\u0445 \u0434\u0430\u043d\u0438\u0445, \u043d\u0435 \u0456\u0433\u043d\u043e\u0440\u0443\u0439\u0442\u0435 \u0439\u043e\u0433\u043e.<\/p>\n\n\n\n<p>3. \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u0438-\u0432\u0438\u043c\u0430\u0433\u0430\u0447\u0456 \u043f\u0435\u0440\u0435\u0434\u0431\u0430\u0447\u0430\u044e\u0442\u044c \u043a\u0440\u0430\u0434\u0456\u0436\u043a\u0443 \u0434\u0430\u043d\u0438\u0445; \u0434\u0456\u0439\u0442\u0435 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e.<\/p>\n\n\n\n<p><a href=\"https:\/\/medium.com\/@datarisk\/sharpen-your-cybersafety-arsenal-b29518dcb266\" target=\"_blank\" rel=\"noopener\">\u041e\u0437\u043d\u0430\u0439\u043e\u043c\u0442\u0435\u0441\u044f \u0437 \u043f\u043e\u0432\u043d\u0438\u043c \u0442\u0435\u043a\u0441\u0442\u043e\u043c \u0441\u0442\u0430\u0442\u0442\u0456 \u0442\u0443\u0442.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0412\u0456\u0434\u0442\u043e\u0447\u0456\u0442\u044c \u0441\u0432\u0456\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0423 \u0441\u0443\u0447\u0430\u0441\u043d\u0443 \u0446\u0438\u0444\u0440\u043e\u0432\u0443 \u0435\u043f\u043e\u0445\u0443 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 - \u0446\u0435 \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u043f\u0446\u0456\u044f, \u0446\u0435 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456\u0441\u0442\u044c....<\/p>","protected":false},"author":8,"featured_media":3801,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/Sharpen-Your-Cybersafety-Arsenal.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/uk\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/3767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/comments?post=3767"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/3767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media\/3801"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media?parent=3767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/categories?post=3767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tags?post=3767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}