{"id":1943,"date":"2024-03-08T12:30:00","date_gmt":"2024-03-08T17:30:00","guid":{"rendered":"https:\/\/miguelcastelo.ca\/?p=1943"},"modified":"2024-03-04T09:57:42","modified_gmt":"2024-03-04T14:57:42","slug":"be-vigilant-your-guide-to-preventing-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/miguelcastelo.ca\/fr\/be-vigilant-your-guide-to-preventing-social-engineering-attacks\/","title":{"rendered":"Soyez vigilant : Votre guide pour pr\u00e9venir les attaques d'ing\u00e9nierie sociale"},"content":{"rendered":"\n<p>The internet offers incredible convenience and connection, but it also creates opportunities for malicious actors. Social engineering attacks exploit human vulnerabilities to manipulate individuals into revealing sensitive information or taking actions that benefit the attacker.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg\" alt=\"Preventing Social Engineering Attacks\" class=\"wp-image-1945\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/03\/9d7234fd-b062-41d8-a3cc-4188cb317b21-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Preventing Social Engineering Attacks<\/figcaption><\/figure>\n\n\n<div class=\"root-eb-toc-i2u7h wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-i2u7h \"><div class=\"eb-toc-container eb-toc-i2u7h eb-toc-sticky-left eb-toc-is-sticky eb-toc-collapsible eb-toc-initially-collapsed eb-toc-scrollToTop style-2 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"true\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><span class=\"eb-toc-close eb-toc-sticky-left\"><\/span><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;1. Be Skeptical and Verify&quot;,&quot;text&quot;:&quot;1. Be Skeptical and Verify&quot;,&quot;link&quot;:&quot;1-be-skeptical-and-verify&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;2. Strengthen Your Online Presence&quot;,&quot;text&quot;:&quot;2. Strengthen Your Online Presence&quot;,&quot;link&quot;:&quot;2-strengthen-your-online-presence&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;3. Educate Yourself and Others&quot;,&quot;text&quot;:&quot;3. Educate Yourself and Others&quot;,&quot;link&quot;:&quot;3-educate-yourself-and-others&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;4. Trust Your Gut and Report Suspicious Activity&quot;,&quot;text&quot;:&quot;4. Trust Your Gut and Report Suspicious Activity&quot;,&quot;link&quot;:&quot;4-trust-your-gut-and-report-suspicious-activity&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;5. Stay Vigilant&quot;,&quot;text&quot;:&quot;5. Stay Vigilant&quot;,&quot;link&quot;:&quot;5-stay-vigilant&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;About the Author&quot;,&quot;text&quot;:&quot;About the Author&quot;,&quot;link&quot;:&quot;about-the-author&quot;}]\" data-visible=\"[true,true,true,true,true,true]\" data-delete-headers=\"[{&quot;label&quot;:&quot;1. Be Skeptical and Verify&quot;,&quot;value&quot;:&quot;1-be-skeptical-and-verify&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;2. Strengthen Your Online Presence&quot;,&quot;value&quot;:&quot;2-strengthen-your-online-presence&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;3. Educate Yourself and Others&quot;,&quot;value&quot;:&quot;3-educate-yourself-and-others&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;4. Trust Your Gut and Report Suspicious Activity&quot;,&quot;value&quot;:&quot;4-trust-your-gut-and-report-suspicious-activity&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;5. Stay Vigilant&quot;,&quot;value&quot;:&quot;5-stay-vigilant&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;About the Author&quot;,&quot;value&quot;:&quot;about-the-author&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#1-be-skeptical-and-verify\">1. Be Skeptical and Verify<\/a><li><a href=\"#2-strengthen-your-online-presence\">2. Strengthen Your Online Presence<\/a><li><a href=\"#3-educate-yourself-and-others\">3. Educate Yourself and Others<\/a><li><a href=\"#4-trust-your-gut-and-report-suspicious-activity\">4. Trust Your Gut and Report Suspicious Activity<\/a><li><a href=\"#5-stay-vigilant\">5. Stay Vigilant<\/a><li><a href=\"#about-the-author\">About the Author<\/a><\/ul><\/div><\/div><button class=\"eb-toc-button  eb-toc-button-left\"><div>Table of Contents<\/div><\/button><\/div><\/div><\/div>\n\n\n<p>These attacks can take various forms, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing emails:<\/strong> Disguised as legitimate sender emails, these often create a sense of urgency or threat to trick the recipient into clicking malicious links or sharing personal information.<\/li>\n\n\n\n<li><strong>Vishing and Smishing:<\/strong> Similar to phishing, these scams use phone calls or text messages, respectively, to impersonate trusted individuals or authorities.<\/li>\n\n\n\n<li><strong>Pretexting:<\/strong> Attackers fabricate a scenario to gain the victim&#8217;s trust and extract information. This may involve posing as customer service representatives, law enforcement officials, or even long-lost relatives.<\/li>\n\n\n\n<li><strong>Baiting:<\/strong> Attackers lure victims by offering tempting deals or exploiting curiosity with provocative content, often leading to malware downloads or compromising websites.<\/li>\n<\/ul>\n\n\n\n<p>Falling prey to social engineering can lead to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Financial loss:<\/strong> Hackers can use stolen information to access bank accounts, credit cards, or other financial resources.<\/li>\n\n\n\n<li><strong>Identity theft:<\/strong> Compromised personal data can be used for fraudulent activities, causing significant financial and legal issues.<\/li>\n\n\n\n<li><strong>Data breaches:<\/strong> Social engineering can be used to gain access to company networks, putting sensitive information at risk.<\/li>\n<\/ul>\n\n\n\n<p>Fortunately, you can significantly reduce your vulnerability to these attacks by adopting these strategies:<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>1. Be Skeptical and Verify<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Don&#8217;t automatically trust any communication, even if it appears familiar. Question the validity of any message that requests personal information, login credentials, or urgent action.<\/li>\n\n\n\n<li>Verify the sender&#8217;s identity directly through official channels, like contacting a company through their listed customer service number or website.<\/li>\n\n\n\n<li>Never click on unknown links or open attachments from suspicious sources.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>2. Strengthen Your Online Presence<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use strong and unique passwords for all your online accounts.<\/li>\n\n\n\n<li>Enable two-factor authentication (2FA) whenever available to add an extra layer of security.<\/li>\n\n\n\n<li>Be mindful of what information you share online, especially on social media. Avoid posting sensitive details like birthdays, addresses, or full names publicly.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>3. Educate Yourself and Others<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Stay informed about the latest social engineering tactics by reading credible security blogs or following cybersecurity experts on social media.<\/li>\n\n\n\n<li>Raise awareness amongst family, friends, and colleagues by sharing prevention tips and encouraging them to be cautious online.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>4. Trust Your Gut and Report Suspicious Activity<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If something feels off, it probably is. Don&#8217;t hesitate to walk away from a situation or communication that raises red flags.<\/li>\n\n\n\n<li>Report suspicious messages, emails, or calls to the relevant platforms or organizations.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>5. Stay Vigilant<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social engineering attacks are constantly evolving, so staying aware and adapting your security practices is crucial.<\/li>\n\n\n\n<li>Remain mindful and question any request or offer that seems too good to be true, especially those accompanied by a sense of urgency or pressure.<\/li>\n<\/ul>\n\n\n\n<p>By implementing these strategies and maintaining a healthy dose of skepticism, you can significantly reduce your risk of falling victim to social engineering attacks. Remember, protecting your personal information and online security is an ongoing process, and vigilance is key.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>References<\/summary>\n<p class=\"has-small-font-size\"><em>Avoiding Social Engineering and Phishing Attacks | CISA<\/em>. (2021, February 1). <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Be Mindful of What You Post on Social Media: What Goes Online Stays Online! [INFOGRAPHIC]<\/em>. (n.d.). Social Media Today. Retrieved March 1, 2024, from <a href=\"https:\/\/www.socialmediatoday.com\/content\/be-mindful-what-you-post-social-media-what-goes-online-stays-online-infographic\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.socialmediatoday.com\/content\/be-mindful-what-you-post-social-media-what-goes-online-stays-online-infographic<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Cybersecurity: Social engineering<\/em>. (2023, November 17). <a href=\"https:\/\/www.consilium.europa.eu\/en\/policies\/cybersecurity\/cybersecurity-social-engineering\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.consilium.europa.eu\/en\/policies\/cybersecurity\/cybersecurity-social-engineering\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How can you identify a social engineering attack?<\/em> (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.linkedin.com\/advice\/0\/how-can-you-identify-social-engineering-attack-skills-cybersecurity-tv7qc\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/advice\/0\/how-can-you-identify-social-engineering-attack-skills-cybersecurity-tv7qc<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How can you make your passwords strong enough to resist social engineering?<\/em> (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.linkedin.com\/advice\/3\/how-can-you-make-your-passwords-strong-enough\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/advice\/3\/how-can-you-make-your-passwords-strong-enough<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>How can you raise awareness about social engineering risks?<\/em> (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.linkedin.com\/advice\/0\/how-can-you-raise-awareness-social-engineering\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/advice\/0\/how-can-you-raise-awareness-social-engineering<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>IDEaS program invests in identifying malicious actors online<\/em>. (2023, December 20). Innovation, Science and Economic Development Canada. <a href=\"https:\/\/science.gc.ca\/site\/science\/en\/blogs\/defence-and-security-science\/ideas-program-invests-identifying-malicious-actors-online\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/science.gc.ca\/site\/science\/en\/blogs\/defence-and-security-science\/ideas-program-invests-identifying-malicious-actors-online<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Phishing Protection in the Digital Age\u2014Understanding Phishing and How to Protect Against It<\/em>. (n.d.). Palo Alto Networks. Retrieved March 1, 2024, from <a href=\"https:\/\/www.paloaltonetworks.com.au\/cyberpedia\/phishing-protection-in-the-digital-age-understanding-phishing-and-how-to-protect-against-it\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.paloaltonetworks.com.au\/cyberpedia\/phishing-protection-in-the-digital-age-understanding-phishing-and-how-to-protect-against-it<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Protecting Your Digital Fortress: How to Secure Your Personal Information from Hacks! | LinkedIn<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.linkedin.com\/pulse\/protecting-your-digital-fortress-how-secure\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/pulse\/protecting-your-digital-fortress-how-secure\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Social Engineering Attacks: How to protect yourself from manipulation and online scams | Scotiabank Canada<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.scotiabank.com\/content\/scotiabank\/ca\/en\/security\/protecting-yourself-your-family\/social-engineering-attacks.html\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.scotiabank.com\/content\/scotiabank\/ca\/en\/security\/protecting-yourself-your-family\/social-engineering-attacks.html<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Tessian. (2021, November 11). Smishing and Vishing: What They Are and How to Protect Yourself. <em>Tessian<\/em>. <a href=\"https:\/\/www.tessian.com\/blog\/what-is-smishing-and-vishing\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.tessian.com\/blog\/what-is-smishing-and-vishing\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>The Risks of Disclosing Your Birthday on Facebook And Other Social Networking Sites<\/em>. (n.d.). I\u2019ve Been Mugged Blog. Retrieved March 1, 2024, from <a href=\"https:\/\/ivebeenmugged.typepad.com\/my_weblog\/2009\/03\/birthday-risks.html\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/ivebeenmugged.typepad.com\/my_weblog\/2009\/03\/birthday-risks.html<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Types of Social Engineering Attacks used to Gain Internal Network Access<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/types-of-social-engineering-attacks-used-to-gain-internal-network-access\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/types-of-social-engineering-attacks-used-to-gain-internal-network-access\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What Happens If You Accidentally Open A Spam Email?<\/em> (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.aura.com\/learn\/what-happens-if-you-open-spam-email\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.aura.com\/learn\/what-happens-if-you-open-spam-email<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What has changed in social engineering?<\/em> (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/terranovasecurity.com\/blog\/what-has-changed-in-social-engineering\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/terranovasecurity.com\/blog\/what-has-changed-in-social-engineering\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">What is Social Engineering | Attack Techniques &amp; Prevention Methods | Imperva. (n.d.). <em>Learning Center<\/em>. Retrieved March 1, 2024, from <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/social-engineering-attack\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.imperva.com\/learn\/application-security\/social-engineering-attack\/<\/a><\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">About the Author<\/h2>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__avatar\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' \/><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Miguel Castelo<\/p><p class=\"wp-block-post-author__bio\">Miguel Castelo is a passionate cybersecurity professional with a strong foundation in technology. He holds a Bachelor of Science in Cybersecurity and is currently pursuing a Master&#8217;s degree in Computer Engineering at Polytechnique Montreal, further solidifying his technical expertise.\r\n\r\nBeyond his academic pursuits, Miguel brings valuable experience in web design and development, graphic design, and programming. This diverse skillset allows him to approach cybersecurity challenges from multiple angles, fostering a holistic understanding of the digital landscape.\r\n\r\nMiguel&#8217;s dedication to continuous learning and his diverse skillset position him as a valuable asset in the cybersecurity field. He is driven by a passion for building secure, resilient systems and protecting individuals and organizations in the ever-evolving digital world.<\/p><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>L'internet offre une commodit\u00e9 et une connexion incroyables, mais il cr\u00e9e \u00e9galement des opportunit\u00e9s pour les acteurs malveillants. Les attaques par ing\u00e9nierie sociale exploitent les vuln\u00e9rabilit\u00e9s humaines pour manipuler les individus afin qu'ils r\u00e9v\u00e8lent des informations sensibles ou entreprennent des actions qui profitent \u00e0 l'attaquant.<\/p>","protected":false},"author":1,"featured_media":1945,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[19],"tags":[22,21,23,25,26],"class_list":["post-1943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cyber-safe","tag-cybersecurity-awareness","tag-information-security","tag-social-engineering","tag-social-engineering-awareness"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/comments?post=1943"}],"version-history":[{"count":5,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1943\/revisions"}],"predecessor-version":[{"id":1985,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1943\/revisions\/1985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media\/1945"}],"wp:attachment":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media?parent=1943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/categories?post=1943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/tags?post=1943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}