{"id":1824,"date":"2024-12-05T12:06:16","date_gmt":"2024-12-05T11:06:16","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=1824"},"modified":"2025-05-05T14:48:49","modified_gmt":"2025-05-05T12:48:49","slug":"ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/en\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/","title":{"rendered":"Don&#039;t let cyber attacks ruin your business!"},"content":{"rendered":"<h2 class=\"\" data-start=\"115\" data-end=\"180\"><strong data-start=\"118\" data-end=\"180\">Don&#039;t let cyberattacks ruin your business!<\/strong><\/h2>\n<p class=\"\" data-start=\"182\" data-end=\"560\">The digital world is constantly evolving, and with it, cyberattacks are becoming more sophisticated. Whether you run an SME or a large enterprise, cyberattacks are a real threat. A single data breach, ransomware attack, or distributed denial of service (DDoS) can be enough to cause serious financial and reputational damage to your company.<\/p>\n<h3 class=\"\" data-start=\"562\" data-end=\"600\"><strong data-start=\"566\" data-end=\"600\">How much can an attack cost?<\/strong><\/h3>\n<p class=\"\" data-start=\"601\" data-end=\"1148\">Small and medium-sized businesses often think that \u201cwe are not interesting enough\u201d for attackers. The reality is that SMEs are targeted precisely because they often lack basic security measures. After a successful attack, not only can customer data fall into unauthorized hands, but systems can also be down, business operations can be paralyzed, and losses of up to several million forints can be incurred \u2013 not to mention fines if you do not comply with data protection and cybersecurity legislation, such as the NIS2 Directive.<\/p>\n<h3 class=\"\" data-start=\"1150\" data-end=\"1200\"><strong data-start=\"1154\" data-end=\"1200\">Prevention is always cheaper than cure.<\/strong><\/h3>\n<p class=\"\" data-start=\"1201\" data-end=\"1473\">Cybersecurity is not a luxury, but a business necessity. Incident management protocols, regular vulnerability scans, security awareness training, and access management policies are all elements that can significantly reduce risk.<\/p>\n<p class=\"\" data-start=\"1475\" data-end=\"1651\">THE <strong data-start=\"1477\" data-end=\"1499\">Cyber Operations Group Ltd.<\/strong>\u00a0aims to help your business prepare for the most modern threats - whether it&#039;s auditing, compliance, or technical protection.<\/p>\n<h3 class=\"\" data-start=\"1653\" data-end=\"1688\"><strong data-start=\"1657\" data-end=\"1688\">NIS2: can&#039;t be postponed any longer<\/strong><\/h3>\n<p class=\"\" data-start=\"1689\" data-end=\"2006\">The EU&#039;s new cybersecurity directive, the <strong data-start=\"1727\" data-end=\"1735\">NIS2<\/strong>, makes it mandatory for many organizations to have high-level cybersecurity compliance. If your company is affected (e.g. IT, energy, transportation, healthcare, financial services or other critical sectors), then <em data-start=\"1948\" data-end=\"1981\">not a question, but an obligation<\/em>to prepare on time.<\/p>\n<h3 class=\"\" data-start=\"2008\" data-end=\"2035\"><strong data-start=\"2012\" data-end=\"2035\">What do we offer you?<\/strong><\/h3>\n<ul data-start=\"2036\" data-end=\"2304\">\n<li class=\"\" data-start=\"2036\" data-end=\"2097\">\n<p class=\"\" data-start=\"2038\" data-end=\"2097\">Full NIS2 preparation and compliance support<\/p>\n<\/li>\n<li class=\"\" data-start=\"2098\" data-end=\"2146\">\n<p class=\"\" data-start=\"2100\" data-end=\"2146\">Technical and organizational security audits<\/p>\n<\/li>\n<li class=\"\" data-start=\"2147\" data-end=\"2198\">\n<p class=\"\" data-start=\"2149\" data-end=\"2198\">IT security training for employees<\/p>\n<\/li>\n<li class=\"\" data-start=\"2199\" data-end=\"2254\">\n<p class=\"\" data-start=\"2201\" data-end=\"2254\">Vulnerability testing and continuous monitoring<\/p>\n<\/li>\n<li class=\"\" data-start=\"2255\" data-end=\"2304\">\n<p class=\"\" data-start=\"2257\" data-end=\"2304\">Fast and efficient incident management support<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"2306\" data-end=\"2340\"><strong data-start=\"2310\" data-end=\"2340\">Don&#039;t wait until something bad happens!<\/strong><\/h3>\n<p class=\"\" data-start=\"2341\" data-end=\"2602\">Cyberattacks are not a question of \u201cif\u201d, but \u201cwhen\u201d. The time and resources spent on defense are the best investment you can make in the future of your company. CyberOperations experts will help you find the most suitable defense strategy for your business.<\/p>\n<p class=\"\" data-start=\"2604\" data-end=\"2699\"><strong data-start=\"2607\" data-end=\"2641\">Contact us today<\/strong>and secure the digital future of your business!<\/p>","protected":false},"excerpt":{"rendered":"<p>Ne hagyd, hogy a kibert\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet! A digit\u00e1lis vil\u00e1g folyamatosan fejl\u0151dik, \u00e9s ezzel egy\u00fctt a kibert\u00e1mad\u00e1sok is egyre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1819,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet! - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/en\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!\" \/>\n<meta property=\"og:description\" content=\"Ne hagyd, hogy a kibert\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet! A digit\u00e1lis vil\u00e1g folyamatosan fejl\u0151dik, \u00e9s ezzel egy\u00fctt a kibert\u00e1mad\u00e1sok is egyre [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/en\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-05T11:06:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T12:48:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1967\" \/>\n\t<meta property=\"og:image:height\" content=\"1107\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyborg_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyborg_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/\"},\"author\":{\"name\":\"Cyborg_admin\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/7ce1406cf74ae0c6c219937d57fe6786\"},\"headline\":\"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!\",\"datePublished\":\"2024-12-05T11:06:16+00:00\",\"dateModified\":\"2025-05-05T12:48:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/\"},\"wordCount\":527,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/\",\"name\":\"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet! - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg\",\"datePublished\":\"2024-12-05T11:06:16+00:00\",\"dateModified\":\"2025-05-05T12:48:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg\",\"width\":1967,\"height\":1107},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/7ce1406cf74ae0c6c219937d57fe6786\",\"name\":\"Cyborg_admin\",\"sameAs\":[\"https:\\\/\\\/cyberoperations.hu\\\/product\\\/menedzselt-kibervedelem\\\/\"],\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/author\\\/cyborg_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don&#039;t let cyber attacks ruin your business! - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/en\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/","og_locale":"en_GB","og_type":"article","og_title":"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!","og_description":"Ne hagyd, hogy a kibert\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet! A digit\u00e1lis vil\u00e1g folyamatosan fejl\u0151dik, \u00e9s ezzel egy\u00fctt a kibert\u00e1mad\u00e1sok is egyre [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/en\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2024-12-05T11:06:16+00:00","article_modified_time":"2025-05-05T12:48:49+00:00","og_image":[{"width":1967,"height":1107,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg","type":"image\/jpeg"}],"author":"Cyborg_admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyborg_admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/"},"author":{"name":"Cyborg_admin","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/7ce1406cf74ae0c6c219937d57fe6786"},"headline":"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!","datePublished":"2024-12-05T11:06:16+00:00","dateModified":"2025-05-05T12:48:49+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/"},"wordCount":527,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg","articleSection":["Egy\u00e9b"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/","url":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/","name":"Don&#039;t let cyber attacks ruin your business! - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg","datePublished":"2024-12-05T11:06:16+00:00","dateModified":"2025-05-05T12:48:49+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/cyber-impostor-wearing-mask-hacking-database-serve-3CESPHP.jpg","width":1967,"height":1107},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/ne-hagyd-hogy-a-kiber-tamadasok-tonkretegyek-az-uzletedet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Ne hagyd, hogy a kiber t\u00e1mad\u00e1sok t\u00f6nkretegy\u00e9k az \u00fczletedet!"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/7ce1406cf74ae0c6c219937d57fe6786","name":"Cyborg_admin","sameAs":["https:\/\/cyberoperations.hu\/product\/menedzselt-kibervedelem\/"],"url":"https:\/\/cyberoperations.hu\/en\/author\/cyborg_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media\/1819"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}