{"id":7367,"date":"2020-01-31T04:05:00","date_gmt":"2020-01-31T04:05:00","guid":{"rendered":"https:\/\/certsign.ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/"},"modified":"2021-03-01T14:20:30","modified_gmt":"2021-03-01T14:20:30","slug":"securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1","status":"publish","type":"post","link":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/","title":{"rendered":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Impactul schimb&#259;rilor tehnologice continue asupra modului &icirc;n care oamenii interac&#355;ioneaz&#259; este unul vizibil, mai ales atunci c&acirc;nd vorbim despre dispozitivele mobile utilizate (smartphone-uri, tablete, etc.). Aceast&#259; evolu&#355;ie tehnologic&#259; (&#351;i riscurile cibernetice inerente) afecteaz&#259; cultura &#351;i modul &icirc;n care ne astept&#259;m s&#259; avem acces la informa&#355;ii &#351;i unii la ceilal&#355;i. Iar aceste a&#351;tept&#259;ri sunt aduse de c&#259;tre angaja&#355;i la locul de munc&#259;, atunci c&acirc;nd se face tranzi&#355;ia de la end user la business user. <\/p> <p>&Icirc;ns&#259; atunci c&acirc;nd nu te po&#355;i baza doar pe &icirc;ncredere (sau cuno&#351;tin&#355;ele de securitate cibernetic&#259; de&#355;inute de utilizatori, &icirc;n contextul amplific&#259;rii atacurilor din mediul online), exist&#259; solu&#355;ii la care po&#355;i apela.<\/p> <p><span><strong>End user. Sfaturi pentru categoriile de consumatori vulnerabili &ndash; copiii &#351;i v&acirc;rstnicii<\/strong><\/span><\/p> <p>C&acirc;nd discut&#259;m despre accesarea prin terminale mobile a resurselor de pe Internet, trebuie avute &icirc;n primul r&acirc;nd &icirc;n vedere <strong>categoriile vulnerabile de consumatori<\/strong>, respectiv copiii &#351;i persoanele v&acirc;rstnice. <\/p> <p>Mai ales &icirc;n cazul <strong>copiilor <\/strong>(viitorii business useri), o educa&#355;ie cibernetic&#259; timpurie este esen&#355;ial&#259; &ndash; nu doar din motivele evidente de protejare a acestora, ci &#351;i pentru crearea unei baze solide de cuno&#351;tin&#355;e care s&#259; duc&#259; la dezvoltarea unui comportament corect &icirc;n mediul online. Pentru ace&#351;tia, se recomand&#259; stabilirea unor scheme de control parental care s&#259; vizeze con&#355;inutul accesat (site-uri, re&#355;ele de socializare, aplica&#355;ii etc.), cu posibilitatea apel&#259;rii la solu&#355;iile preinstalate &icirc;n sistemele de operare mobile (dac&#259; exist&#259;) sau la solu&#355;ii third-party. Acestea din urm&#259; se instaleaz&#259; pe dispozitivul mobil (smartphone, tablet&#259;), permi&#355;&acirc;nd localizarea dispozitivului &icirc;n timp real, verificarea con&#355;inutului accesat &#351;i chiar stabilirea unei cote de acces c&#259;tre con&#355;inutul online (perioad&#259; de timp\/zi).<\/p> <p>&Icirc;n ceea ce &icirc;i prive&#351;te pe <strong>v&acirc;rstnici<\/strong>, prevenirea poten&#355;ialelor cyber scam-uri (de cele mai multe ori de ordin financiar) se realizeaz&#259; &icirc;n primul r&acirc;nd prin informare &ndash; trebuie cunoscute metodele de fraudare &#351;i modul &icirc;n care acestea se produc, pentru a le depista &#351;i contracara mult mai u&#351;or. De la e-mail-uri sau apeluri telefonice tip phishing (e. metoda &ldquo;accidentul&rdquo;), p&acirc;n&#259; la fraude cu investi&#355;ii ori site-uri bancare false (despre care pute&#355;i afla mai multe aici), cu to&#355;ii putem fi victimele infractorilor cibernetici, &icirc;ns&#259; riscul cre&#351;te &icirc;n cazul acestei categorii vulnerabile.<\/p> <p><span><strong>Business user. Cum protejezi datele companiei atunci c&acirc;nd angajatul folose&#351;te telefonul de serviciu &#351;i &icirc;n scopuri personale?<\/strong><\/span><\/p> <p>De cele mai multe ori, terminalele mobile puse de companii la dispozi&#355;ia angaja&#355;ilor ajung s&#259; fie utilizate at&acirc;t &icirc;n scop profesional, c&acirc;t &#351;i personal. Problemele apar &icirc;n contextul &icirc;n care atacurile prin aplica&#355;ii mobile &#351;i re&#355;ele de socializare (&#351;i cine nu le folose&#351;te?) au devenit din p&#259;cate un subiect la ordinea zilei. Tocmai pentru c&#259; sunt cele mai bune &#351;i facile canale de distribuire de malware (un num&#259;r mare de utilizatori se traduce printr-un num&#259;r mare de poten&#355;iale victime), acestea sunt &#351;i cele mai comune mijloace de a deveni victime ale infractorilor cibernetici.<\/p> <p>&Icirc;n aceste situa&#355;ii, se ridic&#259; &icirc;ntrebarea cum putem proteja datele companiei de activitatea utilizatorului &icirc;n mediul s&#259;u privat? Mai ales c&#259; nu pu&#355;ine sunt cazurile &icirc;n care &ndash; &icirc;n urma acces&#259;rii mail-ului personal, a re&#355;elelor de socializare ori ulterior instal&#259;rii anumitor aplica&#355;ii pe telefonul de serviciu &ndash; infractorii cibernetici ajung s&#259; aib&#259; acces la datele sensibile ale companiei.<\/p> <p>Exist&#259; solu&#355;ii care permit <strong>separarea celor dou&#259; zone (business-personal)<\/strong> prin aplicarea unor politici de securitate diferite &icirc;n func&#355;ie de zona &icirc;n care utilizatorul lucreaz&#259;, certSIGN furniz&acirc;nd &#351;i implement&acirc;nd de altfel de <a href=\"https:\/\/www.certsign.ro\/gomobile\" name=\"certsign.ro\/gomobile\" target=\"_blank\" title=\"certsign.ro\/gomobile\" rel=\"noopener\">solu&#355;ii personalizate<\/a> pe scenarii de business specifice pentru fiecare client &icirc;n parte.<\/p> <p>Ce se poate face prin aceste solu&#355;ii:<\/p> <p>&bull; whitelisting &ndash; stabilirea unei liste de aplica&#355;ii pe care utilizatorul le poate instala;<\/p> <p>&bull; blacklisting &ndash; stabilirea unei liste de aplica&#355;ii pe care utilizatorul NU le poate instala;<\/p> <p>&bull; criptare zonelor care con&#355;in date de business;<\/p> <p>&bull; activarea sau dezactivarea anumitor func&#355;ionalit&#259;&#355;i ale dispozitivelor mobile (ex. camera foto, localizarea).<\/p> <p>Astfel, aplica&#355;iile de business se reg&#259;sesc &icirc;n general &icirc;ntr-o zon&#259; sigur&#259;, unde exist&#259; alte m&#259;suri de securitate, parole, creden&#355;iale de acces.<\/p> <p>Concluzia? &Icirc;ntruc&acirc;t dispozitivele mobile au devenit extensii ale utilizatorilor, trebuie s&#259; accept&#259;m faptul c&#259; modul &icirc;n care o persoan&#259; interac&#355;ioneaz&#259; cu\/manipuleaz&#259; datele personale se va reflecta &icirc;ntotdeauna &icirc;n modul &icirc;n care acesta interac&#355;ioneaz&#259; cu\/manipuleaz&#259; informa&#355;iile de business. Pe scurt &ndash; un end user &ldquo;educat&rdquo; din punct de vedere al securit&#259;&#355;ii cibernetice va fi un bussines user preg&#259;tit s&#259; &icirc;n&#355;eleag&#259; &#351;i contracareze poten&#355;ialele riscuri. <\/p> <p><strong>Afl&#259; mai multe pe acest subiect de la speciali&#351;tii certSIGN, la Radio Guerrilla!<\/strong><\/p> <p><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6629010477454241792\" name=\"Podcast%20certSIGN%20Radio%20Guerrilla\" target=\"_blank\" title=\"Podcast certSIGN Radio Guerrilla\" rel=\"noopener\"><strong>Podcast &ldquo;De la Transformare digital&#259; la DIGITAL TRUST&rdquo; @ Guerrilla Hub. <\/strong><\/a><\/p> <p><strong><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6629010477454241792\" name=\"Podcast%20certSIGN%20Radio%20Guerrilla\" target=\"_blank\" title=\"Podcast certSIGN Radio Guerrilla\" rel=\"noopener\">Ep.1. End User &amp; Business User. Accesul prin terminale mobile <\/a><\/strong><\/p> <p><strong>(invitat Dan Ionu&#355; Grigore, Cyber Security Director certSIGN)<\/strong><br> <\/p> <style> .blog-single-header-image > .elementor-element-populated { background: url(\"https:\/\/www.certsign.ro\/media\/image\/y4zkg9c1v1_Guerrilla_30 ian 2020.png\") no-repeat center center; } <\/style> <\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Impactul schimb&#259;rilor tehnologice continue asupra modului &icirc;n care oamenii interac&#355;ioneaz&#259; este unul vizibil, mai ales atunci c&acirc;nd vorbim despre dispozitivele mobile utilizate (smartphone-uri, tablete, etc.). Aceast&#259; evolu&#355;ie tehnologic&#259; (&#351;i riscurile cibernetice inerente) afecteaz&#259; cultura &#351;i modul &icirc;n care ne astept&#259;m s&#259; avem acces la informa&#355;ii &#351;i unii la ceilal&#355;i. Iar aceste a&#351;tept&#259;ri sunt aduse de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2276],"tags":[61],"categorie_produs":[11],"class_list":["post-7367","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformare-digitala","tag-securitate"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN\" \/>\n<meta property=\"og:description\" content=\"Impactul schimb&#259;rilor tehnologice continue asupra modului &icirc;n care oamenii interac&#355;ioneaz&#259; este unul vizibil, mai ales atunci c&acirc;nd vorbim despre dispozitivele mobile utilizate (smartphone-uri, tablete, etc.). Aceast&#259; evolu&#355;ie tehnologic&#259; (&#351;i riscurile cibernetice inerente) afecteaz&#259; cultura &#351;i modul &icirc;n care ne astept&#259;m s&#259; avem acces la informa&#355;ii &#351;i unii la ceilal&#355;i. Iar aceste a&#351;tept&#259;ri sunt aduse de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\" \/>\n<meta property=\"og:site_name\" content=\"certSIGN\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-31T04:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-01T14:20:30+00:00\" \/>\n<meta name=\"author\" content=\"certsign\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"certsign\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\"},\"author\":{\"name\":\"certsign\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18\"},\"headline\":\"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1)\",\"datePublished\":\"2020-01-31T04:05:00+00:00\",\"dateModified\":\"2021-03-01T14:20:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\"},\"wordCount\":933,\"publisher\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\"},\"keywords\":[\"securitate\"],\"articleSection\":[\"Transformare digital\u0103\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\",\"url\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\",\"name\":\"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN\",\"isPartOf\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#website\"},\"datePublished\":\"2020-01-31T04:05:00+00:00\",\"dateModified\":\"2021-03-01T14:20:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Acas\u0103\",\"item\":\"https:\/\/www.certsign.ro\/ro\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#website\",\"url\":\"https:\/\/www.certsign.ro\/ro\/\",\"name\":\"certSIGN\",\"description\":\"Prestator de servicii de \u00eencredere calificat\",\"publisher\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certsign.ro\/ro\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\",\"name\":\"certSIGN\",\"url\":\"https:\/\/www.certsign.ro\/ro\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png\",\"contentUrl\":\"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png\",\"width\":317,\"height\":66,\"caption\":\"certSIGN\"},\"image\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18\",\"name\":\"certsign\",\"sameAs\":[\"https:\/\/certsign.ro\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/","og_locale":"ro_RO","og_type":"article","og_title":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN","og_description":"Impactul schimb&#259;rilor tehnologice continue asupra modului &icirc;n care oamenii interac&#355;ioneaz&#259; este unul vizibil, mai ales atunci c&acirc;nd vorbim despre dispozitivele mobile utilizate (smartphone-uri, tablete, etc.). Aceast&#259; evolu&#355;ie tehnologic&#259; (&#351;i riscurile cibernetice inerente) afecteaz&#259; cultura &#351;i modul &icirc;n care ne astept&#259;m s&#259; avem acces la informa&#355;ii &#351;i unii la ceilal&#355;i. Iar aceste a&#351;tept&#259;ri sunt aduse de [&hellip;]","og_url":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/","og_site_name":"certSIGN","article_published_time":"2020-01-31T04:05:00+00:00","article_modified_time":"2021-03-01T14:20:30+00:00","author":"certsign","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"certsign","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#article","isPartOf":{"@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/"},"author":{"name":"certsign","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18"},"headline":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1)","datePublished":"2020-01-31T04:05:00+00:00","dateModified":"2021-03-01T14:20:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/"},"wordCount":933,"publisher":{"@id":"https:\/\/www.certsign.ro\/ro\/#organization"},"keywords":["securitate"],"articleSection":["Transformare digital\u0103"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/","url":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/","name":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1) - certSIGN","isPartOf":{"@id":"https:\/\/www.certsign.ro\/ro\/#website"},"datePublished":"2020-01-31T04:05:00+00:00","dateModified":"2021-03-01T14:20:30+00:00","breadcrumb":{"@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certsign.ro\/ro\/securitatea-cibernetica-pe-dispozitive-mobile-de-la-end-user-la-business-user-digital-trust-ep-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Acas\u0103","item":"https:\/\/www.certsign.ro\/ro\/"},{"@type":"ListItem","position":2,"name":"Securitatea cibernetic\u0103 pe dispozitive mobile, de la end user la business user. Digital Trust (ep.1)"}]},{"@type":"WebSite","@id":"https:\/\/www.certsign.ro\/ro\/#website","url":"https:\/\/www.certsign.ro\/ro\/","name":"certSIGN","description":"Prestator de servicii de \u00eencredere calificat","publisher":{"@id":"https:\/\/www.certsign.ro\/ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certsign.ro\/ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.certsign.ro\/ro\/#organization","name":"certSIGN","url":"https:\/\/www.certsign.ro\/ro\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/","url":"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png","contentUrl":"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png","width":317,"height":66,"caption":"certSIGN"},"image":{"@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18","name":"certsign","sameAs":["https:\/\/certsign.ro"]}]}},"_links":{"self":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts\/7367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/comments?post=7367"}],"version-history":[{"count":0,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts\/7367\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/media?parent=7367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/categories?post=7367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/tags?post=7367"},{"taxonomy":"categorie_produs","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/categorie_produs?post=7367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}