{"id":6198,"date":"2025-04-17T08:13:55","date_gmt":"2025-04-17T06:13:55","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6198"},"modified":"2025-04-17T08:13:55","modified_gmt":"2025-04-17T06:13:55","slug":"eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/","title":{"rendered":"ESET Cloud Office Security teraz odhal\u00ed spoofing a\u00a0homoglyfy\u00a0\u00a0\u00a0\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1024x536.png\" alt=\"BVF ECOS Spoofing nahladovy obrazok\" class=\"wp-image-6199\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1024x536.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-300x157.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-768x402.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-370x194.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-760x398.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>\u013dudia sa pova\u017euj\u00fa za\u00a0najslab\u0161\u00ed \u010dl\u00e1nok kybernetickej bezpe\u010dnosti, najm\u00e4 preto, \u017ee maj\u00fa tendenciu naletie\u0165 phishingov\u00fdm \u00fatokom. Aj ke\u010f \u010doraz viac firiem tento probl\u00e9m rie\u0161i \u00fa\u010dinn\u00fdmi \u0161koleniami o kybernetickej bezpe\u010dnosti, nedok\u00e1\u017eu pokry\u0165 v\u0161etky hrozby, ktor\u00fdm zamestnanci v\u00a0digit\u00e1lnom svete \u010delia. Dobrou spr\u00e1vou je, \u017ee spoofing a homoglyfy teraz dok\u00e1\u017ee odhali\u0165 aj technol\u00f3gia. <\/em><\/p>\n\n\n\n<p>V&nbsp;tipoch, ako rozpozna\u0165 phishingov\u00fd e\u2011mail, sa napr\u00edklad zvy\u010dajne odpor\u00fa\u010da, aby pou\u017e\u00edvatelia skontrolovali, \u010di je meno odosielate\u013ea e\u2011mailu spr\u00e1vne. Ale \u010do ak \u00fato\u010dn\u00edci pou\u017e\u00edvaj\u00fa vizu\u00e1lne triky, aby e\u2011mail odosielate\u013ea vyzeral legit\u00edmne, aj ke\u010f je v&nbsp;skuto\u010dnosti falo\u0161n\u00fd? A&nbsp;\u010do ak je e\u2011mail podvrhnut\u00fd, tak\u017ee ani to najpozornej\u0161ie oko nedok\u00e1\u017ee rozozna\u0165 rozdiel?&nbsp;<\/p>\n\n\n\n<p>Na&nbsp;ochranu firiem a&nbsp;ich zamestnancov pred spoofingom a&nbsp;homoglyfick\u00fdmi \u00fatokmi spolo\u010dnos\u0165 ESET pridala do&nbsp;rie\u0161enia ESET Cloud Office Security funkcie Antispoofing a&nbsp;Detekcia homoglyfov, ktor\u00e9 dok\u00e1\u017eu rozpozna\u0165 aj tak\u00e9 nezrovnalosti v&nbsp;\u0161kodliv\u00fdch e\u2011mailoch, ak\u00e9 \u013eudsk\u00e9 oko nezachyt\u00ed.<\/p>\n\n\n\n<p>Okrem toho vynoven\u00e9 rie\u0161enie <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\"><strong>ESET Cloud Office Security<\/strong><\/a> pon\u00faka mo\u017enos\u0165 presunu podozriv\u00fdch doru\u010den\u00fdch e\u2011mailov, ktor\u00e1 zjednodu\u0161uje spr\u00e1vu e\u2011mailovej karant\u00e9ny, a\u00a0tie\u017e vylep\u0161en\u00fd riadiaci panel poskytuj\u00faci r\u00fdchly preh\u013ead o\u00a0tom, \u010do sa deje vo\u00a0firemnom prostred\u00ed slu\u017eieb Microsoft\u00a0365 alebo Google Workspace z\u00a0h\u013eadiska bezpe\u010dnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako \u00fato\u010dn\u00edci klam\u00fa cez spoofing \u010di homoglyfick\u00e9 \u00fatoky?<\/h2>\n\n\n\n<p>Pod\u013ea <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">spr\u00e1vy spolo\u010dnosti Verizon o\u00a0vy\u0161etrovan\u00ed \u00fanikov \u00fadajov za\u00a0rok 2024<\/a> bolo 68\u00a0% naru\u0161en\u00ed bezpe\u010dnosti sp\u00f4soben\u00fdch zlyhan\u00edm \u013eudsk\u00e9ho faktora, pri\u010dom v\u00a0pr\u00edpade v\u00e4\u010d\u0161iny t\u00fdchto \u00fatokov \u0161lo o\u00a0<a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/2-phishing-manipulacia-ktora-moze-pre-firmu-skoncit-pohromou\/\">phishing<\/a> (navedenie pou\u017e\u00edvate\u013ea na\u00a0to, aby poskytol citliv\u00e9 inform\u00e1cie alebo si stiahol \u0161kodliv\u00fd obsah) alebo <a href=\"https:\/\/www.ibm.com\/topics\/pretexting#:~:text=Pretexting%20is%20use%20of%20a,the%20organization%20they%20work%20for.\">pretexting<\/a> (z\u00edskanie si d\u00f4very obete prostredn\u00edctvom vymyslen\u00e9ho pr\u00edbehu alebo z\u00e1mienky) cez\u00a0e\u2011mail.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/\">V\u00fdskum spolo\u010dnosti ESET<\/a> opakovane uk\u00e1zal, \u017ee kyberzlo\u010dinci neust\u00e1le zdokona\u013euj\u00fa svoje phishingov\u00e9 met\u00f3dy r\u00f4znymi sp\u00f4sobmi vr\u00e1tane klamn\u00fdch vizu\u00e1lnych techn\u00edk, ktor\u00e9 nenes\u00fa typick\u00e9 znaky kybernetick\u00e9ho \u00fatoku. V\u00a0t\u00fdchto pr\u00edpadoch zamestnanci zvy\u010dajne \u010delia nejak\u00e9mu druhu <a href=\"https:\/\/www.eset.com\/blog\/business\/the-abcs-of-anti-phishing-and-web-access-protection\/\">homoglyfick\u00e9ho \u00fatoku<\/a> alebo <a href=\"https:\/\/help.eset.com\/glossary\/sk-SK\/spoofing.html\">spoofingu<\/a> v\u00a0kombin\u00e1cii s\u00a0dobre nap\u00edsan\u00fdm telom e\u2011mailu. V\u010faka vysokokvalitn\u00fdm automatick\u00fdm preklada\u010dom a\u00a0chatbotom vyu\u017e\u00edvaj\u00facim umel\u00fa inteligenciu tak\u00fdto e\u2011mail nie je v\u00a0s\u00fa\u010dasnosti \u0165a\u017ek\u00e9 vytvori\u0165.<\/p>\n\n\n\n<p>Tu s\u00fa niektor\u00e9 be\u017en\u00e9 triky, na&nbsp;ktor\u00e9 si treba da\u0165 pozor:<\/p>\n\n\n\n<p><strong>Podvrhnutie odosielate\u013ea e\u2011mailu<\/strong> \u2013 podvrhnutie odosielate\u013ea e\u2011mailu je phishingov\u00e1 technika, pri ktorej \u00fato\u010dn\u00edci nakonfiguruj\u00fa adresu v\u00a0e\u2011mailovej hlavi\u010dke \u201eFrom\u201c tak, aby vyzerala ako adresa d\u00f4veryhodn\u00e9ho odosielate\u013ea. Be\u017enou praxou kyberzlo\u010dincov je aj konfigur\u00e1cia hlavi\u010dky \u201eReply\u2011To\u201c, tak\u017ee hoci adresa v\u00a0nej vyzer\u00e1 ako legit\u00edmna adresa odosielate\u013ea, odpove\u010f sa v\u00a0skuto\u010dnosti odo\u0161le sp\u00e4\u0165 \u00fato\u010dn\u00edkovi.<\/p>\n\n\n\n<p><strong>Homoglyfick\u00fd \u00fatok<\/strong> \u2013 homoglyfick\u00e9 alebo homografick\u00e9 \u00fatoky vyu\u017e\u00edvaj\u00fa to, \u017ee mnoho r\u00f4znych znakov vyzer\u00e1 ve\u013emi podobne. Vysvetlime si t\u00fato techniku na&nbsp;pr\u00edklade n\u00e1zvu dom\u00e9ny \u201e\u212es\u212et.sk\u201c. Ni\u010d nevyzer\u00e1 podozrivo, v\u0161ak? V&nbsp;skuto\u010dnosti v\u0161ak nejde o&nbsp;skuto\u010dn\u00fd n\u00e1zov dom\u00e9ny ESET, preto\u017ee namiesto p\u00edsmen abecedy \u201ee\u201c s\u00fa pou\u017eit\u00e9 symboly odhadu \u201e\u212e\u201c.<\/p>\n\n\n\n<p><strong>Typosquatting<\/strong> \u2013 podobne ako pri homoglyfick\u00fdch \u00fatokoch, aj pri typosquattingu sa pou\u017e\u00edvaj\u00fa vizu\u00e1lne triky, aby phishingov\u00e9 odkazy vyzerali legit\u00edmne. V&nbsp;tomto pr\u00edpade v\u0161ak \u00fato\u010dn\u00edci nemenia znaky, ale vyu\u017e\u00edvaj\u00fa drobn\u00e9 preklepy, napr\u00edklad \u201eeseet.sk\u201c namiesto \u201eeset.sk\u201c.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pr\u00edklady re\u00e1lnych kybernetick\u00fdch \u00fatokov<\/h2>\n\n\n\n<p>Jedna z\u00a0ned\u00e1vnych kampan\u00ed zah\u0155\u0148aj\u00facich spoofing je op\u00edsan\u00e1 v najnov\u0161ej spr\u00e1ve <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/apt-activity-report-skupiny-napojene-na-cinu-rozsiruju-svoje-utoky-na-eu\/\">ESET APT Activity Report<\/a>. Skupina Kimsuky podporovan\u00e1 Severnou K\u00f3reou <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/north-korean-spoofing-journalist\/\">vyu\u017eila spoofing<\/a> na\u00a0vytvorenie vierohodn\u00fdch spearphishingov\u00fdch e\u2011mailov zacielen\u00fdch na\u00a0severok\u00f3rejsk\u00fdch odborn\u00edkov pracuj\u00facich pre mimovl\u00e1dne organiz\u00e1cie a\u00a0v\u00fdskumn\u00edkov z\u00a0akademick\u00fdch kruhov. E\u2011maily obsahovali falo\u0161n\u00e9 \u017eiadosti o\u00a0poskytnutie predn\u00e1\u0161ky alebo rozhovoru pre m\u00e9di\u00e1. Ke\u010f si \u00fato\u010dn\u00edci zo\u00a0skupiny Kimsuky z\u00edskali d\u00f4veru obete, doru\u010dili jej \u0161kodliv\u00fd bal\u00edk, zvy\u010dajne maskovan\u00fd ako zoznam ot\u00e1zok, na\u00a0ktor\u00e9 je potrebn\u00e9 vopred odpoveda\u0165.<\/p>\n\n\n\n<p>Skupina Kimsuky si vytvorila <a href=\"https:\/\/www.ic3.gov\/CSA\/2024\/240502.pdf\">falo\u0161n\u00e9 prihlasovacie men\u00e1 a&nbsp;pou\u017e\u00edvala legit\u00edmne n\u00e1zvy dom\u00e9n<\/a>, aby sa mohli \u00fato\u010dn\u00edci vyd\u00e1va\u0165 za&nbsp;osoby z&nbsp;d\u00f4veryhodn\u00fdch organiz\u00e1ci\u00ed vr\u00e1tane think\u2011tankov a&nbsp;in\u0161tit\u00faci\u00ed vy\u0161\u0161ieho vzdel\u00e1vania.&nbsp;<\/p>\n\n\n\n<p>Spoofing sa nepou\u017e\u00edva len v&nbsp;r\u00e1mci starostlivo pripraven\u00fdch a&nbsp;cielen\u00fdch spearphishingov\u00fdch kampan\u00ed, ale po&nbsp;tejto technike siahaj\u00fa aj kyberzlo\u010dinci, ktor\u00ed masovo pon\u00fakaj\u00fa podvodn\u00e9 slu\u017eby. V\u00fdskumn\u00edci spolo\u010dnosti ESET si napr\u00edklad v\u0161imli automaticky generovan\u00e9 falo\u0161n\u00e9 e\u2011maily pri anal\u00fdze <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/telekopye-hunting-mammoths-using-telegram-bot\/\">s\u00fapravy n\u00e1strojov Telekopye<\/a>, ktor\u00e1 funguje ako bot Telegramu. <a href=\"https:\/\/www.welivesecurity.com\/en\/podcasts\/eset-research-podcast-neanderthals-mammoths-telekopye\/\">Tieto e\u2011maily pom\u00e1hali podvodn\u00edkom oklama\u0165 obete<\/a> na&nbsp;internetov\u00fdch trhovisk\u00e1ch.<\/p>\n\n\n\n<p>Typosquatting tie\u017e mo\u017eno be\u017ene spozorova\u0165 pri spamov\u00fdch a&nbsp;phishingov\u00fdch kampaniach. V\u00fdskumn\u00edci spolo\u010dnosti ESET si t\u00fato techniku v\u0161imli napr\u00edklad pri sk\u00faman\u00ed <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/rescoms-rides-waves-acecryptor-spam\/\">kampane Rescoms<\/a>, ktor\u00e1 sa v&nbsp;septembri 2023 zamerala na&nbsp;firmy v&nbsp;Po\u013esku. Rescoms, zn\u00e1my aj ako Remcos, je tr\u00f3jsky k\u00f4\u0148 pre vzdialen\u00fd pr\u00edstup (RAT), ktor\u00fd \u00fato\u010dn\u00edkom umo\u017e\u0148uje na&nbsp;dia\u013eku ovl\u00e1da\u0165 napadnut\u00fd po\u010d\u00edta\u010d.<\/p>\n\n\n\n<p>\u00dato\u010dn\u00edci sa sna\u017eili doru\u010di\u0165 Rescoms prostredn\u00edctvom \u0161kodliv\u00fdch pr\u00edloh starostlivo vytvoren\u00fdch spamov\u00fdch e\u2011mailov, ktor\u00e9 boli odoslan\u00e9 z\u00a0falo\u0161n\u00fdch dom\u00e9n napodob\u0148uj\u00facich dom\u00e9ny in\u00fdch spolo\u010dnost\u00ed. \u00dato\u010dn\u00edci sa vopred pripravili a\u00a0pri podpisovan\u00ed t\u00fdchto e\u2011mailov pou\u017eili n\u00e1zvy existuj\u00facich po\u013esk\u00fdch spolo\u010dnost\u00ed, men\u00e1 skuto\u010dn\u00fdch zamestnancov alebo vlastn\u00edkov a\u00a0ich kontaktn\u00e9 \u00fadaje.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">O\u010di na stopk\u00e1ch<\/h2>\n\n\n\n<p>Na&nbsp;z\u00e1klade t\u00fdchto pr\u00edkladov z&nbsp;re\u00e1lneho \u017eivota je jasn\u00e9, \u017ee okrem typick\u00fdch \u0161kolen\u00ed o&nbsp;kybernetickej bezpe\u010dnosti je potrebn\u00e1 aj technol\u00f3gia schopn\u00e1 odhali\u0165 hrozby, ktor\u00e9 \u013eudsk\u00e9 oko nedok\u00e1\u017ee zachyti\u0165.<\/p>\n\n\n\n<p>Najnov\u0161ia verzia <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\"><strong>ESET Cloud Office Security<\/strong><\/a> rie\u0161i tieto probl\u00e9my pomocou dvoch nov\u00fdch funkci\u00ed \u2013 Antispoofingu a\u00a0Detekcie homoglyfov, a\u00a0z\u00e1rove\u0148 zjednodu\u0161uje syst\u00e9m spr\u00e1vy e\u2011mailov.<\/p>\n\n\n\n<p>V\u0161etky tieto zmeny s\u00fa v&nbsp;s\u00falade s&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\">pr\u00edstupom spolo\u010dnosti ESET zameran\u00fdm na&nbsp;prevenciu<\/a>, ktor\u00fd zni\u017euje rizik\u00e1 spojen\u00e9 s&nbsp;pokro\u010dil\u00fdmi hrozbami a&nbsp;minimalizuje \u010das, ktor\u00fd musia bezpe\u010dnostn\u00e9 t\u00edmy venova\u0165 reakcii na&nbsp;incidenty a&nbsp;n\u00e1prave.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vylep\u0161enia v rie\u0161en\u00ed ESET Cloud Office Security<\/h3>\n\n\n\n<p><strong>Antispoofing<\/strong> \u2013 funkcia, ktor\u00e1 identifikuje hrozby a&nbsp;zabr\u00e1ni \u00fato\u010dn\u00edkom predstiera\u0165, \u017ee s\u00fa d\u00f4veryhodn\u00fdmi zdrojmi. Firmy si m\u00f4\u017eu pre prich\u00e1dzaj\u00face e\u2011maily nastavi\u0165 pravidl\u00e1 overovania, ktor\u00e9 s\u00fa zalo\u017een\u00e9 na&nbsp;\u0161tandardn\u00fdch overovac\u00edch n\u00e1strojoch \u2013 DKIM (DomainKeys Identified Mail), ktor\u00fd kontroluje podpisy e\u2011mailov, SPF (Sender Policy Framework), ktor\u00fd kontroluje server odosielate\u013ea, a&nbsp;DMARC (Domain\u2011based Message Authentication, Reporting &amp; Conformance), ktor\u00fd d\u00e1va dom\u00e9ne odosielate\u013ea mo\u017enos\u0165 informova\u0165 pr\u00edjemcu, \u010do m\u00e1 robi\u0165, ak kontrolovan\u00fd e\u2011mail neprejde dvoma predch\u00e1dzaj\u00facimi met\u00f3dami overovania.<\/p>\n\n\n\n<p>Ak sa napr\u00edklad zd\u00e1, \u017ee prich\u00e1dzaj\u00faci e\u2011mail je legit\u00edmny, ale nem\u00e1 platn\u00fd digit\u00e1lny podpis z\u00a0legit\u00edmnej dom\u00e9ny (nevyhovie kontrole DKIM), bude presunut\u00fd do\u00a0karant\u00e9ny. <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\"><strong>ESET Cloud Office Security<\/strong><\/a> dok\u00e1\u017ee rozpozna\u0165 hrozbu, aj ke\u010f \u00fato\u010dn\u00edci prevezm\u00fa kontrolu nad legit\u00edmnym e\u2011mailov\u00fdm \u00fa\u010dtom a\u00a0odo\u0161l\u00fa z\u00a0neho \u0161kodliv\u00e9 e\u2011maily, preto\u017ee IP\u00a0adresa priraden\u00e1 k\u00a0e\u2011mailov\u00e9mu serveru sa l\u00ed\u0161i od\u00a0adresy uvedenej v\u00a0z\u00e1zname SPF (zlyh\u00e1 kontrola SPF).\u00a0\u00a0 <\/p>\n\n\n\n<p><strong>Detekcia homoglyfov<\/strong> \u2013 funkcia, ktor\u00e1 identifikuje \u0161kodliv\u00e9 e\u2011mailov\u00e9 dom\u00e9ny vyd\u00e1vaj\u00face sa za\u00a0legit\u00edmne t\u00fdm, \u017ee namiesto p\u00edsmen pou\u017e\u00edvaj\u00fa podobn\u00e9 znaky alebo p\u00edsmen\u00e1 z\u00a0in\u00fdch abecied. Firmy chr\u00e1nen\u00e9 produktom <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\"><strong>ESET Cloud Office Security<\/strong><\/a> si m\u00f4\u017eu nastavi\u0165 pravidl\u00e1 pre n\u00e1zvy dom\u00e9n tak, aby pre\u0161li len tie e\u2011maily, ktor\u00e9 maj\u00fa spr\u00e1vne nap\u00edsan\u00e9 n\u00e1zvy dom\u00e9n. T\u00e1to funkcia by rozpoznala falo\u0161n\u00fd n\u00e1zov dom\u00e9ny \u201e\u212es\u212et.sk\u201c, preto\u017ee symbol odhadu \u201e\u212e\u201c m\u00e1 in\u00fd <a href=\"https:\/\/www.welivesecurity.com\/2017\/07\/27\/homograph-attacks-see-to-believe\/\">unicode<\/a> ne\u017e p\u00edsmeno abecedy \u201ee\u201c.<\/p>\n\n\n\n<p><strong>Presun podozriv\u00fdch doru\u010den\u00fdch e\u2011mailov<\/strong> \u2013 t\u00e1to funkcia zjednodu\u0161uje spr\u00e1vu e\u2011mailov v&nbsp;karant\u00e9ne. Pou\u017e\u00edvatelia m\u00f4\u017eu jednoducho presun\u00fa\u0165 ak\u00fdko\u013evek podozriv\u00fd doru\u010den\u00fd e\u2011mail do&nbsp;karant\u00e9ny, a&nbsp;ak sa nesk\u00f4r uk\u00e1\u017ee ako legit\u00edmny, jedn\u00fdm kliknut\u00edm ho z&nbsp;nej uvo\u013enia.<\/p>\n\n\n\n<p><strong>Vylep\u0161en\u00fd riadiaci panel<\/strong> \u2013 riadiaci panel ESET Cloud Office Security poskytuje d\u00f4le\u017eit\u00e9 inform\u00e1cie o&nbsp;celkovom po\u010dte chr\u00e1nen\u00fdch pou\u017e\u00edvate\u013eov, vyu\u017e\u00edvan\u00ed licenci\u00ed, pou\u017e\u00edvate\u013eoch, ktor\u00ed s\u00fa najv\u00e4\u010d\u0161\u00edmi pr\u00edjemcami spamu, \u0161kodliv\u00fdch a&nbsp;phishingov\u00fdch e\u2011mailov, ako aj o&nbsp;najpodozrivej\u0161\u00edch \u00fa\u010dtoch alebo skupin\u00e1ch\/lokalit\u00e1ch v&nbsp;slu\u017eb\u00e1ch OneDrive, Disk Google, SharePoint a&nbsp;Teams. Spr\u00e1vcovia m\u00f4\u017eu tie\u017e vidie\u0165 detekcie spamu, malv\u00e9ru a&nbsp;phishingu v&nbsp;slu\u017eb\u00e1ch Exchange Online, Gmail, OneDrive, Disk Google, SharePoint a&nbsp;Teams.<\/p>\n\n\n\n<p>Vylep\u0161en\u00fd riadiaci panel obsahuje plne prisp\u00f4sobite\u013en\u00e9 karty a&nbsp;komponenty, ktor\u00e9 vyhovej\u00fa \u0161pecifick\u00fdm potreb\u00e1m spr\u00e1vcov alebo r\u00f4znych druhov firiem, ako s\u00fa mal\u00e9 a&nbsp;stredn\u00e9 podniky, poskytovatelia spravovan\u00fdch slu\u017eieb \u010di ve\u013ek\u00e9 firmy. Okrem vizu\u00e1lne vylep\u0161en\u00fdch existuj\u00facich prvkov obsahuje aktualizovan\u00fd riadiaci panel aj nov\u00e9 prvky.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co t\u00fdm z\u00edskate? <\/h2>\n\n\n\n<p>Ke\u010f\u017ee \u00fato\u010dn\u00edci zdokona\u013euj\u00fa svoje phishingov\u00e9 techniky, mo\u017enosti zamestnancov rozpozna\u0165 \u0161kodliv\u00e9 e\u2011maily s\u00fa \u010doraz obmedzenej\u0161ie, a&nbsp;to aj napriek dostupnosti \u0161kolen\u00ed o&nbsp;kybernetickej bezpe\u010dnosti. Na&nbsp;\u00faspe\u0161n\u00e9 zmiernenie t\u00fdchto hrozieb potrebuj\u00fa firmy pokro\u010dil\u00e9 n\u00e1stroje kybernetickej bezpe\u010dnosti so&nbsp;schopnos\u0165ou zachyti\u0165 \u0161kodliv\u00e9 e\u2011maily, ktor\u00e9 s\u00fa niekedy na&nbsp;nerozoznanie od&nbsp;legit\u00edmnych.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> <\/strong>si porad\u00ed s\u00a0podvrhnut\u00fdmi e\u2011mailmi aj homoglyfick\u00fdmi \u00fatokmi a\u00a0zablokuje ich sk\u00f4r, ako prenikn\u00fa k\u00a0cie\u013eov\u00fdm zamestnancom. Firmy sa tak m\u00f4\u017eu vyhn\u00fa\u0165 pr\u00edpadn\u00fdm finan\u010dn\u00fdm strat\u00e1m, po\u0161kodeniu dobr\u00e9ho mena alebo naru\u0161eniu prev\u00e1dzky.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u013dudia sa pova\u017euj\u00fa za\u00a0najslab\u0161\u00ed \u010dl\u00e1nok kybernetickej bezpe\u010dnosti, najm\u00e4 preto, \u017ee maj\u00fa tendenciu naletie\u0165 phishingov\u00fdm \u00fatokom. Aj ke\u010f \u010doraz viac firiem tento probl\u00e9m rie\u0161i \u00fa\u010dinn\u00fdmi \u0161koleniami o kybernetickej bezpe\u010dnosti, nedok\u00e1\u017eu pokry\u0165 v\u0161etky hrozby, ktor\u00fdm zamestnanci v\u00a0digit\u00e1lnom svete \u010delia. Dobrou spr\u00e1vou je, \u017ee spoofing a homoglyfy teraz dok\u00e1\u017ee odhali\u0165 aj technol\u00f3gia. V&nbsp;tipoch, ako rozpozna\u0165 phishingov\u00fd e\u2011mail, sa napr\u00edklad zvy\u010dajne odpor\u00fa\u010da, aby pou\u017e\u00edvatelia skontrolovali, \u010di&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6200,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET<\/title>\n<meta name=\"description\" content=\"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET\" \/>\n<meta property=\"og:description\" content=\"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T06:13:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"ESET Cloud Office Security teraz odhal\u00ed spoofing a\u00a0homoglyfy\u00a0\u00a0\u00a0\u00a0\",\"datePublished\":\"2025-04-17T06:13:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\"},\"wordCount\":1799,\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\",\"name\":\"ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png\",\"datePublished\":\"2025-04-17T06:13:55+00:00\",\"description\":\"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png\",\"width\":1200,\"height\":628,\"caption\":\"BVF ECOS Spoofing ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Cloud Office Security teraz odhal\u00ed spoofing a\u00a0homoglyfy\u00a0\u00a0\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET","description":"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/","og_locale":"sk_SK","og_type":"article","og_title":"ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET","og_description":"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2025-04-17T06:13:55+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"8 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"ESET Cloud Office Security teraz odhal\u00ed spoofing a\u00a0homoglyfy\u00a0\u00a0\u00a0\u00a0","datePublished":"2025-04-17T06:13:55+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/"},"wordCount":1799,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/","name":"ESET Cloud Office Security odhal\u00ed spoofing a\u00a0homoglyfy | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png","datePublished":"2025-04-17T06:13:55+00:00","description":"Hrozby, ktor\u00e9 s\u00fa \u010dasto pre be\u017en\u00e9 oko zamestnanca nevidite\u013en\u00e9, ako spoofing \u010di homoglyfick\u00e9 \u00fatoky, teraz odhal\u00ed ESET Cloud Office Security.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/04\/SK_Office-Security-1200x628px-no-text-1.png","width":1200,"height":628,"caption":"BVF ECOS Spoofing ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/eset-cloud-office-security-teraz-odhali-spoofing-a-homoglyfy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"ESET Cloud Office Security teraz odhal\u00ed spoofing a\u00a0homoglyfy\u00a0\u00a0\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6198"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6198\/revisions"}],"predecessor-version":[{"id":6201,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6198\/revisions\/6201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6200"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}