[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.mevha.cz\/jak-se-ubranit-kybernetickemu-utoku-ve-firme\/#Article","mainEntityOfPage":"https:\/\/www.mevha.cz\/jak-se-ubranit-kybernetickemu-utoku-ve-firme\/","headline":"Jak se ubr\u00e1nit kybernetick\u00e9mu \u00fatoku ve firm\u011b","name":"Jak se ubr\u00e1nit kybernetick\u00e9mu \u00fatoku ve firm\u011b","description":"Kybernetick\u00fdm \u00fatok\u016fm se v\u00a0minulosti museli br\u00e1nit p\u0159edev\u0161\u00edm velk\u00e9 podniky, ale postupem \u010dasu a zv\u00fd\u0161en\u00edm zabezpe\u010den\u00ed t\u011bchto podnik\u016f se hacke\u0159i zam\u011b\u0159ili tak\u00e9 na mal\u00e9 a st\u0159edn\u00ed podniky. A ve v\u00edce ne\u017e v\u00a0polovin\u011b p\u0159\u00edpad\u016f byli tak\u00e9 \u00fasp\u011b\u0161n\u00ed. Jak\u00e9 jsou formy napaden\u00ed a jak se mu br\u00e1nit? Ve v\u011bt\u0161in\u011b p\u0159\u00edpad\u016f se jedn\u00e1 o atak e-mailem. V\u00a0pr\u016fm\u011bru ka\u017ed\u00fd des\u00e1t\u00fd...","datePublished":"2019-10-21","dateModified":"2023-04-25","author":{"@type":"Person","@id":"https:\/\/www.mevha.cz\/author\/#Person","name":"","url":"https:\/\/www.mevha.cz\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/087c2e57f451bc02fa8017914855d7c40cf6c7d5dc1637b868e007adc26322d1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/087c2e57f451bc02fa8017914855d7c40cf6c7d5dc1637b868e007adc26322d1?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"mevha.cz","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.mevha.cz\/wp-content\/uploads\/img_a357425_w3812_t1572084136.jpg","url":"https:\/\/www.mevha.cz\/wp-content\/uploads\/img_a357425_w3812_t1572084136.jpg","height":0,"width":0},"url":"https:\/\/www.mevha.cz\/jak-se-ubranit-kybernetickemu-utoku-ve-firme\/","about":["Byznys"],"wordCount":408,"articleBody":"Kybernetick\u00fdm \u00fatok\u016fm se v\u00a0minulosti museli br\u00e1nit p\u0159edev\u0161\u00edm velk\u00e9 podniky, ale postupem \u010dasu a zv\u00fd\u0161en\u00edm zabezpe\u010den\u00ed t\u011bchto podnik\u016f se hacke\u0159i zam\u011b\u0159ili tak\u00e9 na mal\u00e9 a st\u0159edn\u00ed podniky. A ve v\u00edce ne\u017e v\u00a0polovin\u011b p\u0159\u00edpad\u016f byli tak\u00e9 \u00fasp\u011b\u0161n\u00ed. Jak\u00e9 jsou formy napaden\u00ed a jak se mu br\u00e1nit?\tVe v\u011bt\u0161in\u011b p\u0159\u00edpad\u016f se jedn\u00e1 o atak e-mailem. V\u00a0pr\u016fm\u011bru ka\u017ed\u00fd des\u00e1t\u00fd z\u00a0nevy\u017e\u00e1dan\u00fdch mail\u016f obsahuje infikovanou p\u0159\u00edlohu, kterou sta\u010d\u00ed rozkliknout a \u00fatok se stane \u00fasp\u011b\u0161n\u00fdm. Je n\u011bkolik zp\u016fsob\u016f, kter\u00fdmi hacke\u0159i \u201edonut\u00ed\u201c lidi prokliknout p\u0159ilo\u017een\u00fd odkaz, nap\u0159.:\t\t1.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00dato\u010dn\u00edk se vyd\u00e1v\u00e1 za spr\u00e1vce e-mailu a u\u017eivatele informuje o tom, \u017ee mu nebylo doru\u010deno n\u011bkolik e-mail\u016f. To ale m\u016f\u017ee snadno napravit kliknut\u00edm na odkaz, kter\u00fd ho zavede na nebezpe\u010dnou str\u00e1nku. Po kliknut\u00ed na n\u011bj se automaticky st\u00e1hne \u0161kodliv\u00fd software a mal\u00e9r je na sv\u011bt\u011b.\t2.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Nejb\u011b\u017en\u011bj\u0161\u00edm trikem provozovan\u00fdm na firmy je podvodn\u00e1 faktura. P\u0159i rozkliknut\u00ed se spust\u00ed tzv. ransomware, kter\u00fd za\u0161ifruje ve\u0161ker\u00e1 data nejen na jednom, ale prost\u0159ednictv\u00edm s\u00edt\u011b i na dal\u0161\u00edch za\u0159\u00edzen\u00edch. Po zaplacen\u00ed v\u00fdkupn\u00e9ho hacker slibuje st\u00e1hnut\u00ed tohoto \u0161kod\u00edc\u00edho softwaru.\t\tV\u00a0prvn\u00edm p\u0159\u00edpad\u011b se d\u00e1 \u00fatoku jednodu\u0161e vyhnout tak, \u017ee ne\u017e u\u017eivatel klikne na odkaz, ponech\u00e1 na n\u011bm chv\u00edli st\u00e1t kurzor a n\u00e1sledn\u011b se mu v\u00a0r\u00e1me\u010dku objev\u00ed, na jakou str\u00e1nku bude p\u0159eveden. \u017de se jedn\u00e1 o kybernetick\u00fd \u00fatok lze usoudit z\u00a0toho, \u017ee se bude jednat o nezn\u00e1mou a tedy podez\u0159elou str\u00e1nku.\tVe druh\u00e9m p\u0159\u00edpad\u011b je nutn\u00e9 zkontrolovat, zda s\u00a0danou firmou, na kterou se e-mail odkazuje skute\u010dn\u011b prob\u011bhl n\u011bjak\u00fd obchod. Pozornost je dobr\u00e9 tak\u00e9 v\u011bnovat samotn\u00e9 e-mailov\u00e9 adrese, jej\u00ed\u017e zvl\u00e1\u0161tn\u00ed tvar m\u016f\u017ee napov\u011bd\u011bt, \u017ee se jedn\u00e1 o nebezpe\u010dn\u00fd e-mail.\t\tZhruba t\u0159i \u010dtvrtiny procent kybernetick\u00fdch \u00fatok\u016f je \u00fasp\u011b\u0161n\u00e1 d\u00edky selh\u00e1n\u00ed lidsk\u00e9ho faktoru. Proto je pro firmy velmi d\u016fle\u017eit\u00e9 se zam\u011b\u0159it na kvalitn\u00ed firemn\u00ed s\u00ed\u0165, kter\u00e1 dok\u00e1\u017ee doru\u010den\u00ed t\u011bchto e-mail\u016f zabr\u00e1nit. Na trhu se pohybuje spousta specializovan\u00fdch firem, kter\u00e9 toto zabezpe\u010den\u00ed nab\u00edz\u00ed.                                                                                                                                                                                                                                                                                                                                                                                        4.2\/5 - (6 votes)        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Jak se ubr\u00e1nit kybernetick\u00e9mu \u00fatoku ve firm\u011b","item":"https:\/\/www.mevha.cz\/jak-se-ubranit-kybernetickemu-utoku-ve-firme\/#breadcrumbitem"}]}]