{"id":21043,"date":"2022-07-18T04:00:00","date_gmt":"2022-07-18T04:00:00","guid":{"rendered":"https:\/\/www.lightspeedsystems.com\/blog\/why-hackers-target-k12-schools\/"},"modified":"2024-12-05T22:55:02","modified_gmt":"2024-12-05T22:55:02","slug":"why-hackers-target-k12-schools","status":"publish","type":"post","link":"https:\/\/www.lightspeedsystems.com\/it\/blog\/why-hackers-target-k12-schools\/","title":{"rendered":"Perch\u00e9 gli hacker prendono di mira le scuole K-12"},"content":{"rendered":"<div class=\"section__content__main__content\">\n<p>Secondo un <a href=\"https:\/\/www.cosn.org\/edtech-topics\/state-of-edtech-leadership\/\">Rapporto del sondaggio sulla leadership EdTech 2022<\/a>, la sicurezza informatica \u00e8 la preoccupazione principale del personale IT scolastico, eppure solo l&#039;8% dei responsabili IT considera il proprio distretto ad alto rischio. Perch\u00e9 questa disconnessione? Forse le scuole sembrano ancora bersagli improbabili per gli hacker? Dopotutto, rispetto alle istituzioni finanziarie e alle aziende, le scuole K-12 possono sembrare offrire agli hacker ricompense limitate.<\/p>\n<p>Ma, in realt\u00e0, le scuole non contengono solo una grande quantit\u00e0 di dati personali su studenti e personale: le scuole K-12 sono sostenute da governi statali e locali che potrebbero pagare piuttosto che lasciare che dati altamente sensibili vengano resi pubblici o perdere la possibilit\u00e0 di accedere a e-mail, reti o file.<\/p>\n<p>Solide pratiche e sistemi di sicurezza informatica possono aiutare <a href=\"https:\/\/www.lightspeedsystems.com\/it\/blog\/improve-k12-schools-cybersecurity\/\">proteggi la tua rete<\/a>Comprendere la natura della minaccia \u00e8 il primo passo per proteggere i dati del tuo distretto, nonch\u00e9 quelli dei tuoi studenti e del tuo personale.<\/p>\n<h3>\n<span><br \/>\n<span><br \/>\nPerch\u00e9 gli attacchi informatici alle scuole K-12 sono in aumento negli Stati Uniti e all&#039;estero<br \/>\n<\/span><br \/>\n<\/span><br \/>\n<\/h3>\n<p>Dal 2016 ci sono stati <a href=\"https:\/\/www.edweek.org\/leadership\/cyberattacks-force-schools-to-bolster-online-security\/2020\/03\">775 casi di reati informatici contro le scuole resi pubblici<\/a>, con 408 solo nel 2020. Si tratta di pi\u00f9 del doppio del numero riportato l&#039;anno prima, e gli esperti notano che questi numeri rappresentano solo i casi che sono stati resi noti. Probabilmente si sono verificati molti altri attacchi contro le reti scolastiche, nascosti all&#039;occhio del pubblico.<\/p>\n<p>I cambiamenti diffusi nell&#039;istruzione dovuti alla pandemia di COVID-19 potrebbero essere in parte responsabili. L&#039;apprendimento a distanza ha aperto molti pi\u00f9 punti di accesso per potenziali attacchi, poich\u00e9 studenti, insegnanti e amministratori hanno effettuato l&#039;accesso da dispositivi in pi\u00f9 sedi e reti esterne.<\/p>\n<p>Ma molti di questi cambiamenti, come la maggiore adozione di dispositivi 1-to-1, l&#039;uso diffuso di nuovi software e app e la maggiore pressione sui piccoli staff IT delle scuole, sembrano destinati a durare anche se gli studenti sono tornati alla scuola in presenza. \u00c8 quindi <a href=\"https:\/\/www.lightspeedsystems.com\/it\/blog\/improve-k12-schools-cybersecurity\/\">un momento perfetto per i distretti per migliorare le loro strategie di sicurezza informatica<\/a>.<\/p>\n<h3>\n<span><br \/>\n<span><br \/>\nPerch\u00e9 gli hacker prendono di mira le scuole K-12<br \/>\n<\/span><br \/>\n<\/span><br \/>\n<\/h3>\n<p>Sebbene le scuole possano non avere le risorse finanziarie di istituzioni pi\u00f9 grandi, le loro reti contengono una grande quantit\u00e0 di informazioni personali sensibili sia per gli insegnanti che per gli studenti, come nomi, indirizzi e numeri di previdenza sociale. Gli indirizzi e-mail che terminano con &quot;edu&quot; sono anche particolarmente attraenti per gli hacker perch\u00e9 sono utili in futuri attacchi ad altre sedi.<\/p>\n<p>Ma uno dei motivi principali per cui le scuole K-12 sono obiettivi popolari per gli hacker \u00e8 semplice: sono bersagli facili. La maggior parte delle scuole ha protezioni di sicurezza limitate. I dipartimenti IT delle scuole sono spesso piccoli e i team sono spesso sotto pressione con il normale funzionamento quotidiano di una grande e complessa rete di utenti e visitatori.<\/p>\n<p>Con la proliferazione di dispositivi per supportare l&#039;apprendimento a distanza, le funzioni di gestione dei team IT sono diventate ancora pi\u00f9 intense. Peggio ancora, molte scuole non offrono formazione sulla sicurezza informatica per insegnanti e personale, e molti dipartimenti IT scolastici non hanno nessuno dedicato esclusivamente alla sicurezza informatica. Queste condizioni rendono pi\u00f9 probabile che un insegnante oberato di lavoro clicchi su un collegamento di phishing da un hacker senza rendersi conto del rischio.<\/p>\n<p>Le reti K-12 possono anche essere sovraccaricate da programmi che non hanno superato i protocolli di sicurezza. Questo rischio \u00e8 spesso intensificato perch\u00e9 gli arretrati di aggiornamenti e patch del reparto IT ostacolano la capacit\u00e0 di un team di riconoscere e bloccare le minacce.<\/p>\n<p>La pandemia ha anche rappresentato una minaccia per la sicurezza informatica attraverso la proliferazione di nuovi software e app che aiutano nell&#039;insegnamento. Molti programmi sono stati offerti gratuitamente e direttamente agli insegnanti, che potrebbero averli scaricati al di fuori dell&#039;ambito delle normali procedure operative IT della loro scuola. Allo stesso modo, \u00e8 stato fin troppo facile per gli studenti portare app non verificate sulla rete tramite i propri dispositivi durante il lockdown (e i dispositivi personali rimangono un facile punto di ingresso per malware pericolosi). Tali programmi potrebbero rimanere sui dispositivi della scuola e degli studenti, consentendo agli hacker di entrare nella tua rete.<\/p>\n<p>Il tuo distretto deve presumere che gli hacker continueranno a diventare pi\u00f9 sofisticati nei loro metodi per sfruttare le debolezze delle tue reti. Conoscere i rischi e il modo migliore per proteggere i tuoi studenti e il tuo personale, e cosa fare in caso di attacco, non \u00e8 mai stato cos\u00ec importante.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Secondo un sondaggio del 2022 sulla leadership nell&#039;EdTech, la sicurezza informatica \u00e8 la principale preoccupazione del personale IT scolastico, eppure solo l&#039;81% dei responsabili IT ritiene che il proprio distretto scolastico sia ad alto rischio. Perch\u00e9 il dis\u2026<\/p>","protected":false},"author":14,"featured_media":1168,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Hackers K-12","_yoast_wpseo_title":"Why Do Hackers Target K-12 Schools? | Lightspeed Systems","_yoast_wpseo_metadesc":"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.","footnotes":""},"categories":[1],"tags":[10,15],"class_list":["post-21043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-lightspeed-filter","tag-web-content-filtering"],"acf":{"authors":[531]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Do Hackers Target K-12 Schools? | Lightspeed Systems<\/title>\n<meta name=\"description\" content=\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lightspeedsystems.com\/it\/blog\/why-hackers-target-k12-schools\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Hackers Target K-12 Schools\" \/>\n<meta property=\"og:description\" content=\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lightspeedsystems.com\/it\/blog\/why-hackers-target-k12-schools\/\" \/>\n<meta property=\"og:site_name\" content=\"Lightspeed Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lightspeedsystems\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-18T04:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T22:55:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Irelene C\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:site\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lightspeed Systems\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/\"},\"author\":{\"name\":\"Irelene C\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/person\\\/b2d65d2b53e3b886eb2380a1198e9a90\"},\"headline\":\"Why Hackers Target K-12 Schools\",\"datePublished\":\"2022-07-18T04:00:00+00:00\",\"dateModified\":\"2024-12-05T22:55:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/\"},\"wordCount\":658,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/why-hackers-target-schools-featured-min.png\",\"keywords\":[\"Lightspeed Filter\u2122\",\"Web Content Filtering\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/\",\"name\":\"Why Do Hackers Target K-12 Schools? | Lightspeed Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/why-hackers-target-schools-featured-min.png\",\"datePublished\":\"2022-07-18T04:00:00+00:00\",\"dateModified\":\"2024-12-05T22:55:02+00:00\",\"description\":\"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/why-hackers-target-schools-featured-min.png\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/why-hackers-target-schools-featured-min.png\",\"width\":1200,\"height\":628,\"caption\":\"Why hackers target schools featured\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/blog\\\/why-hackers-target-k12-schools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Hackers Target K-12 Schools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"name\":\"Lightspeed Systems\",\"description\":\"Helping K-12 communities provide safe, secure, and equitable education\u2014effortlessly.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\",\"name\":\"Lightspeed Systems\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"caption\":\"Lightspeed Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lightspeedsystems\\\/\",\"https:\\\/\\\/x.com\\\/lightspeedsys\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/lightspeed-systems\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/person\\\/b2d65d2b53e3b886eb2380a1198e9a90\",\"name\":\"Irelene C\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g\",\"caption\":\"Irelene C\"},\"sameAs\":[\"https:\\\/\\\/caffeineinteractive.com\"],\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/it\\\/person\\\/lightspeed-systems\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Perch\u00e9 gli hacker prendono di mira le scuole primarie e secondarie? | Lightspeed Systems","description":"Scopri perch\u00e9 gli hacker prendono di mira le scuole primarie e secondarie, cos\u00ec potrai prepararti meglio e ridurre i rischi che il tuo distretto scolastico diventi vittima di un attacco informatico.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lightspeedsystems.com\/it\/blog\/why-hackers-target-k12-schools\/","og_locale":"it_IT","og_type":"article","og_title":"Why Hackers Target K-12 Schools","og_description":"Learn why hackers target K-12 schools so you can better prepare and mitigate the risks of your district falling victim to a cyberattack.","og_url":"https:\/\/www.lightspeedsystems.com\/it\/blog\/why-hackers-target-k12-schools\/","og_site_name":"Lightspeed Systems","article_publisher":"https:\/\/www.facebook.com\/lightspeedsystems\/","article_published_time":"2022-07-18T04:00:00+00:00","article_modified_time":"2024-12-05T22:55:02+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","type":"image\/png"}],"author":"Irelene C","twitter_card":"summary_large_image","twitter_creator":"@lightspeedsys","twitter_site":"@lightspeedsys","twitter_misc":{"Written by":"Lightspeed Systems","Est. reading time":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#article","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"},"author":{"name":"Irelene C","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90"},"headline":"Why Hackers Target K-12 Schools","datePublished":"2022-07-18T04:00:00+00:00","dateModified":"2024-12-05T22:55:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"},"wordCount":658,"publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","keywords":["Lightspeed Filter\u2122","Web Content Filtering"],"articleSection":["Uncategorized"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/","url":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/","name":"Perch\u00e9 gli hacker prendono di mira le scuole primarie e secondarie? | Lightspeed Systems","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","datePublished":"2022-07-18T04:00:00+00:00","dateModified":"2024-12-05T22:55:02+00:00","description":"Scopri perch\u00e9 gli hacker prendono di mira le scuole primarie e secondarie, cos\u00ec potrai prepararti meglio e ridurre i rischi che il tuo distretto scolastico diventi vittima di un attacco informatico.","breadcrumb":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#primaryimage","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2023\/10\/why-hackers-target-schools-featured-min.png","width":1200,"height":628,"caption":"Why hackers target schools featured"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lightspeedsystems.com\/zh\/blog\/why-hackers-target-k12-schools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lightspeedsystems.com\/"},{"@type":"ListItem","position":2,"name":"Why Hackers Target K-12 Schools"}]},{"@type":"WebSite","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website","url":"https:\/\/www.lightspeedsystems.com\/zh\/","name":"Sistemi di velocit\u00e0 della luce","description":"Aiutare le comunit\u00e0 K-12 a fornire un&#039;istruzione sicura, protetta ed equa, senza sforzo.","publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization","name":"Sistemi di velocit\u00e0 della luce","url":"https:\/\/www.lightspeedsystems.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","caption":"Lightspeed Systems"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lightspeedsystems\/","https:\/\/x.com\/lightspeedsys","https:\/\/www.linkedin.com\/company\/lightspeed-systems\/"]},{"@type":"Person","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/b2d65d2b53e3b886eb2380a1198e9a90","name":"Irelene C","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb16e9af0359e050aa2c99062e2757ade98c557d1780989523bc02ba93a0fdb9?s=96&d=mm&r=g","caption":"Irelene C"},"sameAs":["https:\/\/caffeineinteractive.com"],"url":"https:\/\/www.lightspeedsystems.com\/it\/person\/lightspeed-systems\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/posts\/21043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/comments?post=21043"}],"version-history":[{"count":0,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/posts\/21043\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/person\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/media\/1168"}],"wp:attachment":[{"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/media?parent=21043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/categories?post=21043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/it\/wp-json\/wp\/v2\/tags?post=21043"}],"curies":[{"name":"scrivere","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}