{"id":19709,"date":"2022-02-14T12:05:54","date_gmt":"2022-02-14T17:05:54","guid":{"rendered":"https:\/\/www.criteo.com\/?page_id=332276"},"modified":"2026-05-08T21:38:16","modified_gmt":"2026-05-08T19:38:16","slug":"security","status":"publish","type":"page","link":"https:\/\/www.criteo.com\/it\/trust-center\/security\/","title":{"rendered":"Sicurezza"},"content":{"rendered":"<p><strong>Sicurezza<\/strong><\/p>\n<p>Noi di Criteo ci impegniamo per garantire i migliori standard di sicurezza in ogni ambito della nostra attivit\u00e0 e in tutti i nostri prodotti. Proteggiamo i nostri sistemi dai rischi e promuoviamo una gestione attenta di eventuali falle e incidenti.<\/p>\n<p>Supervisioniamo un programma di bug bounty privato con l\u2019intento di potenziare le nostre capacit\u00e0 di analisi e di garantire un livello di sicurezza elevato. Offriamo ricompense adeguate per la segnalazione etica di vulnerabilit\u00e0 che rientrano nell\u2019ambito del nostro programma. Contattaci\u00a0all\u2019indirizzo\u00a0<a href=\"mailto:security@criteo.com\">security@criteo.com<\/a>\u00a0se desideri partecipare.<\/p>\n<p>Inoltre, eseguiamo regolarmente test di valutazione della sicurezza informatica per individuare eventuali punti deboli nei nostri sistemi e intervenire.<\/p>\n<p>Desideriamo diffondere un approccio culturale che mette la sicurezza al centro della nostra attivit\u00e0, ben oltre l\u2019ambito tecnologico, per cui ogni dipendente \u00e8 consapevole che la tutela dei nostri sistemi \u00e8 responsabilit\u00e0 di tutti. Ogni dipendente di Criteo partecipa a percorsi formativi sulla sicurezza informatica: conduciamo campagne di sensibilizzazione sulle minacce pi\u00f9 recenti e sulle pratiche da seguire.<\/p>\n<p>Consulta le nostre sezioni dedicate per scoprire di pi\u00f9 sulla Gestione della sicurezza informatica di Criteo e scopri come proteggiamo i tuoi dati.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sicurezza Noi di Criteo ci impegniamo per garantire i migliori standard di sicurezza in ogni ambito della nostra attivit\u00e0 e in tutti i nostri prodotti. Proteggiamo i nostri sistemi dai rischi e promuoviamo una gestione attenta di eventuali falle e incidenti. Supervisioniamo un programma di bug bounty privato con l\u2019intento di potenziare le nostre capacit\u00e0 [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"parent":19706,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/basic.php","meta":{"_acf_changed":false,"footnotes":""},"coauthors":[460],"class_list":["post-19709","page","type-page","status-publish"],"acf":{"layout_mode":"security-2023","has_more_content":false,"storetail_optout":false,"stae_popup_enable":false,"track_page_in_segment":false,"segment_page_name":"","additional_code":"","toc_order":"0","enable_slide-in":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to spot fake, fraudulent, spoof, or phishing emails and messages<\/title>\n<meta name=\"description\" content=\"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.criteo.com\/it\/trust-center\/security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to spot fake, fraudulent, spoof, or phishing emails and messages\" \/>\n<meta property=\"og:description\" content=\"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.criteo.com\/it\/trust-center\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"IT - Criteo\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-08T19:38:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/it\/trust-center\/security\/\",\n\t            \"url\": \"https:\/\/www.criteo.com\/it\/trust-center\/security\/\",\n\t            \"name\": \"How to spot fake, fraudulent, spoof, or phishing emails and messages\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/it\/#website\"\n\t            },\n\t            \"datePublished\": \"2022-02-14T17:05:54+00:00\",\n\t            \"dateModified\": \"2026-05-08T19:38:16+00:00\",\n\t            \"description\": \"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/it\/trust-center\/security\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"it-IT\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.criteo.com\/it\/trust-center\/security\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/it\/trust-center\/security\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.criteo.com\/it\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Trust Center\",\n\t                    \"item\": \"https:\/\/www.criteo.com\/it\/trust-center\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Sicurezza\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/it\/#website\",\n\t            \"url\": \"https:\/\/www.criteo.com\/it\/\",\n\t            \"name\": \"IT - Criteo\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/it\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.criteo.com\/it\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"it-IT\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/it\/#organization\",\n\t            \"name\": \"Criteo\",\n\t            \"alternateName\": \"Criteo corp\",\n\t            \"url\": \"https:\/\/www.criteo.com\/it\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"it-IT\",\n\t                \"@id\": \"https:\/\/www.criteo.com\/it\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.criteo.com\/it\/wp-content\/uploads\/sites\/9\/2024\/02\/Criteo-Logo.svg\",\n\t                \"contentUrl\": \"https:\/\/www.criteo.com\/it\/wp-content\/uploads\/sites\/9\/2024\/02\/Criteo-Logo.svg\",\n\t                \"width\": 118,\n\t                \"height\": 24,\n\t                \"caption\": \"Criteo\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/it\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to spot fake, fraudulent, spoof, or phishing emails and messages","description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.criteo.com\/it\/trust-center\/security\/","og_locale":"it_IT","og_type":"article","og_title":"How to spot fake, fraudulent, spoof, or phishing emails and messages","og_description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","og_url":"https:\/\/www.criteo.com\/it\/trust-center\/security\/","og_site_name":"IT - Criteo","article_modified_time":"2026-05-08T19:38:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.criteo.com\/it\/trust-center\/security\/","url":"https:\/\/www.criteo.com\/it\/trust-center\/security\/","name":"How to spot fake, fraudulent, spoof, or phishing emails and messages","isPartOf":{"@id":"https:\/\/www.criteo.com\/it\/#website"},"datePublished":"2022-02-14T17:05:54+00:00","dateModified":"2026-05-08T19:38:16+00:00","description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","breadcrumb":{"@id":"https:\/\/www.criteo.com\/it\/trust-center\/security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.criteo.com\/it\/trust-center\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.criteo.com\/it\/trust-center\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.criteo.com\/it\/"},{"@type":"ListItem","position":2,"name":"Trust Center","item":"https:\/\/www.criteo.com\/it\/trust-center\/"},{"@type":"ListItem","position":3,"name":"Sicurezza"}]},{"@type":"WebSite","@id":"https:\/\/www.criteo.com\/it\/#website","url":"https:\/\/www.criteo.com\/it\/","name":"IT - Criteo","description":"","publisher":{"@id":"https:\/\/www.criteo.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.criteo.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.criteo.com\/it\/#organization","name":"Criteo","alternateName":"Criteo corp","url":"https:\/\/www.criteo.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.criteo.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.criteo.com\/it\/wp-content\/uploads\/sites\/9\/2024\/02\/Criteo-Logo.svg","contentUrl":"https:\/\/www.criteo.com\/it\/wp-content\/uploads\/sites\/9\/2024\/02\/Criteo-Logo.svg","width":118,"height":24,"caption":"Criteo"},"image":{"@id":"https:\/\/www.criteo.com\/it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/pages\/19709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/comments?post=19709"}],"version-history":[{"count":3,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/pages\/19709\/revisions"}],"predecessor-version":[{"id":19720,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/pages\/19709\/revisions\/19720"}],"up":[{"embeddable":true,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/pages\/19706"}],"wp:attachment":[{"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/media?parent=19709"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.criteo.com\/it\/wp-json\/wp\/v2\/coauthors?post=19709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}