{"id":7753,"date":"2025-11-06T13:19:29","date_gmt":"2025-11-06T12:19:29","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=7753"},"modified":"2025-11-06T14:02:26","modified_gmt":"2025-11-06T13:02:26","slug":"cybersecurity-month-2025-summary","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/","title":{"rendered":"A Creative and Inspiring Cybersec Month with Xopero Software"},"content":{"rendered":"\n<p>They say hard times create strong men. And creative challenges? Resourceful IT admins!<\/p>\n\n\n\n<p>At the beginning of October, traditionally celebrated as Cybersecurity Awareness Month, we invited you to learn together through play. Four different challenges, codenamed Mission: Cybersafe, attracted a decent crowd of IT specialists eager to compete for creativity and ingenuity, while showing off their cybersec expertise.<\/p>\n\n\n\n<p>The results exceeded our expectations. Just see for yourselves!<\/p>\n\n\n\n<!--more-->\n\n\n<div role=\"navigation\" aria-label=\"Spis tre\u015bci\" class=\"simpletoc wp-block-simpletoc-toc\"><h2 style=\"margin: 0;\"><button type=\"button\" aria-expanded=\"false\" aria-controls=\"simpletoc-content-container\" class=\"simpletoc-collapsible\">Spis tre\u015bci<span class=\"simpletoc-icon\" aria-hidden=\"true\"><\/span><\/button><\/h2><div id=\"simpletoc-content-container\" class=\"simpletoc-content\"><ul class=\"simpletoc-list\">\n<li><a href=\"#challenge-1-an-adminmarketer-creates-a-catchy-slogan\">Challenge 1: An Admin-Marketer Creates a Catchy Slogan<\/a>\n\n<\/li>\n<li><a href=\"#challenge-2-ransomware-doesnt-affect-us-debunking-it-sec-myths\">Challenge 2: Ransomware Doesn&#8217;t Affect Us: Debunking IT Sec Myths<\/a>\n\n<\/li>\n<li><a href=\"#challenge-3-tales-from-the-cryp-or-the-server-room\">Challenge 3: Tales from the Cryp&#8230; or the Server Room<\/a>\n\n<\/li>\n<li><a href=\"#challenge-4-tell-me-bout-them-compooters-ya-got-steve\">Challenge 4: Tell Me 'Bout Them Compooters Ya Got, Steve<\/a>\n\n<\/li>\n<li><a href=\"#a-month-so-fine-well-cherish-it-for-all-time\">A Month So Fine, We\u2019ll Cherish It for All Time<\/a>\n\n\n<ul><li>\n<a href=\"#one-more-challenge-complete-the-survey-and-help-fight-cyber-threats\">One More Challenge? Complete the Survey and Help Fight Cyber Threats<\/a>\n<\/li>\n<\/ul>\n<\/li><\/ul><\/div><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"challenge-1-an-adminmarketer-creates-a-catchy-slogan\">Challenge 1: An Admin-Marketer Creates a Catchy Slogan<\/h2>\n\n\n<p>In the first week of the contest, we asked participants to find a word in a word puzzle and use it to create a slogan related to cybersecurity. What?! Slogans are marketers\u2019 domain, aren&#8217;t they? Not at all! Flashing LEDs and the hum of servers can apparently be a great source of inspiration.<\/p>\n\n\n\n<p>Our Xopero Software jury was most charmed by the 'call&#8217; for understanding for stressed and overworked admins:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>\u201cRecovery \u2013 because every admin deserves a second chance.\u201d<\/em><\/p>\n\n\n\n<p>Simple yet evoking positive emotions\u2014just like a perfectly crafted social campaign. However, there were more interesting ideas in store for us:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201c<em>Backup today, peace of mind tomorrow.\u201d<\/em>\u2014The voice of reason opposing the Southern &#8222;ma\u00f1ana&#8221; or&#8230; English \u201cLet\u2019s just wing it.&#8221;<\/li>\n\n\n\n<li><em>\u201cENCRYPTION\u2014the silent guardian of your data.\u201d<\/em> \u2014Here, the slogan is not only creative but also professional!<\/li>\n<\/ul>\n\n\n\n<p>OK then, maybe these IT guys aren&#8217;t such gloomy and hopelessly dull folks after all?<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"challenge-2-ransomware-doesnt-affect-us-debunking-it-sec-myths\">Challenge 2: Ransomware Doesn&#8217;t Affect Us: Debunking IT Sec Myths<\/h2>\n\n\n<p>Every field of life has its myths or &#8222;urban legends.&#8221; The same goes for cybersecurity, where clinging to false beliefs can have disastrous consequences. In the second week of October, we asked contestants to share myths they\u2019ve heard from clients, industry friends, and others.<\/p>\n\n\n\n<p>In this competition, we were impressed by a \u2018scholarly\u2019 set of classical cyber myths:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center\"><em>&#8222;VPN makes me anonymous.<br>A strong password is enough to protect data.<br>I have an antivirus, so I&#8217;m safe.<br>The use of HTTPS protocol means a site is secure.<br>If I delete something from my computer, it&#8217;s gone forever.<br>Security is the IT department&#8217;s problem.&#8221;<\/em><\/p>\n<\/div><\/div>\n\n\n\n<p>You can learn quite a lot, right?! But that&#8217;s not the end of the interesting quotes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>\u201cHaving remote desktops on a single production server is a backup. Because if a disk of a computer fails, everything is on the server, right?\u201d<\/em>\u2014Well, it must have been a great surprise after a failure.<\/li>\n\n\n\n<li><em>\u201cRansomware doesn&#8217;t affect us because we are not a large company.\u201d<\/em>\u2014That\u2019s some twisted logic, isn\u2019t it?<\/li>\n<\/ul>\n\n\n\n<p>Looking at the last example, one could ironically say, &#8222;Ignorance is bliss.&#8221; Unfortunately, such a peace of mind is usually short-lived. Or rather, it lasts until something happens that shakes the entire organization. In the end, it&#8217;s probably better to <a href=\"https:\/\/xopero.com\/solutions\/data-protection\/xopero-one-backup-recovery\/\">have a plan B(ackup)<\/a>.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"challenge-3-tales-from-the-cryp-or-the-server-room\">Challenge 3: Tales from the Cryp&#8230; or the Server Room<\/h2>\n\n\n<p>And what if something\u2019s already happened? For sure, it&#8217;s not a happy moment. But it can be funny when we recall or tell such an experience as an anecdote with the benefit of hindsight.<\/p>\n\n\n\n<p>Therefore, as a part of the challenge no. 3, we encouraged contestants\u2014partly for fun and partly to build cyber awareness\u2014to share these types of stories, both firsthand and third-party accounts.<\/p>\n\n\n\n<p>When it comes to the 3rd challenge, we were captivated by the story of a certain programmer who, at the beginning of their professional career, deleted the production database instead of a test one. A true \u2018cyber baptism by fire.\u2019 You can see (or read) it for yourselves <a href=\"https:\/\/www.linkedin.com\/pulse\/night-i-learned-critical-lesson-data-management-peter-graves-marwe\/\">here<\/a>.<\/p>\n\n\n\n<p>The lack of an <a href=\"https:\/\/xopero.com\/solutions\/data-protection\/xopero-unified-protection\/\">appropriate backup and data recovery solution<\/a> was also the root cause of other stories we received:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>\u201c[There was no] backup for data hosted in the OVH Cloud, which is why in 2021, data of many clients literally went up in smoke, including working copies, backups of client data, personal data, accounting data. Some businesses simply ceased to exist. All it would have taken to prevent would be choosing a slightly more expensive subscription with a backup in a different location\u2014just to be able to restore data from a backup located elsewhere than the fire-stricken data center.\u201d<\/em><\/li>\n\n\n\n<li><em>\u201c[Let\u2019s imagine] school computer labs, or rather, servers with AD and class management software. As is often the case at schools, the servers had been standing for several years and a power failure completely destroyed their disks at some point \ud83d\ude41. Fortunately, it turned out that one of the IT specialists had made a full server backup for testing purposes and restored it on their machine as a virtual instance. After buying new disks for the servers, it turned out that the licenses for the lab software support had long expired \ud83d\ude03, and the new ones didn&#8217;t work on older Windows \ud83d\ude09. Putting out the non-functional labs fire \ud83e\uddef for the beginning of the school year required restoring the systems from the only virtual copy. Unfortunately, student data vanished, or rather, was outdated, because it contained the state from the moment the virtual machine was created for the test. Nevertheless, it saved education \ud83d\ude09.\u201d<\/em><\/li>\n<\/ul>\n\n\n\n<p>As you can see, a proper backup\u2014both in its basic dimension (regular copies, copy testing) and the more sophisticated one (replication, the 3-2-1 rule)\u2014is a necessity if you want to avoid immense stress for yourself and a lot of problems for your organization.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"challenge-4-tell-me-bout-them-compooters-ya-got-steve\">Challenge 4: Tell Me 'Bout Them Compooters Ya Got, Steve<\/h2>\n\n\n<p>The work of IT specialists, our contestants, is often perceived as &#8222;Amazonian black magic&#8221; by many people. That\u2019s why, for the final trial (of tears), we asked them to explain to a layperson what they actually do. But to keep it from being too simple, the explanation could not contain the word &#8222;IT&#8221; or the name of the department or position.<\/p>\n\n\n\n<p>In this category, we appreciated the factual and comprehensive statement that exhausted the topic just in 3 sentences:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>\u201cI design and maintain a secure infrastructure for conducting remote training on educational platforms based on open-source software. I protect digital data transmission by configuring edge devices and data link layer devices. I conduct continuous security monitoring using Security Information and Event Management systems to detect and analyze incidents.\u201d<\/em><\/p>\n\n\n\n<p>Each IT specialist approached the topic in their own way. Some followed the principle of maximum brevity, while others, quite the opposite, let their linguistic imagination run wild:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>\u201cAt work, when answering the phone, I start the sentence with: '&#8230; but it works for me&#8217;.\u201d<\/em><\/li>\n\n\n\n<li><em>\u201c1. I turn curiosity into skill. I show that clicking can lead to discoveries, not just ads. I teach people to make friends with technology before it starts to fear them.<br>2. I help residents of small towns grab the Internet by the horns and make it work for them, not against them. Sometimes all it takes is a little courage, a keyboard&#8217;s click, and just a hint of magic trick. (&#8230;)\u201d<\/em><\/li>\n<\/ul>\n\n\n\n<p>Different people, different descriptions, different ways to explain what they do every day.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"a-month-so-fine-well-cherish-it-for-all-time\">A Month So Fine, We\u2019ll Cherish It for All Time<\/h2>\n\n\n<p>Seeing your engagement and reading genuinely insightful and often inspiring responses, we had a really great time. What\u2019s important, this was fun combined with learning through the experiences of real practitioners.<\/p>\n\n\n\n<p>Thank you all for your initiative, ingenuity, and contribution to the development of cyber awareness!<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"one-more-challenge-complete-the-survey-and-help-fight-cyber-threats\">One More Challenge? Complete the Survey and Help Fight Cyber Threats<\/h3>\n\n\n<p>Speaking of cyber awareness, we\u2019d like to remind you once again about our survey for the upcoming report, &#8222;Cybersecurity Trends and Challenges 2025\/2026.&#8221; The survey contains only closed questions, so it will not take longer than a few minutes, yet it can change so much.<\/p>\n\n\n\n<p>If you haven&#8217;t participated yet, we strongly encourage you to fill it out. Your knowledge and experience are the most valuable contribution you can give to build higher cyber awareness among all of us and improve the overall level of cybersecurity. To participate, simply click <a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLScTJlQgceFubr9knw6nF-Vxd8TCKSPqxSDRUq53ZLT_rEqLIQ\/viewform?fbzx=2769545691710662021\">this link<\/a> or scan the QR code below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"272\" height=\"267\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/qr_code_survey_for_cybersecurity_report_2025_2026.jpeg\" alt=\"QR code with a link to survey for the Cybersecurity Report 2025\/2026\" class=\"wp-image-7773\"\/><\/figure>\n<\/div>\n\n\n<p>We remind you that the survey is completely anonymous, and the answers will be used only in the form of collective analyses.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>They say hard times create strong men. And creative challenges? Resourceful IT admins! At the beginning of October, traditionally celebrated as Cybersecurity Awareness Month, we invited you to learn together through play. Four different challenges, codenamed Mission: Cybersafe, attracted a decent crowd of IT specialists eager to compete for creativity and ingenuity, while showing off their cybersec expertise. The results exceeded our expectations. Just see for yourselves!<\/p>\n","protected":false},"author":15,"featured_media":7749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[106],"tags":[],"class_list":["post-7753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pressroom","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Summary of the Cybersecurity Month activities with Xopero<\/title>\n<meta name=\"description\" content=\"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\/2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Summary of the Cybersecurity Month activities with Xopero\" \/>\n<meta property=\"og:description\" content=\"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\/2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-06T12:19:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T13:02:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"\u0141ukasz Dydek, Technical Content Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u0141ukasz Dydek, Technical Content Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/\"},\"author\":{\"name\":\"\u0141ukasz Dydek, Technical Content Writer\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/608de6d75eb1ac2a48799895263fc00d\"},\"headline\":\"A Creative and Inspiring Cybersec Month with Xopero Software\",\"datePublished\":\"2025-11-06T12:19:29+00:00\",\"dateModified\":\"2025-11-06T13:02:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/\"},\"wordCount\":1340,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-month-2025-summary.png\",\"articleSection\":[\"Pressroom\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/\",\"name\":\"Summary of the Cybersecurity Month activities with Xopero\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-month-2025-summary.png\",\"datePublished\":\"2025-11-06T12:19:29+00:00\",\"dateModified\":\"2025-11-06T13:02:26+00:00\",\"description\":\"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\\\/2026.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-month-2025-summary.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-month-2025-summary.png\",\"width\":1600,\"height\":900,\"caption\":\"A Creative and Inspiring Cybersec Month with Xopero Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/cybersecurity-month-2025-summary\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Creative and Inspiring Cybersec Month with Xopero Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/608de6d75eb1ac2a48799895263fc00d\",\"name\":\"\u0141ukasz Dydek, Technical Content Writer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"caption\":\"\u0141ukasz Dydek, Technical Content Writer\"},\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/lukasz-dydek\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Summary of the Cybersecurity Month activities with Xopero","description":"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\/2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/","og_locale":"pl_PL","og_type":"article","og_title":"Summary of the Cybersecurity Month activities with Xopero","og_description":"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\/2026.","og_url":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2025-11-06T12:19:29+00:00","article_modified_time":"2025-11-06T13:02:26+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png","type":"image\/png"}],"author":"\u0141ukasz Dydek, Technical Content Writer","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"\u0141ukasz Dydek, Technical Content Writer","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/"},"author":{"name":"\u0141ukasz Dydek, Technical Content Writer","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/608de6d75eb1ac2a48799895263fc00d"},"headline":"A Creative and Inspiring Cybersec Month with Xopero Software","datePublished":"2025-11-06T12:19:29+00:00","dateModified":"2025-11-06T13:02:26+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/"},"wordCount":1340,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png","articleSection":["Pressroom"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/","url":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/","name":"Summary of the Cybersecurity Month activities with Xopero","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png","datePublished":"2025-11-06T12:19:29+00:00","dateModified":"2025-11-06T13:02:26+00:00","description":"Read the summary of the Mission: Cybersafe contest by Xopero Software and fill in the survey for Cybersecurity Report 2025\/2026.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/11\/cybersecurity-month-2025-summary.png","width":1600,"height":900,"caption":"A Creative and Inspiring Cybersec Month with Xopero Software"},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/cybersecurity-month-2025-summary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"A Creative and Inspiring Cybersec Month with Xopero Software"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/608de6d75eb1ac2a48799895263fc00d","name":"\u0141ukasz Dydek, Technical Content Writer","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","caption":"\u0141ukasz Dydek, Technical Content Writer"},"url":"https:\/\/xopero.com\/blog\/author\/lukasz-dydek\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/7753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=7753"}],"version-history":[{"count":6,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/7753\/revisions"}],"predecessor-version":[{"id":7795,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/7753\/revisions\/7795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/7749"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=7753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=7753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=7753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}