{"id":254002,"date":"2025-11-06T16:33:47","date_gmt":"2025-11-06T15:33:47","guid":{"rendered":"https:\/\/cyberforces.com\/?p=254002"},"modified":"2025-11-06T16:33:47","modified_gmt":"2025-11-06T15:33:47","slug":"how-to-use-ai","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/how-to-use-ai","title":{"rendered":"How to Protect Data and Work Responsibly with AI"},"content":{"rendered":"<p><strong>Artificial intelligence (AI)<\/strong> has become an integral part of daily work \u2013 supporting data analysis, automating processes, and improving communication. Tools such as ChatGPT, Copilot, and Gemini are increasingly used not only by IT professionals, but also by HR, finance, and marketing teams. However, as adoption grows, so do the risks: data leaks, inaccurate outputs, and GDPR violations.<\/p>\n<p>Safe use of AI requires awareness, proper procedures, and ongoing oversight. In this article, we explain how to protect both corporate and personal data, and how to introduce responsible AI usage practices within your organization.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>In this article, you will learn:<\/strong><\/p>\n<ul>\n<li>The most common risks associated with using AI tools.<\/li>\n<li>How to protect corporate and personal data when working with AI.<\/li>\n<li>How to implement an internal safe-use AI policy.<\/li>\n<li>Best practices for employees, technical teams, and leadership.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Table of Contents<\/h2>\n<ol>\n<li>What Does Safe AI Use Mean?<\/li>\n<li>Risks and Threats Linked to AI<\/li>\n<li>Personal Data Protection and AI<\/li>\n<li>Best Practices for Safe Use of AI Tools<\/li>\n<li>Ethical and Responsible AI Use in Organizations<\/li>\n<li>FAQ<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>What Does Safe AI Use Mean?<\/h2>\n<p>Safe AI usage means consciously and responsibly working with artificial intelligence tools such as ChatGPT, Copilot, Gemini, or Claude in a way that protects data, privacy, and the organization\u2019s reputation.<\/p>\n<p>AI can significantly improve productivity, but without clear rules, it can lead to data leaks, incorrect decisions, or legal and regulatory violations.<\/p>\n<p>AI security is not only a technical matter \u2013 it also depends on user awareness and consistent organizational procedures.<\/p>\n<p>&nbsp;<\/p>\n<h2>Risks and Threats Linked to AI<\/h2>\n<p>&nbsp;<\/p>\n<h3>Risk of Corporate Data Leakage<\/h3>\n<p>The most common mistake users make is inputting confidential information into public AI models. Data related to clients, projects, contracts, or internal documents may be stored and potentially reused in future model training.<\/p>\n<p>Examples:<\/p>\n<ul>\n<li>HR employee analyzes candidate CVs in ChatGPT.<\/li>\n<li>Sales team generates proposals including confidential contract details.<\/li>\n<li>Developer tests code containing API keys in Copilot.<\/li>\n<\/ul>\n<h3>Shadow AI \u2013 Unapproved Use of AI by Employees<\/h3>\n<p>Another frequent issue is employees using AI tools without organizational awareness or approval. This \u201cshadow AI\u201d leads to loss of control over data and security compliance.<\/p>\n<p><strong>Solution:<\/strong> Implement a company-wide AI policy and clear guidelines on permitted tools.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><\/h3>\n<h3>Manipulated Outputs and Incorrect Information<\/h3>\n<p>AI models can generate inaccurate or fabricated information (\u201cAI hallucinations\u201d). Without verification, such data may mislead employees or clients.<\/p>\n<p><strong>A notable case:<\/strong> Deloitte prepared a report for the Australian government using AI, which introduced fabricated statistics and citations. The $440,000 report had to be withdrawn. This incident shows how even major organizations must verify AI output carefully.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Personal Data Protection and AI<\/h2>\n<p>&nbsp;<\/p>\n<h3>GDPR Compliance<\/h3>\n<p>Under GDPR, personal data may only be processed for specified, lawful purposes. Entering personal data into AI tools without legal grounds may result in compliance violations and financial penalties.<\/p>\n<p>The role of Data Protection Officers and compliance teams is crucial: they should establish AI usage policies and monitor adherence.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><\/h3>\n<h3>Privacy Policies and AI Tool Regulations<\/h3>\n<p>Each AI tool has its own data processing policy. Employees must understand:<\/p>\n<ul>\n<li>what data is stored,<\/li>\n<li>for how long,<\/li>\n<li>and who may access or analyze it.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Best Practices for Safe Use of AI Tools<\/h2>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>For Employees (Office or Remote)<\/h3>\n<ul>\n<li>Do not enter personal, financial, or confidential business data into public AI tools.<\/li>\n<li>Use only AI tools approved by IT or compliance.<\/li>\n<li>Avoid logging into AI platforms from personal devices or unsecured networks.<\/li>\n<li>Always verify AI-generated texts before sharing or publishing.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>For IT and Technical Teams<\/h3>\n<ul>\n<li>Implement on-premise or private AI solutions for confidential data use cases.<\/li>\n<li>Monitor network traffic for unauthorized AI tool usage.<\/li>\n<li>Conduct regular security audits and penetration tests.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>For Management and C-Level<\/h3>\n<ul>\n<li>Establish an AI Governance Policy defining how AI tools are used in the organization.<\/li>\n<li>Include AI usage training in onboarding programs.<\/li>\n<li>Assign clear responsibilities: who oversees AI use and who reports incidents.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Ethical and Responsible AI Use in Organizations<\/h2>\n<p>Security also includes an ethical approach to AI use.<\/p>\n<p><strong>Key principles:<\/strong><\/p>\n<ul>\n<li><strong>Transparency<\/strong> \u2013 inform users when content is AI-generated.<\/li>\n<li><strong>Fairness and anti-bias<\/strong> \u2013 especially in HR and recruitment.<\/li>\n<li><strong>Copyright respect<\/strong> \u2013 avoid publishing AI-generated content without verification.<\/li>\n<\/ul>\n<p><strong>Examples of ethical risks:<\/strong><\/p>\n<ul>\n<li>A recruitment AI tool discriminated by gender due to biased training data.<\/li>\n<li>AI-generated marketing content unintentionally copied copyrighted materials.<\/li>\n<li>Many companies are now developing ethical AI codes as part of their security frameworks.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>FAQ \u2013 Frequently Asked Questions<\/h2>\n<p>&nbsp;<\/p>\n<h3>Can I input client data into ChatGPT or Copilot?<\/h3>\n<p>No, unless the data is fully anonymized. Public AI models may store and reuse inputs.<\/p>\n<h3>Is AI use compliant with GDPR?<\/h3>\n<p>Yes, if data processing has legal grounds and appropriate safeguards are in place.<\/p>\n<h3>What are the most common user mistakes?<\/h3>\n<p>Entering confidential data into public models and failing to verify AI-generated outputs.<\/p>\n<h3>How can unauthorized AI use be detected?<\/h3>\n<p>Through application monitoring, network oversight, and AI Governance policies.<\/p>\n<h3>Can AI-related risk be completely eliminated?<\/h3>\n<p>No, but it can be significantly minimized with training, awareness, and security controls.<\/p>\n<p>&nbsp;<\/p>\n<h3>Summary<\/h3>\n<p>Safe use of AI tools requires awareness, policies, and monitoring. Security is a continuous process, not a one-time setup. By following a few core principles \u2013 avoiding sharing confidential data, using only approved tools, and verifying outputs \u2013 organizations can effectively minimize risks.<\/p>\n<p>AI itself is not the threat.<br \/>\nThe real threat is <strong>not knowing how to use it safely<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) has become an integral part of daily work \u2013 supporting data analysis, automating processes, and improving communication. Tools such as ChatGPT, Copilot, and Gemini are increasingly used not only by IT professionals, but also by HR, finance, and marketing teams. However, as adoption grows, so do the risks: data leaks, inaccurate outputs, [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":254003,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[3,29],"tags":[],"class_list":["post-254002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Protect Data and Work Responsibly with AI - CyberForces<\/title>\n<meta name=\"description\" content=\"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/how-to-use-ai\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Data and Work Responsibly with AI - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/how-to-use-ai\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-06T15:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Diana Ma\u0142yszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Ma\u0142yszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai\"},\"author\":{\"name\":\"Diana Ma\u0142yszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\"},\"headline\":\"How to Protect Data and Work Responsibly with AI\",\"datePublished\":\"2025-11-06T15:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai\"},\"wordCount\":892,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr\",\"articleSection\":{\"1\":\"Security\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai\",\"url\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai\",\"name\":\"How to Protect Data and Work Responsibly with AI - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr\",\"datePublished\":\"2025-11-06T15:33:47+00:00\",\"description\":\"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/how-to-use-ai\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr\",\"width\":1200,\"height\":628,\"caption\":\"safe AI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/how-to-use-ai#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Data and Work Responsibly with AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\",\"name\":\"Diana Ma\u0142yszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"caption\":\"Diana Ma\u0142yszko\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/diana-malyszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Data and Work Responsibly with AI - CyberForces","description":"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/how-to-use-ai","og_locale":"en_US","og_type":"article","og_title":"How to Protect Data and Work Responsibly with AI - CyberForces","og_description":"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.","og_url":"https:\/\/cyberforces.com\/en\/how-to-use-ai","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2025-11-06T15:33:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr","type":"image\/png"}],"author":"Diana Ma\u0142yszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Ma\u0142yszko","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai"},"author":{"name":"Diana Ma\u0142yszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb"},"headline":"How to Protect Data and Work Responsibly with AI","datePublished":"2025-11-06T15:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai"},"wordCount":892,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr","articleSection":{"1":"Security"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai","url":"https:\/\/cyberforces.com\/en\/how-to-use-ai","name":"How to Protect Data and Work Responsibly with AI - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr","datePublished":"2025-11-06T15:33:47+00:00","description":"Discover how to use AI safely and responsibly in your organization. Learn about risks like data leaks, decision errors and explore best practices for protecting corporate and personal data while using AI tools like ChatGPT, Copilot, and Gemini.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/how-to-use-ai"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-SM-How-to-use-AI-safely_1200x628.png?wsr","width":1200,"height":628,"caption":"safe AI"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/how-to-use-ai#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"How to Protect Data and Work Responsibly with AI"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb","name":"Diana Ma\u0142yszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","caption":"Diana Ma\u0142yszko"},"url":"https:\/\/cyberforces.com\/en\/author\/diana-malyszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/254002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=254002"}],"version-history":[{"count":3,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/254002\/revisions"}],"predecessor-version":[{"id":254008,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/254002\/revisions\/254008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/254003"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=254002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=254002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=254002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}