{"id":5206,"date":"2020-08-17T01:01:59","date_gmt":"2020-08-16T20:31:59","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=5206"},"modified":"2020-08-22T10:41:54","modified_gmt":"2020-08-22T06:11:54","slug":"how-to-protect-against-fraudulent-email-senders-by-using-cisco-advanced-phishing-protection","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/how-to-protect-against-fraudulent-email-senders-by-using-cisco-advanced-phishing-protection\/","title":{"rendered":"\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u0632\u0627\u06cc\u0627 \u0648 \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc Cisco Advanced Phishing Protection"},"content":{"rendered":"\n
\u0628\u0646\u0627 \u0628\u0647 \u06af\u0641\u062a\u0647\u200c\u06cc FBI\u060c \u0646\u0642\u0636 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u06cc\u0645\u06cc\u0644\u200c\u0647\u0627\u06cc \u06a9\u0633\u0628\u200c\u0648\u200c\u06a9\u0627\u0631 \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 BEC \u062f\u0631 \u06cc\u06a9 \u062f\u0648\u0631\u0647\u200c\u06cc \u0633\u0647\u200c \u0633\u0627\u0644\u0647 5.3 \u0645\u06cc\u0644\u06cc\u0627\u0631\u062f \u062f\u0644\u0627\u0631 \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u062f\u0631 \u0633\u0631\u0627\u0633\u0631 \u062c\u0647\u0627\u0646\u060c \u0636\u0631\u0631 \u0628\u0647 \u0647\u0645\u0631\u0627\u0647 \u062f\u0627\u0634\u062a\u0647 \u0627\u0633\u062a. \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc Cisco Advanced Phishing Protection<\/a> \u0633\u06cc\u0633\u062a\u0645 \u0642\u062f\u0631\u062a\u0645\u0646\u062f\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0631\u0633\u0627\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u06cc \u0627\u06cc\u0645\u06cc\u0644 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f \u06a9\u0647 \u0627\u0632 BEC \u0648 \u062f\u06cc\u06af\u0631 \u062d\u0645\u0644\u0647\u200c\u0647\u0627\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0641\u0631\u06cc\u0628\u060c \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0645\u06cc\u200c\u0646\u0645\u0627\u06cc\u062f. \u0627\u06cc\u0646 \u0631\u0627\u0647\u06a9\u0627\u0631 \u062a\u06a9\u0645\u06cc\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u06cc \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u062f\u0631 Cisco Email Security<\/a> \u0645\u06cc\u200c\u0628\u0627\u0634\u062f.<\/p>\n","protected":false},"excerpt":{"rendered":" \u0628\u0646\u0627 \u0628\u0647 \u06af\u0641\u062a\u0647\u200c\u06cc FBI\u060c \u0646\u0642\u0636 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u06cc\u0645\u06cc\u0644\u200c\u0647\u0627\u06cc \u06a9\u0633\u0628\u200c\u0648\u200c\u06a9\u0627\u0631 \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 BEC \u062f\u0631 \u06cc\u06a9 \u062f\u0648\u0631\u0647\u200c\u06cc \u0633\u0647\u200c \u0633\u0627\u0644\u0647 5.3 \u0645\u06cc\u0644\u06cc\u0627\u0631\u062f \u062f\u0644\u0627\u0631 \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u062f\u0631 \u0633\u0631\u0627\u0633\u0631 \u062c\u0647\u0627\u0646\u060c \u0636\u0631\u0631 \u0628\u0647 \u0647\u0645\u0631\u0627\u0647 \u062f\u0627\u0634\u062a\u0647 \u0627\u0633\u062a. \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc Cisco Advanced Phishing Protection \u0633\u06cc\u0633\u062a\u0645 \u0642\u062f\u0631\u062a\u0645\u0646\u062f\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0631\u0633\u0627\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u06cc \u0627\u06cc\u0645\u06cc\u0644 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f \u06a9\u0647 \u0627\u0632 BEC \u0648 \u062f\u06cc\u06af\u0631 \u062d\u0645\u0644\u0647\u200c\u0647\u0627\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0641\u0631\u06cc\u0628\u060c \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc […]<\/p>\n","protected":false},"author":1002946,"featured_media":5211,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[1629,174,1031,1036,1034],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-5206","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"tag-advanced-phishing-protection","9":"tag-cisco-email-security","10":"tag-cisco-email-security-","11":"tag--phishing","12":"tag--cisco-email-security","13":"post_format-post-format-video"},"yoast_head":"\n