{"id":551,"date":"2022-10-19T23:39:22","date_gmt":"2022-10-19T20:39:22","guid":{"rendered":"https:\/\/www.govcert.bg\/?page_id=551"},"modified":"2024-02-13T10:55:51","modified_gmt":"2024-02-13T08:55:51","slug":"faq","status":"publish","type":"page","link":"https:\/\/www.govcert.bg\/en\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"<p style=\"text-align: justify;\"><b>What is the difference between a cyber crime and a cyber incident?<\/b><br \/>\nA cyber incident is an event or series of unwanted or unexpected events related to cybersecurity that are likely to compromise operations and threaten information security. (According to Item 12 of the Additional Provisions of the Law on Cybersecurity)<\/p>\n<p style=\"text-align: justify;\">Cybercrime \u2013 a socially dangerous act \/action or omission\/ committed culpably and declared punishable by law, directed at or committed in cyberspace.<\/p>\n<p style=\"text-align: justify;\">Cybercrime - covers traditional crimes (e.g. fraud, forgery and identity theft), content-related crimes (e.g. online distribution of child pornography or incitement to racial hatred), and crimes that are only possible with computers and information systems (e.g. attacks against information systems, causing denial of service and malware).<\/p>\n<p>Cybercrimes are under the authority of the Cybercrime Department at the Ministry of Internal Affairs and Communications<\/p>\n<p>Contacts: Sofia, Alexander Malinov Blvd., No. 1,<br \/>\nentrance from the railway station \"Youth 2\"<br \/>\nreport@cybercrime.bg<br \/>\n\u0442\u0435\u043b. 0885 525 545<\/p>\n<p><b>What is phishing, how does it work and how to protect yourself?<\/b><\/p>\n<p style=\"text-align: justify;\">Phishing is one of the most common methods used by cybercriminals to defraud and steal sensitive information such as bank details, account passwords or credit card information.<br \/>\nThe scammer uses social engineering techniques to pose as a reliable and trusted source in an apparently official electronic communication.<\/p>\n<p style=\"text-align: justify;\">Email Phishing: Malicious content delivered via email.<br \/>\nSmishing: SMS\/MMS text messages to a mobile phone.<br \/>\nVishing: Fraudulent voice phone calls.<br \/>\nGeolocation phishing is a technique used to allow or deny access to the fake website to users from a specific country via an IP address or proxy server. Any unauthorized access from another part of the world will not be able to access the phishing page. The goal is to make these attacks more effective, making them more likely to reach users of the original site.<\/p>\n<p>CERT Bulgaria recommends that you observe the following rules in order not to be deceived:<br \/>\n1. Check the source of your incoming emails:<br \/>\n\u2713 Your bank will never ask you to send them your passwords, bank card details or personal details by post;<br \/>\n\u2713 Do not answer questions related to passwords and bank card details;<br \/>\n\u2713 If you have any doubts, call your bank directly for clarification;<br \/>\n\u2713 Never enter your bank's website via the link in the email, but type it manually in your browser.<br \/>\n2. Install an antivirus program and make sure you are using the latest versions of all programs and the operating system.<br \/>\n3. Enter your confidential details only on secure websites. Note that they start with https:\/\/ and that they appear with a small locked padlock icon.<br \/>\n4. Periodically review your bank accounts to be aware of any irregularities in your transactions.<br \/>\n5. Phishing is NOT just about online banking. Identity theft methods are used for: eBay, Facebook, Twitter, PayPal, etc.<br \/>\n6. Phishing knows no borders and attacks can reach you in all languages. They are usually poorly written or translated, so this can be another indicator that something is wrong.<\/p>\n<p style=\"text-align: justify;\"><b>10 tips for using the Internet safely<\/b><br \/>\n1. Keep your web browser up to date<br \/>\nTo surf the Internet, you will need a browser. Extensions, add-ons and plug-ins are small programs that add features to your browser. Disable or uninstall any programs you don't use. Make additional security and data protection settings to reduce confidential information that is stored and sent to third parties.<\/p>\n<p style=\"text-align: justify;\">\"Confidential\" information is anything that reveals details about you or your online behavior. Features like \"private mode\" or \"clear history\", for example, prevent users using the same device from seeing which websites you've visited. \"Block third-party cookies\" ensures that only websites you have actually visited can track your browsing behavior. Make sure your web browser is always kept up to date. Use an ad blocker to protect yourself from the spread of malware.<\/p>\n<p style=\"text-align: justify;\">2. \u041f\u043e\u0434\u0434\u044a\u0440\u0436\u0430\u0439\u0442\u0435 \u0432\u0430\u0448\u0430\u0442\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0438 \u0434\u0440\u0443\u0433 \u0441\u043e\u0444\u0442\u0443\u0435\u0440 \u0430\u043a\u0442\u0443\u0430\u043b\u0435\u043d<br \/>\n\u0418\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u0439\u0442\u0435 \u0430\u043a\u0442\u0443\u0430\u043b\u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f \u043d\u0430 \u0432\u0430\u0448\u0430\u0442\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438\u0442\u0435, \u0438\u043d\u0441\u0442\u0430\u043b\u0438\u0440\u0430\u043d\u0438 \u043d\u0430 \u043d\u0435\u044f. \u0410\u043a\u0442\u0438\u0432\u0438\u0440\u0430\u0439\u0442\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u0442\u0430 \u0437\u0430 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u043d\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u0430\u043d\u0435, \u043a\u043e\u0433\u0430\u0442\u043e \u0435 \u0432\u044a\u0437\u043c\u043e\u0436\u043d\u043e. \u041c\u043e\u0436\u0435\u0442\u0435 \u0434\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u0435 \u0434\u0430\u043b\u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043d\u0430 \u0432\u0430\u0448\u0438\u044f \u043a\u043e\u043c\u043f\u044e\u0442\u044a\u0440 \u0435 \u0430\u043a\u0442\u0443\u0430\u043b\u043d\u0430 \u0432 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438\u0442\u0435 \u043f\u043e\u0434 \u201eUpdate\u201c (\u0410\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u0430\u043d\u0435). \u0414\u0435\u0438\u043d\u0441\u0442\u0430\u043b\u0438\u0440\u0430\u0439\u0442\u0435 \u0432\u0441\u0438\u0447\u043a\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438, \u043a\u043e\u0438\u0442\u043e \u0432\u0435\u0447\u0435 \u043d\u0435 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u0442\u0435. \u041a\u043e\u043b\u043a\u043e\u0442\u043e \u043f\u043e-\u043c\u0430\u043b\u043a\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0441\u0442\u0435 \u0438\u043d\u0441\u0442\u0430\u043b\u0438\u0440\u0430\u043b\u0438, \u0442\u043e\u043b\u043a\u043e\u0432\u0430 \u043f\u043e-\u043c\u0430\u043b\u043a\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u043d\u0438 \u0442\u043e\u0447\u043a\u0438 \u043d\u0430 \u0430\u0442\u0430\u043a\u0430 \u0437\u0430 \u0432\u0430\u0448\u0430\u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043a\u0430\u0442\u043e \u0446\u044f\u043b\u043e.<\/p>\n<p style=\"text-align: justify;\">3. Use antivirus and firewall applications<br \/>\nThe operating systems used have virus protection and a built-in firewall, which makes it difficult for criminals to carry out attacks from the Internet even in the default configuration. Enable these features or use a third-party anti-virus program.<br \/>\nDon't let an activated antivirus or firewall lull you into a false sense of security.<\/p>\n<p style=\"text-align: justify;\">4. Create different user accounts<br \/>\nWhen malware enters a computer, it gets the same rights on the computer as the user account it logged in with. As an administrator, you have full access to your computer. Use the account with administrative rights only if absolutely necessary. Set up different password-protected user accounts through Settings, System Preferences, or Control Panel.<br \/>\nAlways surf the web with a restricted user account, not an administrator role.<\/p>\n<p style=\"text-align: justify;\">5. Protect your accounts with strong passwords<br \/>\nUse a unique password for every account you have.<br \/>\nA strong password must meet the following criteria:<br \/>\n\u2713 You should be able to easily remember a password.<br \/>\n\u2713 The longer the password, the better.<br \/>\n\u2713 Password must be at least eight characters long.<br \/>\n\u2713 You can usually use all available characters in a password, i.e. upper and lower case letters, numbers and special characters.<br \/>\n\u2713 The full password should not be a word that is easy to guess or personal data.<br \/>\n\u2713 Common sequences of numbers or keyboard patterns are also not suitable as a secure password. It is not recommended to add single numbers or special characters at the beginning or end of a normal word.<br \/>\n\u2713 It is important to never share your passwords.<\/p>\n<p style=\"text-align: justify;\">6. Be careful with emails and their attachments<br \/>\nVerify the authenticity of any email before opening an attachment or link in it.<br \/>\nDo not open links from emails in your spam folders.<br \/>\nYou can identify unwanted or dangerous emails by looking out for a few things:<br \/>\n\u2022 Hover over the sender's email address to see if the sender is fake, for example.<br \/>\n\u2022 Watch out for nonsensical sequences of letters, letters that are replaced by others that look similar or foreign domain ie. the last part of the email address.<br \/>\n\u2022 Also check the subject and body of the email for spelling errors and to see if it makes logical sense. Fraudsters often make mistakes with this. You should also be skeptical if the email requires you to respond quickly.<\/p>\n<p style=\"text-align: justify;\">7. Be careful when downloading programs<br \/>\nBe careful when downloading programs from the Internet. Make sure your source is reliable before downloading programs. Download the program from the manufacturer's website and use only encrypted sites that you can recognize by the abbreviation \"https\" in the address bar of the browser.<\/p>\n<p style=\"text-align: justify;\">8. Be careful when providing your personal information<br \/>\nCriminals can use data they have previously collected without permission, such as your browsing habits or names of people you know, to build trust. Consider which online services you really want to entrust your personal data to over open, unsecured networks.<\/p>\n<p style=\"text-align: justify;\">9. Protect your data with encryption<br \/>\nOnly visit and enter your personal data on websites that provide an encrypted connection. If the site uses the https secure communication protocol, you can see this in its web address. The address will always start with \"https\" and your web browser's address bar will usually contain a small locked padlock symbol or similar.<br \/>\nIf you use a wireless LAN (WLAN) to surf the Internet, pay particular attention to wireless network encryption. Select the WPA3 encryption standard in your router, if not yet supported, select WPA2 for now. Choose a complex password of at least 20 characters. You can access your router through a specific web address given in your router's manual.<\/p>\n<p style=\"text-align: justify;\">10. Make backups at certain intervals<br \/>\nIf one of your devices gets infected despite all these protective measures, important data can be lost. To minimize the resulting damage, it is important to back up your files to external hard drives or USB drives at regular intervals. These storage media should only be connected to your computer when needed. You can use cloud services to back up encrypted data. Only restore your data from backup.<\/p>\n<p><b>In a ransomware (cryptovirus) attack<\/b><\/p>\n<p style=\"text-align: justify;\">A ransomware attack (cryptovirus) is a process that encrypts some\/or all of the files on the infected machine and displays a ransom demand message to decrypt them.<br \/>\nYou can recognize a ransomware attack by one or more of the following symptoms:<\/p>\n<p>\u2022 Replacing the wallpaper with an image of a ransom demand;<br \/>\n\u2022 The appearance of text files with a ransom demand;<br \/>\n\u2022 The appearance of multiple files with the same extension that you do not recognize (eg .ecc, .ezz, .exx, .zzz, .xyz, .aaa, .abc, .ccc, .vvv, .xxx, .ttt, .micro, .encrypted, .locked, .crypto, _crypt, .crinf, .r5a, .XRNT, .XTBL, .crypt, .R16M01D05, .pzdc, .good, .LOL!, .OMG!, .RDM, .RRK, . encryptedRSA, .crjoker, .EnCiPhErEd, extensions of 6-7 random characters, etc.);<br \/>\n\u2022 Stoppage of information systems and services due to inaccessible files.<\/p>\n<p style=\"text-align: justify;\">In the case of Ransomware, it is recommended that the following steps be taken:<br \/>\n\u2713 View backups (archives)<br \/>\nTake a full review of your backed up files and track the backup process to make sure you're protecting all your important files. Make sure the recovery process is properly documented.<br \/>\n\u2713 Analyze the risk<br \/>\nInvesting in a risk analysis and security audit is an effective way to find out if your systems are as secure as you think.<br \/>\n\u2713 Train employees<br \/>\nTraining employees to prevent ransomware is an important step in protecting your data. Make sure everyone knows what NOT to do, such as following suspicious links and opening email attachments from unknown sources.<br \/>\nCreate a rapid response plan so everyone knows what to do if their computer or device becomes infected with malware, including disconnecting the network, isolating infected devices, changing passwords, and notifying the administrator.<br \/>\n\u2713 Be proactive<br \/>\nTake the following steps to protect yourself from ransomware:<br \/>\n\u2013 Enforce a whitelist of applications and ensure that only approved applications can run on the organization's network;<br \/>\n\u2013 Follow security experts to stay up-to-date on the latest cybersecurity trends.<br \/>\n\u2713 Create an incident response and data recovery plan<br \/>\nHaving an incident response plan in place will protect your organization's data, revenue and reputation in the event of a successful ransomware attack.<br \/>\nWhen creating a disaster recovery plan, the critical components are:<br \/>\n\u2013 Well-trained incident response team;<br \/>\n\u2013 Business Continuity Strategy;<br \/>\n\u2013 Cyber insurance;<br \/>\n\u2013 Inventory of hardware and software;<br \/>\n\u2013 Clear instructions for restoring from backups;<br \/>\n\u2013 Alternative means of communication.<\/p>\n<p style=\"text-align: justify;\"><b>Security for mobile devices<\/b><br \/>\n\u2713 Update:<br \/>\n\u2022 The Platform \u2013 Enable automatic operating system updates to improve privacy\/security and fix flaws.<br \/>\n\u2022 Apps \u2013 Turn on automatic app updates to make sure you're using the most up-to-date security technologies.<br \/>\n\u2713 Use strong authentication<br \/>\n\u2022 Turn on device authentication. Set strong login passwords\/PINs and use biometric authentication.<br \/>\n\u2022 Use two-factor authentication for apps and websites that support it.<br \/>\n\u2713 Tracking:<br \/>\nInstall or activate software that allows you to remotely track your mobile device over the Internet. That way, you can connect to it over the internet and see where it is if you lose it or it's stolen, or in the worst case, delete the stored information.<br \/>\n\u2713 Maintain a good level of application security:<br \/>\nUse selected app stores:<br \/>\n\u2013 for Apple iOS devices such as iPad or iPhone, this means the Apple App Store.<br \/>\n\u2013 for Android devices, use Google Play;<br \/>\n\u2013 for Amazon tablets, use the Amazon App Store.<br \/>\nDisable third-party app stores that can be malware distribution vectors.<br \/>\nDelete unnecessary apps. Periodically review and delete unused or unnecessary apps.<br \/>\n\u2713 Privacy options:<br \/>\nMinimize personally identifiable information (PII) in all applications. Limit the personal information stored in apps.<br \/>\nProvide least-privilege access to all applications and minimize access to personal information.<br \/>\nReview location settings - allow access to your location only when the app is in use.<br \/>\n\u2713 Protect network communications<br \/>\nDisable unnecessary network connections (BT, NFC, Wi-Fi, GPS). Every connection is a potential point of attack.<br \/>\nAvoid public Wi-Fi networks. Cybercriminals can use public Wi-Fi networks, which are often unsecured, for attacks<br \/>\n\u2713 Protect the device<br \/>\nInstall security software that protects against malware.<br \/>\nUse only reliable chargers and cables. A charger or computer can run malware on smartphones to bypass protections, gain access and take control of them. A phone infected with malware also poses a threat to external systems (eg PCs).<br \/>\nEnable the lost device feature. Configure the settings to automatically erase the device data after a certain time, after a certain number of incorrect login attempts, and enable the option to remotely wipe the device.<\/p>\n<p style=\"text-align: justify;\"><b>Have I been hacked?<\/b><br \/>\nNo matter how much security you have, sooner or later incidents happen and you find yourself hacked.<br \/>\nHere are some signs that you may have been hacked and what to do if you are.<\/p>\n<p style=\"text-align: left;\">Online accounts<br \/>\n\u27a2 Friends or relatives tell you that they are receiving unusual messages or invitations from you that you are sure you did not send.<br \/>\n\u27a2 Your account password is not working, even though you are sure it is the correct password.<br \/>\n\u27a2 You receive warnings from websites that someone has opened your account at a time that you know could not have been you. Do not use the links in such messages to verify your account; instead, open the website by typing its address yourself into your web browser or use a pre-saved bookmark as well as a mobile app.<\/p>\n<p style=\"text-align: justify;\">Computer or mobile device<br \/>\nYour antivirus program displays a message that your system is infected. Make sure the message is coming from your antivirus and not a random pop-up from a website trying to trick you into calling somewhere or installing something. Not sure? Open and check the antivirus program to confirm if the computer is really infected.<br \/>\nYou see a pop-up message saying your computer is encrypted and you need to pay a ransom to get your files back.<br \/>\nYour apps stop unexpectedly or load very slowly.<br \/>\nWhile using websites, you are often redirected to pages that you did not request, or new pages are opened.<\/p>\n<p style=\"text-align: justify;\">Finance<br \/>\nSuspicious or unknown credit or debit card payments that you know were not made by you.<br \/>\nNow what? \u2013 How to take back control<br \/>\nIf you suspect you've been hacked, don't worry - you can deal with this problem. If the hacking is related to your work, do not try to fix the problem yourself, but report it to your employer immediately. If the problem is with your personal system or account, here are some steps that:<br \/>\nRestore access to online accounts: If you still have access to the account, log in from a computer that you know is not infected and change the account password. As soon as you log in to the account, change the password to a new and unique one. All your accounts must have a different password. If it is not possible to remember so many passwords, we recommend that you use a password manager. If possible, turn on multi-factor authentication (MFA) for your accounts, which will help make sure criminals can't get back in. If you cannot access your account, contact the website and inform them that your account has been hacked.<br \/>\nRestoring a personal computer or device: If your antivirus program can't handle the infected computer, or you want to be more sure that your system is reliable, consider reinstalling the operating system. Backups should be<br \/>\nare only used to restore personal files, but not to reinstall the operating system. If you're not sure you can handle the reinstall, consider using a professional service.<br \/>\nFinancial Account Recovery: For problems with a credit card or other financial account, call your bank or card issuer immediately. Call them at a phone number you can trust, such as the one written on the bank card itself or on your statement, or visit their website. Review your account statements and transactions frequently.<br \/>\nIf you have suffered a significant financial loss or feel threatened, report the incident to the police or to the Directorate-General for Combating Organized Crime - Cybercrime Sector at:<br \/>\nhttps:\/\/www.gdbop.bg\/bg\/contacts<br \/>\ngdbop@mvr.bg<\/p>\n<p style=\"text-align: justify;\"><b>Privacy - Protecting your digital footprint<\/b><br \/>\nWhat is privacy?<br \/>\nThere are many different definitions of \"privacy\". We will focus on personal privacy, dealing with information about you that is collected by others. In today's digital world, you'd be amazed at all the different organizations that not only collect information about you, but also legally share or sell it.. And if that information falls into the wrong hands, it can be used by cybercriminals against you.<br \/>\nThe purpose of personal privacy is to manage your digital footprint, for example \u2013 making an effort to protect and limit what information about you is collected. Keep in mind that in today's digital world, it is almost impossible to completely remove your digital footprint or stop any organization from collecting information about you, you can only reduce it.<br \/>\nSteps to help protect your privacy:<br \/>\n\u2713 Limit what you post and share with others online, such as on forums and social media. This includes photos you share. Even in non-public forums or places with strict confidentiality, consider that someday anything you post may become public.<br \/>\n\u2713 When registering new online accounts, review what information is collected about you by the relevant website by reading the privacy policy, and only provide what is truly necessary. If you have concerns about the information collected, do not use this website.<br \/>\n\u2713 Keep in mind that no matter what the privacy settings are, information about you is collected, especially with free services like Facebook or WhatsApp. These services base their business model on collecting data about what you do and who you interact with. If you are really concerned about your privacy, don't use such free sites.<br \/>\n\u2713 Preview mobile apps before downloading and installing them. Are they coming from a trusted source? Have they been around for a long time? Do they have a lot of positive comments? Check the access requirements. Does this app really need to know where you are or access your contacts? If you are not convinced that this is the right choice, look for another application.<br \/>\nSearch for apps that support it privacy and offer privacy options. Even if you have to pay for an app that respects your privacy, it's probably worth it.<br \/>\n\u2713 Consider using a virtual private network (VPN) for your internet connection, especially if you use a public network such as free WiFi.<br \/>\n\u2713 When using a browser, set it to private or incognito mode to limit what information is shared, what cookies are used and stored, and to protect your browsing history.<br \/>\n\u2713 Consider using anonymous search engines designed for privacy.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u041a\u0430\u043a\u0432\u0430 \u0435 \u0440\u0430\u0437\u043b\u0438\u043a\u0430\u0442\u0430 \u043c\u0435\u0436\u0434\u0443 \u043a\u0438\u0431\u0435\u0440 \u043f\u0440\u0435\u0441\u0442\u044a\u043f\u043b\u0435\u043d\u0438\u0435 \u0438 \u043a\u0438\u0431\u0435\u0440 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442? \u041a\u0438\u0431\u0435\u0440\u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0435 \u0441\u044a\u0431\u0438\u0442\u0438\u0435 \u0438\u043b\u0438 \u043f\u043e\u0440\u0435\u0434\u0438\u0446\u0430 \u043e\u0442 \u043d\u0435\u0436\u0435\u043b\u0430\u043d\u0438 \u0438\u043b\u0438 \u043d\u0435\u043e\u0447\u0430\u043a\u0432\u0430\u043d\u0438 \u0441\u044a\u0431\u0438\u0442\u0438\u044f, \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u0441 \u043a\u0438\u0431\u0435\u0440\u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430, \u043a\u043e\u0438\u0442\u043e \u0441 \u0433\u043e\u043b\u044f\u043c\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442 \u043c\u043e\u0433\u0430\u0442 \u0434\u0430 \u043f\u0440\u0435\u0434\u0438\u0437\u0432\u0438\u043a\u0430\u0442 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0434\u0435\u0439\u043d\u043e\u0441\u0442\u0438\u0442\u0435 \u0438 \u0437\u0430\u043f\u043b\u0430\u0448\u0432\u0430\u0442 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f\u0442\u0430. (\u0421\u044a\u0433\u043b\u0430\u0441\u043d\u043e \u0442. 12 \u043e\u0442 \u0414\u043e\u043f\u044a\u043b\u043d\u0438\u0442\u0435\u043b\u043d\u0438\u0442\u0435 \u0440\u0430\u0437\u043f\u043e\u0440\u0435\u0434\u0431\u0438 \u043e\u0442 \u0417\u0430\u043a\u043e\u043d\u0430 \u0437\u0430 \u043a\u0438\u0431\u0435\u0440\u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442) \u041a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u044a\u043f\u043b\u0435\u043d\u0438\u0435 \u2013 \u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043e \u043e\u043f\u0430\u0441\u043d\u043e \u0434\u0435\u044f\u043d\u0438\u0435 \/\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0438\u043b\u0438 \u0431\u0435\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435\/, &#8230; <a title=\"FAQ\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/faq\/\" aria-label=\"More on \u0427\u0435\u0441\u0442\u043e \u0437\u0430\u0434\u0430\u0432\u0430\u043d\u0438 \u0432\u044a\u043f\u0440\u043e\u0441\u0438\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-551","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=551"}],"version-history":[{"count":42,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/551\/revisions"}],"predecessor-version":[{"id":4493,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/551\/revisions\/4493"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}