{"id":12346,"date":"2023-01-18T11:08:14","date_gmt":"2023-01-18T09:08:14","guid":{"rendered":"https:\/\/www.es2000.it\/sicurezza-cyber-security"},"modified":"2023-10-31T15:33:35","modified_gmt":"2023-10-31T13:33:35","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.es2000.it\/en\/cybersecurity","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12346\" class=\"elementor elementor-12346 elementor-9225\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e0cfda6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e0cfda6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_bottom&quot;:&quot;lqd-custom-shape-15&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg class=\"lqd-custom-shape\"  fill=\"none\" height=\"461\" viewBox=\"0 0 1440 461\" width=\"1440\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" preserveAspectRatio=\"none\">\n  <path class=\"elementor-shape-fill\" d=\"m0 131.906 34.4-20.017c34.4-19.9 103.2-59.936 171.68-82.979 68.64-23.043 136.8-29.328003 205.44-4.306 68.48 25.022 137.28 81.35 205.76 80.768 68.64-.582 136.8-58.074 205.44-84.608 68.48-26.535 137.28-22.345 205.76-16.06 68.64 6.168 136.8 14.315 205.44 22.811 68.48 8.612 137.28 17.457 171.68 22l34.4 4.422v396.851h-1440z\" fill-opacity=\".09\">\n    <animate repeatCount=\"indefinite\" fill=\"freeze\" attributeName=\"d\" dur=\"10s\" values=\"M0 131.906L34.4 111.889C68.8 91.989 137.6 51.953 206.08 28.91C274.72 5.867 342.88 -0.418001 411.52 24.604C480 49.626 548.8 105.954 617.28 105.372C685.92 104.79 754.08 47.298 822.72 20.764C891.2 -5.771 960 -1.581 1028.48 4.704C1097.12 10.872 1165.28 19.019 1233.92 27.515C1302.4 36.127 1371.2 44.972 1405.6 49.515L1440 53.937V450.788H0L0 131.906Z; M0 122.906L36.5 109C71.5 96.372 102.52 67.98 171 44.937C239.64 21.894 354.36 51.478 423 76.5C491.48 101.522 546.52 19.097 615 18.515C683.64 17.933 799.36 58.534 868 32C936.48 5.46499 1039.52 54.715 1108 61C1176.64 67.168 1190.36 -6.996 1259 1.5C1327.48 10.112 1371.2 35.972 1405.6 40.515L1440 44.937V441.788H0L0 122.906Z; M0 131.906L34.4 111.889C68.8 91.989 137.6 51.953 206.08 28.91C274.72 5.867 342.88 -0.418001 411.52 24.604C480 49.626 548.8 105.954 617.28 105.372C685.92 104.79 754.08 47.298 822.72 20.764C891.2 -5.771 960 -1.581 1028.48 4.704C1097.12 10.872 1165.28 19.019 1233.92 27.515C1302.4 36.127 1371.2 44.972 1405.6 49.515L1440 53.937V450.788H0L0 131.906Z\">\n    <\/animate>\n  <\/path>\n  <path class=\"elementor-shape-fill\" d=\"M0 154.75L34.4 142.201C68.8 129.53 137.6 104.433 206.08 99.072C274.72 93.833 342.88 108.453 411.52 122.099C480 135.622 548.8 148.293 617.28 142.811C685.92 137.329 754.08 113.693 822.72 113.693C891.2 113.693 960 137.329 1028.48 152.68C1097.12 168.153 1165.28 175.463 1233.92 184.966C1302.4 194.591 1371.2 206.287 1405.6 212.257L1440 218.105V452.025H0L0 154.75Z\" fill-opacity=\".28\">\n    <animate repeatCount=\"indefinite\" fill=\"freeze\" attributeName=\"d\" dur=\"8s\" values=\"M0 154.75C0 154.75 12.8 142.902 34.4 142.201C56 141.5 140.02 160.111 208.5 154.75C277.14 149.511 334.36 112.57 403 126.216C471.48 139.739 552.52 190.448 621 184.966C689.64 179.484 745.36 116 814 116C882.48 116 950.52 161.149 1019 176.5C1087.64 191.973 1154.36 123.997 1223 133.5C1291.48 143.125 1371.2 206.287 1405.6 212.257L1440 218.105V452.025H0L0 154.75Z; M0 154.75C0 154.75 33.4 177.201 55 176.5C76.6 175.799 137.52 110.361 206 105C274.64 99.761 332.86 141.104 401.5 154.75C469.98 168.273 527.52 206.982 596 201.5C664.64 196.018 747.86 75 816.5 75C884.98 75 956.52 118.149 1025 133.5C1093.64 148.973 1163.36 87.497 1232 97C1300.48 106.625 1371.2 206.287 1405.6 212.257L1440 218.105V452.025H0L0 154.75Z; M0 154.75C0 154.75 12.8 142.902 34.4 142.201C56 141.5 140.02 160.111 208.5 154.75C277.14 149.511 334.36 112.57 403 126.216C471.48 139.739 552.52 190.448 621 184.966C689.64 179.484 745.36 116 814 116C882.48 116 950.52 161.149 1019 176.5C1087.64 191.973 1154.36 123.997 1223 133.5C1291.48 143.125 1371.2 206.287 1405.6 212.257L1440 218.105V452.025H0L0 154.75Z\">\n    <\/animate>\n  <\/path>\n  <path class=\"elementor-shape-fill\" d=\"M0 340.22L34.4 333.92C68.8 327.52 137.6 314.92 206.08 312.22C274.72 309.52 342.88 316.92 411.52 319.72C480 322.52 548.8 320.92 617.28 318.92C685.92 316.92 754.08 314.52 822.72 316.02C891.2 317.52 960 322.92 1028.48 309.42C1097.12 295.92 1165.28 263.52 1233.92 251.02C1302.4 238.52 1371.2 245.92 1405.6 249.52L1440 253.22V453.22H0L0 340.22Z\">\n    <animate repeatCount=\"indefinite\" fill=\"freeze\" attributeName=\"d\" dur=\"6.5s\" values=\"M0 340.22L34.4 333.92C68.8 327.52 139.02 281.2 207.5 278.5C276.14 275.8 351.86 331.12 420.5 333.92C488.98 336.72 554.52 289 623 287C691.64 285 756.86 332.42 825.5 333.92C893.98 335.42 960 322.92 1028.48 309.42C1097.12 295.92 1163.36 236 1232 223.5C1300.48 211 1371.2 245.92 1405.6 249.52L1440 253.22V453.22H0L0 340.22Z; M0 340.22L37.5 323C71.9 316.6 137.52 336.62 206 333.92C274.64 331.22 339.86 272.2 408.5 275C476.98 277.8 551.02 304 619.5 302C688.14 300 759.36 266.5 828 268C896.48 269.5 962.02 336.5 1030.5 323C1099.14 309.5 1156.36 232.5 1225 220C1293.48 207.5 1364.1 249.62 1398.5 253.22L1440 253.22V453.22H0L0 340.22Z; M0 340.22L34.4 333.92C68.8 327.52 139.02 281.2 207.5 278.5C276.14 275.8 351.86 331.12 420.5 333.92C488.98 336.72 554.52 289 623 287C691.64 285 756.86 332.42 825.5 333.92C893.98 335.42 960 322.92 1028.48 309.42C1097.12 295.92 1163.36 236 1232 223.5C1300.48 211 1371.2 245.92 1405.6 249.52L1440 253.22V453.22H0L0 340.22Z\">\n    <\/animate>\n  <\/path>\n  <path class=\"elementor-shape-fill\" d=\"M1440 337.719L1405.6 340.219C1371.2 342.719 1302.4 347.719 1233.92 350.419C1165.28 353.019 1097.12 353.419 1028.48 352.219C960 351.019 891.2 348.419 822.72 357.019C754.08 365.719 685.92 385.719 617.28 395.919C548.8 406.019 480 406.419 411.52 395.919C342.88 385.419 274.72 364.019 206.08 359.419C137.6 354.719 68.8 366.719 34.4 372.719L0 378.719V460.719H1440V337.719Z\">\n    <animate repeatCount=\"indefinite\" fill=\"freeze\" attributeName=\"d\" dur=\"5.5s\" values=\"M1440 337.719L1405.6 340.219C1371.2 342.719 1303.98 362.8 1235.5 365.5C1166.86 368.1 1090.14 324.2 1021.5 323C953.02 321.8 889.48 383.4 821 392C752.36 400.7 678.64 368.519 610 378.719C541.52 388.819 473.48 414.5 405 404C336.36 393.5 273.64 342.319 205 337.719C136.52 333.019 68.8 366.719 34.4 372.719L0 378.719V460.719H1440V337.719Z; M1440 337.719L1405.6 340.219C1371.2 342.719 1295.98 326.3 1227.5 329C1158.86 331.6 1081.64 391.2 1013 390C944.52 388.8 874.48 364.119 806 372.719C737.36 381.419 675.14 296.3 606.5 306.5C538.02 316.6 471.48 383.219 403 372.719C334.36 362.219 272.64 320.6 204 316C135.52 311.3 68.8 366.719 34.4 372.719L0 378.719V460.719H1440V337.719Z; M1440 337.719L1405.6 340.219C1371.2 342.719 1303.98 362.8 1235.5 365.5C1166.86 368.1 1090.14 324.2 1021.5 323C953.02 321.8 889.48 383.4 821 392C752.36 400.7 678.64 368.519 610 378.719C541.52 388.819 473.48 414.5 405 404C336.36 393.5 273.64 342.319 205 337.719C136.52 333.019 68.8 366.719 34.4 372.719L0 378.719V460.719H1440V337.719Z\">\n    <\/animate>\n  <\/path>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cd76de\" data-id=\"2cd76de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7901e36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7901e36\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-355dd6c\" data-id=\"355dd6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0a80b1 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c0a80b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8c78b4\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-custom lqd-highlight-custom-2 h1\"  > IT security<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c8197b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4c8197b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8c8bb6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-custom lqd-highlight-custom-2 h1\"  > Cybersecurity<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-996848d elementor-widget elementor-widget-ld_button\" data-id=\"996848d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\tclass=\"elementor-button btn btn-naked btn-icon-block btn-no-label\" data-localscroll=\"1\" data-localscroll-options=\"{&quot;scrollBelowSection&quot;:true}\" href=\"#\"\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-down\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0191b84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0191b84\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f912438\" data-id=\"f912438\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1305cbd elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"1305cbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8cc8ea\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  data-inview=\"true\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;:&quot;.lqd-highlight-inner&quot;,&quot;delayType&quot;:&quot;transition&quot;}\" > <mark class=\"lqd-highlight\"><span class=\"lqd-highlight-txt\"  >CYBER SECURITY AND BUSINESS PROTECTION<\/span><span class=\"lqd-highlight-inner\"><\/span><\/mark><\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86a1843 elementor-widget elementor-widget-text-editor\" data-id=\"86a1843\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threats continue to evolve rapidly around the world, with the number of attacks and data breaches increasing exponentially each year. No organisation can consider itself immune.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-212a5ae e-flex e-con-boxed e-con e-parent\" data-id=\"212a5ae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c832fd0 e-flex e-con-boxed e-con e-parent\" data-id=\"c832fd0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c49acc5 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c49acc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8cf040\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > The principles of cybersecurity<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-058dbe6 e-flex e-con-boxed e-con e-parent\" data-id=\"058dbe6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b175f37 e-flex e-con-boxed e-con e-parent\" data-id=\"b175f37\" data-element_type=\"container\" data-e-type=\"container\" id=\"icone-cyber\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-84e4ba7 e-con-full e-flex e-con e-parent\" data-id=\"84e4ba7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a02ae8 elementor-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"9a02ae8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tConfidentiality \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4003b58 e-con-full e-flex e-con e-parent\" data-id=\"4003b58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b33691 elementor-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1b33691\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIntegrity\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a401147 e-con-full e-flex e-con e-parent\" data-id=\"a401147\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04cd234 elementor-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"04cd234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAvailability\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-335d9ee e-flex e-con-boxed e-con e-parent\" data-id=\"335d9ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d43678d elementor-widget elementor-widget-text-editor\" data-id=\"d43678d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Creating a &#8216;safety culture&#8217; in an organisation does not mean incurring exorbitant costs, and much can be done even on a limited budget. The most important thing is to start becoming aware of the problem and to adopt a security-oriented mindset. In terms of the damage caused by a cyber attack, there will be a huge difference between companies that have taken action and protected themselves and those that have not.<\/p><p>Our company has created a dedicated SOC (Security Operation Centre) team to deal with cybersecurity issues and incident response, and over the years has developed highly preventative solutions that have significantly reduced the problems, while also specialising in the management of any emergencies that may arise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9059cd6 e-flex e-con-boxed e-con e-parent\" data-id=\"9059cd6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c308ec elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6c308ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8d1380\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  data-inview=\"true\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;:&quot;.lqd-highlight-inner&quot;,&quot;delayType&quot;:&quot;transition&quot;}\" > <mark class=\"lqd-highlight\"><span class=\"lqd-highlight-txt\"  >Network Vulnerability Assessment - NVA<\/span><span class=\"lqd-highlight-inner\"><\/span><\/mark><\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd6970c elementor-widget elementor-widget-text-editor\" data-id=\"fd6970c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The best &#8211; and necessary &#8211; prevention against attacks on information systems is a detailed analysis of your own vulnerabilities. Only once these have been identified and documented the necessary corrective action can be taken.<\/p><p>The NVA service is an assessment of the overall health of the entire organisation&#8217;s IT security. It can be used as a one-off intervention or through periodic and scheduled interventions to constantly monitor the security status of the IT infrastructure.<\/p><p>EUROSYSTEM2000&#8217;s NVA service, provided directly by the SOC, identifies infrastructure vulnerabilities in a timely, accurate and effective manner, allowing for the prioritisation of remediation actions to make the most exposed IT assets more secure.<\/p><ul><li><b>DATA COLLECTION AND PROCESSING<\/b><\/li><li><b>COMPLETE PICTURE OF SECURITY STATUS<\/b><\/li><li><b>REPORTS, ACTIONS AND SOLUTIONS<\/b><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67e94b6 e-flex e-con-boxed e-con e-parent\" data-id=\"67e94b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2739eed elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2739eed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8d3256\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  data-inview=\"true\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;:&quot;.lqd-highlight-inner&quot;,&quot;delayType&quot;:&quot;transition&quot;}\" > <mark class=\"lqd-highlight\"><span class=\"lqd-highlight-txt\"  >Data loss prevention<\/span><span class=\"lqd-highlight-inner\"><\/span><\/mark><\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41bf5e0 elementor-widget elementor-widget-text-editor\" data-id=\"41bf5e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data loss prevention is a set of techniques aimed at preventing data loss from within the organisation. Specific techniques and internal procedures can be implemented to minimise the risks associated with:<\/p><ul><li>anomalous user behaviour and prior investigation of threats before a data breach occurs;<\/li><li>unauthorised local copies on removable devices;<\/li><li>unauthorised copies of data on unauthorised clouds;<\/li><li>data leakage due to employee turnover;<\/li><li>access and activity monitoring through advanced activity log tracing.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ce0332 e-flex e-con-boxed e-con e-parent\" data-id=\"7ce0332\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8f7df elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2e8f7df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f94ea8d564e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  data-inview=\"true\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;:&quot;.lqd-highlight-inner&quot;,&quot;delayType&quot;:&quot;transition&quot;}\" > <mark class=\"lqd-highlight\"><span class=\"lqd-highlight-txt\"  >BUSINESS EDUCATION AND AWARENESS<\/span><span class=\"lqd-highlight-inner\"><\/span><\/mark><\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85298da elementor-widget elementor-widget-text-editor\" data-id=\"85298da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Coporate cybersecurity is not only achieved through IT tools or specific technologies, it is first and foremost a culture. A culture that must be part of:<\/p><ul><li>the company management, in order to be aware of the problem and to activate specific corrective actions;<\/li><li>the internal staff, who must be trained and made aware of the good practices to avoid risky and reprehensible behaviour.<\/li><\/ul><p>Failures or problems caused by human distraction of lack of knowledge of good practice are common. Although these are often unintentional behaviours, some distractions can have a devastating effect on a company&#8217;s cybersecurity.<\/p><p>Our SOC team of experts also addresses these types of issues to make corporate cybersecurity a topic to which all employees can be sensitive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT security Cybersecurity CYBER SECURITY AND BUSINESS PROTECTION Threats continue to evolve rapidly around the world, with the number of attacks and data breaches increasing exponentially each year. No organisation can consider itself immune. The principles of cybersecurity Confidentiality Integrity Availability Creating a &#8216;safety culture&#8217; in an organisation does not mean incurring exorbitant costs, and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"class_list":["post-12346","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/pages\/12346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/comments?post=12346"}],"version-history":[{"count":10,"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/pages\/12346\/revisions"}],"predecessor-version":[{"id":13321,"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/pages\/12346\/revisions\/13321"}],"wp:attachment":[{"href":"https:\/\/www.es2000.it\/en\/wp-json\/wp\/v2\/media?parent=12346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}