{"id":49476,"date":"2015-12-02T23:00:00","date_gmt":"2015-12-02T22:00:00","guid":{"rendered":"http:\/\/smeupnew.it\/magazine\/blog\/security_2015\/"},"modified":"2025-08-07T13:17:46","modified_gmt":"2025-08-07T11:17:46","slug":"security_2015","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/","title":{"rendered":"Speciale Security"},"content":{"rendered":"<p><span style=\"text-align: justify\">Per il 2015 si registrano sia buone che cattive notizie in materia di IT Security. Stando all\u2019ultimo report di IBM (<\/span><span style=\"text-decoration: underline\">Leggi il report<\/span><span style=\"text-align: justify\">), per esempio, la maggior parte delle violazioni della sicurezza delle imprese sono dovute a delle d\u00e9faillance nel sistema di protezione. Fortunatamente esse presentano delle caratteristiche comuni e sono quindi prevedibili. Con un po\u2019 di sforzo da parte dell\u2019azienda, si possono ottenere grandi risultati con un impatto a lungo termine notevole.<\/span><\/p>\n<p style=\"text-align: justify\">Per quanto riguarda i trend che si sono registrati durante il 2015, ci sono quattro aree da prendere in considerazione:\u00a0<span> <\/p>\n<p><\/span><\/p>\n<ul>\n<li style=\"text-align: justify\">Crescita dei <strong>Ransomware<\/strong>: i Ransomware (definiti anche cryptovirus, cryptotrojan, cryptoworms o scarware) sono una classe di malware che limita l&#8217;accesso e l&#8217;utilizzo dei computer infettati. I pirati informatici si servono di messaggi allarmanti per sfruttare le insicurezze degli utenti e, una volta che il computer \u00e8 infetto, compaiono messaggi \u201cminatori\u201d che spingono al pagamento di una somma di denaro per sbloccarlo. Questa \u00e8 stata l\u2019infrazione pi\u00f9 comune riscontrata. Questi tipi di attacchi hanno fruttato agli hackers pi\u00f9 di 18$ milioni solo tra il 2014 e il 2015, secondo stime FBI. Stando al parere degli analisti IBM, questo trend continuer\u00e0 anche nel 2016 spostandosi anche sui device mobili;\u00a0<\/li>\n<\/ul>\n<p><img class=\"lazyload\" decoding=\"async\" style=\"vertical-align: middle;margin-left: auto;margin-right: auto\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27267%27%20height%3D%27279%27%20viewBox%3D%270%200%20267%20279%27%3E%3Crect%20width%3D%27267%27%20height%3D%27279%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"\/wp-content\/uploads\/2017\/05\/Ransomware.png\" alt=\"Ransomware\" width=\"267\" height=\"279\" \/><\/p>\n<ul>\n<li style=\"text-align: justify\">La<strong> minaccia maggiore<\/strong> per una impresa pu\u00f2 provenire dal proprio <strong>interno<\/strong>: questo \u00e8 un trend gi\u00e0 registrato durante il 2014, quando, stando a dati IBM, il 55% di tutti gli attacchi \u00e8 stato compiuto da insiders che avevano accesso al sistema interno dell\u2019azienda;\u00a0\n<p><img class=\"lazyload\" decoding=\"async\" style=\"margin-left: auto;margin-right: auto\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27372%27%20height%3D%27220%27%20viewBox%3D%270%200%20372%20220%27%3E%3Crect%20width%3D%27372%27%20height%3D%27220%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"\/wp-content\/uploads\/2017\/05\/Data_Breach.png\" alt=\"Data Breach\" width=\"372\" height=\"220\" \/><\/p>\n<\/li>\n<li style=\"text-align: justify\">Il <strong>management<\/strong> dell\u2019impresa <strong>si interessa sempre di pi\u00f9 alla sicurezza <\/strong>del proprio business: dai dati emersi da alcuni sondaggi, infatti, si evince che il supporto in materia di cyber sicurezza da parte dei vertici aziendali e il budget ad essa riservato sono aumentati sensibilmente negli ultimi anni;\u00a0\n<p><img class=\"lazyload\" decoding=\"async\" style=\"margin-left: auto;margin-right: auto\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27451%27%20height%3D%27344%27%20viewBox%3D%270%200%20451%20344%27%3E%3Crect%20width%3D%27451%27%20height%3D%27344%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"\/wp-content\/uploads\/2017\/05\/IBM.png\" alt=\"IBM\" width=\"451\" height=\"344\" \/><\/p>\n<p><\/li>\n<li style=\"text-align: justify\">Tenere d\u2019occhio <strong>hacker non professionisti <\/strong>aiuta le imprese ad individuare eventuali criticit\u00e0 nella propria sicurezza: quando questi hackers, definiti anche \u201cscript kiddies\u201d, si introducono nel sistema aziendale lasciano delle piccole tracce come, per esempio, cartelle o file di tipo diverso da quelle abituali nella directory, danneggiando il sito web dell\u2019azienda e altro. Tenere d\u2019occhio questo tipo di attacchi permette alle aziende di sistemare carenze in materia di sicurezza per contrastare in modo pi\u00f9 efficace eventuali attacchi da parte di hacker professionisti.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><span style=\"font-size: small\"><strong><span style=\"color: #d51224\">APPROFONDISCI<\/span> IL TEMA, leggi anche <span style=\"text-decoration: underline;color: #d51224\"><a href=\"\/it\/security_2016\/\" target=\"_blank\" rel=\"noopener\">questo articolo<\/a><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: small\"><strong>SCOPRI <span style=\"color: #d51224\">I CONSIGLI DI IBM E KASPERSKI<\/span>, leggi anche <span style=\"text-decoration: underline;color: #d51224\"><a href=\"\/it\/security_consigli_kaspersky_ibm\/\" target=\"_blank\" rel=\"noopener\">questo articolo<\/a><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: small\"><strong><span style=\"text-decoration: underline;color: #d51224\"><br \/><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;articolo sulla security nel 2015 analizza i trend di violazione della sicurezza informatica, fornendo un bilancio tra buone e cattive notizie e consigli utili per affrontare le minacce emergenti.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-49476","post","type-post","status-publish","format-standard","hentry","category-news-da-smeup"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Speciale Security - Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Speciale Security - Magazine\" \/>\n<meta property=\"og:description\" content=\"L&#039;articolo sulla security nel 2015 analizza i trend di violazione della sicurezza informatica, fornendo un bilancio tra buone e cattive notizie e consigli utili per affrontare le minacce emergenti.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-02T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T11:17:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/04\/homepage-sito-smeup_seo-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"smeup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"smeup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/\"},\"author\":{\"name\":\"smeup\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"headline\":\"Speciale Security\",\"datePublished\":\"2015-12-02T22:00:00+00:00\",\"dateModified\":\"2025-08-07T11:17:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/\"},\"wordCount\":390,\"commentCount\":0,\"articleSection\":[\"News da smeup\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/\",\"name\":\"Speciale Security - Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"datePublished\":\"2015-12-02T22:00:00+00:00\",\"dateModified\":\"2025-08-07T11:17:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/security_2015\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Speciale Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\",\"name\":\"smeup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"caption\":\"smeup\"},\"sameAs\":[\"https:\\\/\\\/www.smeup.com\"],\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Speciale Security - Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/","og_locale":"it_IT","og_type":"article","og_title":"Speciale Security - Magazine","og_description":"L'articolo sulla security nel 2015 analizza i trend di violazione della sicurezza informatica, fornendo un bilancio tra buone e cattive notizie e consigli utili per affrontare le minacce emergenti.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/","og_site_name":"Magazine","article_published_time":"2015-12-02T22:00:00+00:00","article_modified_time":"2025-08-07T11:17:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/04\/homepage-sito-smeup_seo-social.png","type":"image\/png"}],"author":"smeup","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"smeup","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/"},"author":{"name":"smeup","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"headline":"Speciale Security","datePublished":"2015-12-02T22:00:00+00:00","dateModified":"2025-08-07T11:17:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/"},"wordCount":390,"commentCount":0,"articleSection":["News da smeup"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/","name":"Speciale Security - Magazine","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"datePublished":"2015-12-02T22:00:00+00:00","dateModified":"2025-08-07T11:17:46+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/security_2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Speciale Security"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7","name":"smeup","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","caption":"smeup"},"sameAs":["https:\/\/www.smeup.com"],"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=49476"}],"version-history":[{"count":2,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49476\/revisions"}],"predecessor-version":[{"id":58329,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49476\/revisions\/58329"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=49476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=49476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=49476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}