{"id":49916,"date":"2018-08-30T06:00:19","date_gmt":"2018-08-30T04:00:19","guid":{"rendered":"http:\/\/smeupnew.it\/magazine\/blog\/data-security-parte-1\/"},"modified":"2025-08-07T12:46:36","modified_gmt":"2025-08-07T10:46:36","slug":"data-security-parte-1","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/","title":{"rendered":"Data Security: non fare l&#8217;insensibile! &#8211; parte 1"},"content":{"rendered":"<p>Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre <strong>pi\u00f9 multidisciplinare<\/strong>, soprattutto dopo l&#8217;entrata in vigore del\u00a0<a href=\"https:\/\/www.wired.it\/internet\/regole\/2018\/02\/23\/gdpr-protezione-dati-europa\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>, il nuovo regolamento europeo sul trattamento dei dati.<\/p>\n<p>Il valore del mercato Italiano della cybersecurity \u00e8 oggi stimato in 850 milioni di euro (come abbiamo gi\u00e0 documentato in <a href=\"https:\/\/www.smeup.com\/magazine\/blog\/sicurezza-it-situazione-italia\/\" target=\"_blank\" rel=\"noopener\"><strong>questo articolo<\/strong><\/a>), ma solo il 33% del Top management italiano valuta la sicurezza informatica come una priorit\u00e0 di investimento per la propria azienda. Dati allarmanti, se si pensa che il cyber crime costa all\u2019Italia oltre 9 miliardi l\u2019anno.<\/p>\n<h2>A cosa pu\u00f2 ricondursi tale insensibilit\u00e0 al tema della data security?<\/h2>\n<p>In primo luogo, all\u2019insufficiente approccio strategico delle aziende al problema della sicurezza ed all\u2019assenza di ruoli organizzativi dedicati al\u00a0security management.<\/p>\n<p>A ci\u00f2 si aggiungano le difficolt\u00e0 nella mappatura dei rischi, nella quantificazione costi-benefici dei differenti interventi tecnologici, nella definizione di strategie aziendali a lungo termine.<\/p>\n<p>E\u2019 quindi necessario che le organizzazioni adottino una strategia di data security dinamica e agile, che costruisca resilienza dall\u2019interno e non si focalizzi sulla difesa del perimetro\u201d.<\/p>\n<p>E allora vediamo nel dettaglio in quale direzione dovr\u00e0 svilupparsi questo\u00a0<strong>processo di revisione dei sistemi produttivi aziendali volto al miglioramento dell\u2019efficacia delle misure di cybersecurity.<\/strong><\/p>\n<h2>Guida alla Data Security<\/h2>\n<p>Una piccola guida ci pu\u00f2 aiutare ad indicare le azioni utili per ridurre il rischio di cyber crime, ecco i primi tre suggerimenti di seguito:<\/p>\n<ol>\n<li>Esiste ed \u00e8 mantenuto aggiornato un inventario dei sistemi, dispositivi, software, servizi e applicazioni informatiche in uso all\u2019interno del perimetro aziendale;<\/li>\n<li>I servizi web (social network, cloud computing, posta elettronica, spazio web, ecc..) offerti da terze parti a cui si \u00e8 registrati sono quelli strettamente necessari;<\/li>\n<li>Sono individuate le informazioni, i dati e i sistemi critici per l\u2019azienda affinch\u00e9 siano adeguatamente protetti;<\/li>\n<li>\u2026<\/li>\n<\/ol>\n<p>Per sapere gli altri consigli vi invito a leggere il prossimo articolo che andr\u00e0 online tra qualche giorno. Stay tuned protect your company!<\/p>\n<p><strong>Angelo De Bari<br \/>\n<\/strong><em>Sales Specialist Infrastruttura, Cloud &amp; Security &#8211; smeup<br \/>\n<\/em><a href=\"https:\/\/it.linkedin.com\/in\/angelo-de-bari-67069319\" target=\"_blank\" rel=\"noopener\">My LinkedIn Profile<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Data Security richiede un approccio multidisciplinare e strategico, data la scarsa priorit\u00e0 di investimento in Italia e i crescenti costi del cyber crime; \u00e8 cruciale adottare una guida pratica che includa l&#8217;inventario dei sistemi, la razionalizzazione dei servizi web e l&#8217;identificazione dei dati critici da proteggere.<\/p>\n","protected":false},"author":1,"featured_media":54094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7190],"tags":[4612,4861,4613,4943,4522,4944,3980,4945],"class_list":["post-49916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-informatica","tag-cyber-crime","tag-cyber-crimine","tag-cyber-security","tag-cyberattack","tag-cybercrime","tag-cybersecurity","tag-gdpr","tag-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Security: non fare l&#039;insensibile! Proteggi la tua azienda - parte 1<\/title>\n<meta name=\"description\" content=\"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security: non fare l&#039;insensibile! Proteggi la tua azienda - parte 1\" \/>\n<meta property=\"og:description\" content=\"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-30T04:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T10:46:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"smeup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"smeup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/\"},\"author\":{\"name\":\"smeup\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"headline\":\"Data Security: non fare l&#8217;insensibile! &#8211; parte 1\",\"datePublished\":\"2018-08-30T04:00:19+00:00\",\"dateModified\":\"2025-08-07T10:46:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/\"},\"wordCount\":343,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2018\\\/08\\\/data-security.jpg\",\"keywords\":[\"cyber crime\",\"cyber crimine\",\"Cyber security\",\"cyberattack\",\"cybercrime\",\"cybersecurity\",\"GDPR\",\"security management\"],\"articleSection\":[\"Sicurezza informatica\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/\",\"name\":\"Data Security: non fare l'insensibile! Proteggi la tua azienda - parte 1\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2018\\\/08\\\/data-security.jpg\",\"datePublished\":\"2018-08-30T04:00:19+00:00\",\"dateModified\":\"2025-08-07T10:46:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"description\":\"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2018\\\/08\\\/data-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2018\\\/08\\\/data-security.jpg\",\"width\":1600,\"height\":1068,\"caption\":\"smeup data security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/data-security-parte-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security: non fare l&#8217;insensibile! &#8211; parte 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\",\"name\":\"smeup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"caption\":\"smeup\"},\"sameAs\":[\"https:\\\/\\\/www.smeup.com\"],\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security: non fare l'insensibile! Proteggi la tua azienda - parte 1","description":"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/","og_locale":"it_IT","og_type":"article","og_title":"Data Security: non fare l'insensibile! Proteggi la tua azienda - parte 1","og_description":"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/","og_site_name":"Magazine","article_published_time":"2018-08-30T04:00:19+00:00","article_modified_time":"2025-08-07T10:46:36+00:00","og_image":[{"width":1600,"height":1068,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg","type":"image\/jpeg"}],"author":"smeup","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"smeup","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/"},"author":{"name":"smeup","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"headline":"Data Security: non fare l&#8217;insensibile! &#8211; parte 1","datePublished":"2018-08-30T04:00:19+00:00","dateModified":"2025-08-07T10:46:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/"},"wordCount":343,"commentCount":0,"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg","keywords":["cyber crime","cyber crimine","Cyber security","cyberattack","cybercrime","cybersecurity","GDPR","security management"],"articleSection":["Sicurezza informatica"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/","name":"Data Security: non fare l'insensibile! Proteggi la tua azienda - parte 1","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg","datePublished":"2018-08-30T04:00:19+00:00","dateModified":"2025-08-07T10:46:36+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"description":"Per le\u00a0aziende, ora diventa pi\u00f9 che mai importante affrontare il tema della Data Security con un approccio sempre pi\u00f9 multidisciplinare.","breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#primaryimage","url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg","contentUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2018\/08\/data-security.jpg","width":1600,"height":1068,"caption":"smeup data security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/data-security-parte-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Data Security: non fare l&#8217;insensibile! &#8211; parte 1"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7","name":"smeup","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","caption":"smeup"},"sameAs":["https:\/\/www.smeup.com"],"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=49916"}],"version-history":[{"count":4,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49916\/revisions"}],"predecessor-version":[{"id":58285,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49916\/revisions\/58285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media\/54094"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=49916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=49916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=49916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}