{"id":50771,"date":"2020-01-04T07:30:51","date_gmt":"2020-01-04T06:30:51","guid":{"rendered":"http:\/\/smeupnew.it\/magazine\/blog\/minacce-informatiche-protezione-dei-dati\/"},"modified":"2025-08-06T17:59:40","modified_gmt":"2025-08-06T15:59:40","slug":"minacce-informatiche","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/","title":{"rendered":"Protezione dei Dati e Consolidamento del Cloud: scenari 2020"},"content":{"rendered":"<h2>Minacce informatiche: quali ci aspettano nel 2020<\/h2>\n<p>Da tempo ormai \u00e8 chiara l\u2019importanza della protezione dei dati dalle minacce informatiche, ovunque essi risiedano.<\/p>\n<p>Questa consapevolezza ha fatto diventare questo tema una priorit\u00e0 ed ha fatto anche nascere \u201cnuove\u201d preoccupazioni legate alla crescente adozione del cloud computing.<\/p>\n<h3>Potenzialmente nei prossimi mesi ci potrebbero essere nuove minacce informatiche come per esempio:<\/h3>\n<ul>\n<li><strong>I provider di cloud pubblico potrebbero essere colpiti dal primo attacco Zero Day <\/strong>che utilizza malware pericoloso.<br \/>\nSe avvenisse, la cosa potrebbe avere un effetto a catena su chi si affida a loro.<\/li>\n<li><strong>Un lieve ma significativo rallentamento della crescita del cloud pubblico<\/strong> che porter\u00e0 ad una riduzione dei prezzi, introduzione di pi\u00f9 servizi e acquisizioni.<\/li>\n<li><strong>Il fatto che le aziende adottino soluzioni cloud legate alle proprie esigenze<\/strong> porter\u00e0 ad un aumento della necessit\u00e0 di poter usufruire di sistemi di protezione veloci e flessibili che possano salvaguardare molteplici workload di dati e di avere piattaforme in grado di ospitare pi\u00f9 opzioni cloud (es. PaaS &#8211; Platform as a Service).<\/li>\n<li><strong>Aumento della disponibilit\u00e0 dei data center<\/strong> regionali dei diversi vendor cloud.<br \/>\nAttualmente ci sono 96 aree coperte (54 Microsoft Azure; 22 Amazon Web Services; 20 Google Cloud Platform) e Oracle Cloud ha annunciato di voler raggiungere il numero di 36 aree disponibili nel 2020 (ci\u00f2 significa una nuova disponibilit\u00e0 geografica ogni 23 giorni). Questo aumento di disponibilit\u00e0 necessiter\u00e0 di protezioni che assicurino ai team IT globali visibilit\u00e0 e gestione dei dati.<\/li>\n<li><strong>I mutamenti climatici<\/strong>.<br \/>\nI sempre pi\u00f9 frequenti disastri ambientali dovuti ai cambiamenti climatici impongono alle aziende di adottare soluzioni che le mettano al sicuro e che consentano loro di riprendersi velocemente per esempio da un\u2019alluvione, grazie al fatto di aver trasferito il back up delle applicazioni su un cloud situato in un\u2019altra area o perch\u00e9 possono mettere in atto un piano di disaster recovery.<\/li>\n<\/ul>\n<p><strong>Elena Cattaneo<br \/>\n<\/strong><em>Sales Specialist &#8211; SMEUP ICS<br \/>\n<\/em><a href=\"https:\/\/www.linkedin.com\/in\/elena-cattaneo-59ba72107\/\" target=\"_blank\" rel=\"noopener noreferrer\">My LinkedIn Profile<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le minacce informatiche sono in costante evoluzione, rendendo cruciale la protezione dei dati e il consolidamento del cloud attraverso soluzioni sempre aggiornate per fronteggiare i pericoli emergenti.<\/p>\n","protected":false},"author":1,"featured_media":54122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7190],"tags":[3907,4110,4614],"class_list":["post-50771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-informatica","tag-cloud","tag-cloud-computing","tag-protezione-dei-dati"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Minacce informatiche: scenari 2020 per la protezione dei dati<\/title>\n<meta name=\"description\" content=\"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Minacce informatiche: scenari 2020 per la protezione dei dati\" \/>\n<meta property=\"og:description\" content=\"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-04T06:30:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T15:59:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"smeup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"smeup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/\"},\"author\":{\"name\":\"smeup\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"headline\":\"Protezione dei Dati e Consolidamento del Cloud: scenari 2020\",\"datePublished\":\"2020-01-04T06:30:51+00:00\",\"dateModified\":\"2025-08-06T15:59:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/\"},\"wordCount\":315,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2020\\\/01\\\/minacce-informatiche.jpg\",\"keywords\":[\"cloud\",\"Cloud Computing\",\"protezione dei dati\"],\"articleSection\":[\"Sicurezza informatica\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/\",\"name\":\"Minacce informatiche: scenari 2020 per la protezione dei dati\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2020\\\/01\\\/minacce-informatiche.jpg\",\"datePublished\":\"2020-01-04T06:30:51+00:00\",\"dateModified\":\"2025-08-06T15:59:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"description\":\"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2020\\\/01\\\/minacce-informatiche.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2020\\\/01\\\/minacce-informatiche.jpg\",\"width\":1600,\"height\":1200,\"caption\":\"smeup minacce informatiche\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/minacce-informatiche\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protezione dei Dati e Consolidamento del Cloud: scenari 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\",\"name\":\"smeup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"caption\":\"smeup\"},\"sameAs\":[\"https:\\\/\\\/www.smeup.com\"],\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Minacce informatiche: scenari 2020 per la protezione dei dati","description":"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/","og_locale":"it_IT","og_type":"article","og_title":"Minacce informatiche: scenari 2020 per la protezione dei dati","og_description":"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/","og_site_name":"Magazine","article_published_time":"2020-01-04T06:30:51+00:00","article_modified_time":"2025-08-06T15:59:40+00:00","og_image":[{"width":1600,"height":1200,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg","type":"image\/jpeg"}],"author":"smeup","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"smeup","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/"},"author":{"name":"smeup","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"headline":"Protezione dei Dati e Consolidamento del Cloud: scenari 2020","datePublished":"2020-01-04T06:30:51+00:00","dateModified":"2025-08-06T15:59:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/"},"wordCount":315,"commentCount":0,"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg","keywords":["cloud","Cloud Computing","protezione dei dati"],"articleSection":["Sicurezza informatica"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/","name":"Minacce informatiche: scenari 2020 per la protezione dei dati","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg","datePublished":"2020-01-04T06:30:51+00:00","dateModified":"2025-08-06T15:59:40+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"description":"Minacce informatiche: quali sono i rischi del 2020 in ambito di protezione dei dati e di consolidamento del Cloud? Scoprili con smeup!","breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#primaryimage","url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg","contentUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2020\/01\/minacce-informatiche.jpg","width":1600,"height":1200,"caption":"smeup minacce informatiche"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/minacce-informatiche\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Protezione dei Dati e Consolidamento del Cloud: scenari 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7","name":"smeup","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","caption":"smeup"},"sameAs":["https:\/\/www.smeup.com"],"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=50771"}],"version-history":[{"count":3,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50771\/revisions"}],"predecessor-version":[{"id":58216,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50771\/revisions\/58216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media\/54122"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=50771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=50771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=50771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}