{"id":11043,"date":"2022-11-25T12:49:03","date_gmt":"2022-11-25T11:49:03","guid":{"rendered":"https:\/\/agmsolutions.net\/?p=11043"},"modified":"2023-03-21T09:39:00","modified_gmt":"2023-03-21T08:39:00","slug":"come-sono-cambiati-gli-attacchi-informatici","status":"publish","type":"post","link":"https:\/\/dev.agmtest.net\/en\/come-sono-cambiati-gli-attacchi-informatici\/","title":{"rendered":"Come sono cambiati gli attacchi informatici?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11043\" class=\"elementor elementor-11043\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b9c2937 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b9c2937\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6aa6c5b3\" data-id=\"6aa6c5b3\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-312dd0d2 elementor-widget elementor-widget-text-editor\" data-id=\"312dd0d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>I Cyberattacchi sono ormai un problema all\u2019ordine del giorno, questo spaventa non solo a livello di numeri, ma ad allarmare sono soprattutto la <b>precisione <\/b>and the <b>violenza<\/b> degli stessi.<\/p>\n<p><b>Le modalit\u00e0 degli attacchi informatici sono cambiate.<\/b><\/p>\n<p>I dati del Rapporto Clusit 2022 sulla sicurezza ICT, sono senz\u2019altro preoccupanti, e avere una <b>buona strategia di difesa <\/b>dagli attacchi \u00e8 diventata una<strong> priorit\u00e0 per le aziende<\/strong>.<br><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Per darvi un\u2019idea, nel 2021 si sono registrati 1356 attacchi i<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">nformatici in Italia, mentre il primo semestre del 2022 ha sorpassano questa&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">cifra, con ben 1572. <\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins;\"><b>L\u2019aumento \u00e8 del 8,4%<\/b><\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">.<\/span><\/p>\n<p>Se da un lato il 2020 ha portato ad una digitalizzazione rapida e inarrestabile, dall\u2019altro la sicurezza informatica non \u00e8 riuscita a rimanere al passo.<br><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Gi\u00e0 precedentemente, nel 2021, l\u2019incremento dei&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">cyberattacchi aveva destato preoccupazioni, ma \u00e8 ormai chiaro che questo numero&nbsp;<\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: 0px;\">destinato a salire e provocare ulteriori danni.<br><\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: 0px;\">Uno dei settori maggiormente presi di mira \u00e8 quello&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">finanziario, che registra ben il 43% degli attacchi totali. A seguire c\u2019\u00e8 il&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">settore ICT, che ha subito numerosi attacchi mirati al furto di dati sensibili.<\/span><\/p>\n<p>I dati aziendali infatti sono un bene prezioso e che viene continuamente esposto a minacce. Uno dei principali nemici sono i <strong>r<\/strong><b>ansomware<\/b>, una tipologia di virus capace criptare (e rendere inagibili) tutti i dati presenti sull\u2019hard disk, ed \u00e8 usato per poi chiedere un riscatto in criptovalute. Un\u2019altra tipologia di attacco molto comune, \u00e8 una truffa digitale a tutti gli effetti, e si tratta del <b>phishing<\/b>. In questo secondo caso tutto comincia dalla ricezione di una email ingannevole con l\u2019intento di attirare l\u2019attenzione della vittima, che persuasa dal contenuto troppo spesso per fornire i dati richiesti e cade in trappola.<\/p>\n<p>Negli scorsi mesi, anche diverse note aziende hanno dovuto fare i conti con il problema Malware, fra queste il gruppo Maggioli, il Comune di Torino e San Carlo.<br><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: 0px;\">Torino per\u00f2 non ha avuto tregua, perch\u00e9 ad agosto 2022 ha&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">subito un ulteriore attacco all\u2019Asl Citt\u00e0 di Torino, e ad oggi \u00e8 stato&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">recuperato solo il 95% dei dati.&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Diventa quindi chiaro quanto le Aziende Sanitarie siano nel&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">mirino e sempre pi\u00f9 a rischio per furto di dati e identit\u00e0.<br><\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Il 2022 inoltre ha visto in azione il gruppo Lapsus$, che ha <\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">colpito numerose note aziende, come ad esempio Samsung. Ma non solo, a marzo <\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">con un attacco phishing sono stati violati anche Microsoft Bing, Cortana e Okta.<\/span><\/p>\n<p><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins;\"><b>Il consiglio di AGM Solutions<\/b><\/span><\/p>\n<p>Insomma, \u00e8 chiaro che la sicurezza informatica dovrebbe diventare una <b>priorit\u00e0 per le aziende.<\/b><br><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Cercare di arrangiare qualcosa in autonomia non \u00e8 pi\u00f9&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">sufficiente, e oltre ad essere altamente sconsigliato pu\u00f2<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">&nbsp;costare caro.&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">Il nostro consiglio \u00e8 quello di non sottovalutare il&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">problema, e di agire in maniera preventiva affidando la vostra sicurezza informatica&nbsp;<\/span><span style=\"letter-spacing: 0px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Poppins; font-weight: var( --e-global-typography-text-font-weight );\">nelle mani di esperti che sappiano garantire servizi di qualit\u00e0.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>I Cyberattacchi sono ormai un problema all\u2019ordine del giorno, questo spaventa non solo a livello di numeri, ma ad allarmare sono soprattutto la precisione e la violenza degli stessi.<\/p>","protected":false},"author":57,"featured_media":11055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"featured_image_src":{"landsacpe":["https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing-1140x445.png",1140,445,true],"list":["https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing-463x348.png",463,348,true],"medium":["https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing-300x158.png",300,158,true],"full":["https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing.png",1200,630,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Come sono cambiati gli attacchi informatici?<\/title>\n<meta name=\"description\" content=\"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.agmtest.net\/en\/come-sono-cambiati-gli-attacchi-informatici\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Come sono cambiati gli attacchi informatici?\" \/>\n<meta property=\"og:description\" content=\"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.agmtest.net\/en\/come-sono-cambiati-gli-attacchi-informatici\/\" \/>\n<meta property=\"og:site_name\" content=\"AGM Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T11:49:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T08:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"nicoletta.patruno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nicoletta.patruno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/\",\"url\":\"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/\",\"name\":\"Come sono cambiati gli attacchi informatici?\",\"isPartOf\":{\"@id\":\"https:\/\/dev.agmtest.net\/#website\"},\"datePublished\":\"2022-11-25T11:49:03+00:00\",\"dateModified\":\"2023-03-21T08:39:00+00:00\",\"author\":{\"@id\":\"https:\/\/dev.agmtest.net\/#\/schema\/person\/b525da363546f67edf8809de594bfd28\"},\"description\":\"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.agmtest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Come sono cambiati gli attacchi informatici?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.agmtest.net\/#website\",\"url\":\"https:\/\/dev.agmtest.net\/\",\"name\":\"AGM Solutions\",\"description\":\"Innovation Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.agmtest.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.agmtest.net\/#\/schema\/person\/b525da363546f67edf8809de594bfd28\",\"name\":\"nicoletta.patruno\",\"url\":\"https:\/\/dev.agmtest.net\/en\/author\/nicoletta-patruno\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Come sono cambiati gli attacchi informatici?","description":"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.agmtest.net\/en\/come-sono-cambiati-gli-attacchi-informatici\/","og_locale":"en_GB","og_type":"article","og_title":"Come sono cambiati gli attacchi informatici?","og_description":"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?","og_url":"https:\/\/dev.agmtest.net\/en\/come-sono-cambiati-gli-attacchi-informatici\/","og_site_name":"AGM Solutions","article_published_time":"2022-11-25T11:49:03+00:00","article_modified_time":"2023-03-21T08:39:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/11\/Phishing.png","type":"image\/png"}],"author":"nicoletta.patruno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nicoletta.patruno","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/","url":"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/","name":"Come sono cambiati gli attacchi informatici?","isPartOf":{"@id":"https:\/\/dev.agmtest.net\/#website"},"datePublished":"2022-11-25T11:49:03+00:00","dateModified":"2023-03-21T08:39:00+00:00","author":{"@id":"https:\/\/dev.agmtest.net\/#\/schema\/person\/b525da363546f67edf8809de594bfd28"},"description":"Gli attacchi informatici sono un problema all\u2019ordine del giorno, crescono numericamente e sono sempre pi\u00f9 violenti. Come tutelarsi?","breadcrumb":{"@id":"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.agmtest.net\/come-sono-cambiati-gli-attacchi-informatici\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.agmtest.net\/"},{"@type":"ListItem","position":2,"name":"Come sono cambiati gli attacchi informatici?"}]},{"@type":"WebSite","@id":"https:\/\/dev.agmtest.net\/#website","url":"https:\/\/dev.agmtest.net\/","name":"AGM Solutions","description":"Innovation Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.agmtest.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/dev.agmtest.net\/#\/schema\/person\/b525da363546f67edf8809de594bfd28","name":"nicoletta.patruno","url":"https:\/\/dev.agmtest.net\/en\/author\/nicoletta-patruno\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/posts\/11043"}],"collection":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/comments?post=11043"}],"version-history":[{"count":40,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/posts\/11043\/revisions"}],"predecessor-version":[{"id":11815,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/posts\/11043\/revisions\/11815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/media\/11055"}],"wp:attachment":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/media?parent=11043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/categories?post=11043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/tags?post=11043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}