IT Security

SOC and its role in cybersecurity incident response

SOC and its role in cybersecurity incident response

Increasingly distributed IT infrastructures coupled with the increase in workloads performed outside the corporate perimeter have made possible a variety of different types of cyber attacks on a global scale. This trend has consequently prompted many companies to choose the Security Operation Center (SOC) as an integral part of their cybersecurity strategy. Normally, if larger companies have their own dedicated and internally managed department, SMEs choose to rely on an outsourced SOC that allows them to enjoy “entreprise” protection, unlike what they could arrange independently.

read more
Cyber Recovery: the strategy to defend against cyber attacks

Cyber Recovery: the strategy to defend against cyber attacks

The now well-known dependence of companies on technology makes them the perfect target for cybercriminals, who, well aware of the heavy repercussions caused by a total shutdown, systematically threaten and attack their mission-critical operations. As usual, the learning curve of these cybercriminals keeps pace with the defensive actions taken by companies, learning as they go around them.

read more
Cyber Recovery: how it works and how to apply it

Cyber Recovery: how it works and how to apply it

The steady increase in digitization and the related shift to the cloud due to diverse development opportunities, increased flexibility and business agility has also indirectly caused an increase in cyber attacks in the public and private sector worldwide.
Estimating that about every 39 seconds a cyber attack occurs, one would think that it is no longer a matter of “if” but rather “when” it will be one’s turn to face an attack on one’s company. Therefore, it becomes critical to identify critical data and applications that, in the event of an attack, enable normal business operations to be resumed quickly.

read more
How to manage devices security? With Intune.

How to manage devices security? With Intune.

In a work environment where employees need to be able to work remotely by having an average of 2 or more devices, companies are challenged in trying to ensure total accessibility to them without security repercussions.
How then to keep all devices safe? How to protect data if employees check emails from their mobile apps?
These questions, and many others, are answered by InTune, Microsoft’s mobile device management (MDM) service that creates the foundation for secure enterprise mobility.
In fact, by using Intune-managed certificates and standard VPN gateways or proxies, it is possible to allow mobile apps to access on-premises data, ensuring that employees can access it from virtually anywhere and on almost any device, while providing maximum security.

read more
Data security: backup and the 3-2-1-1-0 rule

Data security: backup and the 3-2-1-1-0 rule

The experience of computer data loss is always a traumatic event, both in the private sphere and, even more so, in the business context. In the latter case, in fact, the event can constitute a major damage and even a not inconsiderable danger, both to the organization and to its customers and suppliers. To prevent it, there are best practices that, however, need the right ways to apply them in order to be reliable.

read more
Immutable backups and Cloud: how to protect data from ransomware

Immutable backups and Cloud: how to protect data from ransomware

Ransomware is one of the biggest cybersecurity threats a company can face. Its operation is as simple as it is deadly: through encryption it makes it impossible for users to access stored files and content. In order to gain access again, the company is asked to pay a ransom, and throughout the downtime, the organization suffers damage in terms of turnover, operations, and image.

This is why it is critical for any organization to equip itself with an effective backup system for corporate data with which to ensure real-time restoration of functionality in the event of a ransomware attack, thus avoiding having to give in to blackmail and losing valuable time on the business front.

But there is an additional problem: hacking is constantly evolving, and today cybercriminals are able to encrypt even backups. To try to counter this critical issue and provide better protection from ransomware, a special category of backups has been developed, in which information referred to as “immutable data” is stored.

read more