{"id":25530,"date":"2022-07-27T13:16:28","date_gmt":"2022-07-27T13:16:28","guid":{"rendered":"https:\/\/wegg.it\/?p=25530"},"modified":"2024-02-02T09:47:44","modified_gmt":"2024-02-02T09:47:44","slug":"everywhere-workplace-tutelarsi-rischio-informatico","status":"publish","type":"post","link":"https:\/\/wegg.it\/eng\/everywhere-workplace-tutelarsi-rischio-informatico\/","title":{"rendered":"Everywhere Workplace: how to protect yourself against cyber risk"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25530\" class=\"elementor elementor-25530\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53e0c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53e0c95\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-531edbf\" data-id=\"531edbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb2f54 elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8bb2f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ee191b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ee191b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c6e3a6\" data-id=\"2c6e3a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20926b3 elementor-widget elementor-widget-image\" data-id=\"20926b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ-1024x683.jpg\" class=\"attachment-large size-large wp-image-25533\" alt=\"\" srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ-1024x683.jpg 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ-300x200.jpg 300w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ-768x512.jpg 768w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ-1536x1024.jpg 1536w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/austin-distel-va_Opp86kfQ.jpg 1587w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025de72 elementor-widget elementor-widget-post-info\" data-id=\"025de72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-8dd652e elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/eng\/2022\/07\/27\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>July 27, 2022<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e7748 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a3e7748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Everywhere Workplace: come tutelarsi dal rischio informatico<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e4747 elementor-widget elementor-widget-text-editor\" data-id=\"71e4747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-selectable-paragraph=\"\"><em>Come si fa a tutelarsi dal rischio informatico nell&#8217;era dell&#8217;Everywhere Workplace? Perch\u00e9 bisogna prestare una rinnovata attenzione al tema della Workplace Security?<\/em><\/p>\n<p id=\"4f20\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Ben il\u00a0<strong class=\"rb fm\">70%<\/strong>\u00a0<strong class=\"rb fm\">dei dipendenti<\/strong>\u00a0preferirebbe poter lavorare\u00a0<strong class=\"rb fm\">da qualsiasi luogo<\/strong>\u00a0piuttosto che ricevere una promozione. Lo dice\u00a0<a class=\"au jt\" href=\"https:\/\/rs.ivanti.com\/reports\/ivi-2663-everywhere-workplace-report-2022_it.pdf?utm_campaign=Global%20IT%20Exec%20Brand%20Nurture%20-%20Email%203%2022Q1%20-%20UEM%20WP&amp;utm_medium=email&amp;utm_source=Eloqua\" target=\"_blank\" rel=\"noopener ugc nofollow\">l\u2019Everywhere Workplace Report<\/a>\u00a0di Ivanti.<\/p>\n<p id=\"40aa\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Per garantire la flessibilit\u00e0 richiesta dal lavoro agile, le aziende hanno cominciato a integrare all\u2019interno della loro infrastruttura\u00a0<strong class=\"rb fm\">anche dotazioni tecnologiche destinate all\u2019uso privato<\/strong>\u00a0(i BYOD \u2014 Bring Your Own Device), aumentando allo stesso tempo la loro esposizione agli attacchi informatici.<\/p>\n<p id=\"cdd4\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">La\u00a0<a class=\"au jt\" href=\"https:\/\/wegg.it\/lavoro-agile-evitare-attacchi-cyber\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"rb fm\">gestione del rischio informatico<\/strong><\/a>\u00a0sembra essere ancora legata a\u00a0<strong class=\"rb fm\">vecchi schemi<\/strong>\u00a0che male si coniugano con l\u2019agilit\u00e0 richiesta dalla trasformazione digitale e dal lavoro agile: uno dei temi pi\u00f9 spinosi, nel vasto catalogo dell\u2019enciclopedia della sicurezza, \u00e8 la\u00a0<strong class=\"rb fm\">gestione delle vulnerabilit\u00e0<\/strong>.<\/p>\n<p id=\"2e6c\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Secondo i report del\u00a0<strong class=\"rb fm\">National Institute of Standards (NIST),<\/strong>\u00a0nel 2020 sono state registrate oltre\u00a0<strong class=\"rb fm\">18mila vulnerabilit\u00e0<\/strong>\u00a0e il numero in aumento \u00e8 anche conseguenza di un\u00a0<strong class=\"rb fm\">dataset allargato<\/strong>. Tra queste, oltre 10mila (il 57%), sono state classificate con punteggi di \u201c<strong class=\"rb fm\">severity high\/critical<\/strong>\u201d.<\/p>\n\n<h2 id=\"3a02\" class=\"rv rw pd bn dr rx ry rz fq sa sb sc fu qe sd qf fy qh se qi gc qk sf ql gg sg dq\"><strong class=\"ba\">Rischio informatico: si pu\u00f2 fare qualcosa?<\/strong><\/h2>\n<p id=\"bdf9\" class=\"pw-post-body-paragraph qz ra pd rb b rc sh fo re rf si fs rh ri sj rk rl rm sk ro rp rq sl rs rt ru kr dq\" data-selectable-paragraph=\"\">Il programma di gestione delle vulnerabilit\u00e0 di un\u2019organizzazione deve essere contestualizzato in base all\u2019<strong class=\"rb fm\">analisi del proprio<\/strong>\u00a0<strong class=\"rb fm\">ambiente di rischio<\/strong>, tenendo conto di ogni aspetto: dai dispositivi esatti e dall\u2019accessibilit\u00e0 della rete all\u2019analisi del flusso di lavoro e alle interazioni con le applicazioni.<\/p>\n<p id=\"5487\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Tuttavia, per valutare se una specifica vulnerabilit\u00e0 \u00e8\u00a0<strong class=\"rb fm\">pericolosa<\/strong>\u00a0per l\u2019organizzazione e la sua infrastruttura, il primo step \u00e8 innanzitutto\u00a0<strong class=\"rb fm\">sapere che esiste.<\/strong><\/p>\n\n<ul class=\"\">\n \t<li id=\"88d0\" class=\"sm sn pd rb b rc rd rf rg ri so rm sp rq sq ru sr ss st su dq\" data-selectable-paragraph=\"\"><strong class=\"rb fm\">inventariazione e monitoraggio<\/strong><\/li>\n<\/ul>\n<p id=\"6d4d\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">La prima cosa da fare \u00e8<strong class=\"rb fm\">\u00a0aumentare la visibilit\u00e0,\u00a0<\/strong>ovvero definire in maniera puntuale\u00a0<strong class=\"rb fm\">gli asset<\/strong>\u00a0che accedono alle applicazioni e ai dati aziendali. L\u2019inventario delle risorse deve essere\u00a0<strong class=\"rb fm\">completo e dinamico<\/strong>: in un contesto digitale agile e in costante evoluzione non \u00e8 pi\u00f9 possibile gestire cataloghi in modo manuale. \u00c8 giunto il momento di salutare i fogli Excel e ricorrere a\u00a0<strong class=\"rb fm\">strumenti di inventariazione automatica.<\/strong><\/p>\n<p id=\"56a1\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">I programmi di gestione delle vulnerabilit\u00e0, che prendono le mosse da\u00a0<strong class=\"rb fm\">operazioni ricorrenti<\/strong>\u00a0<strong class=\"rb fm\">di scansione degli inventari forniti<\/strong>, non possono limitarsi a\u00a0<strong class=\"rb fm\">un\u2019unica fonte di dati,\u00a0<\/strong>anche se autorevole e aggiornata come il NVD\u00a0<a class=\"au jt\" href=\"https:\/\/nvd.nist.gov\/general\/nvd-dashboard\" target=\"_blank\" rel=\"noopener ugc nofollow\">(National Vulnerability Database)<\/a>.<\/p>\n<p id=\"22c4\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Secondo l\u2019esperto\u00a0<a class=\"au jt\" href=\"https:\/\/www.ivanti.com\/blog\/author\/abhinav-tiwari\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"rb fm\">Abhinav Tiwari<\/strong><\/a><strong class=\"rb fm\">,\u00a0<\/strong>questo database pubblico di vulnerabilit\u00e0 note (<strong class=\"rb fm\">CVE o Common Vulnerabilities Exposure<\/strong>) che attualmente interessano\u00a0<strong class=\"rb fm\">applicazioni, software e hardware<\/strong>, non copre il\u00a0<a class=\"au jt\" href=\"https:\/\/www.ivanti.com\/blog\/48-285-vulnerabilities-beyond-the-nvd-an-ivanti-research-update\" target=\"_blank\" rel=\"noopener ugc nofollow\">20% delle esposizioni possibili.<\/a>\u00a0Ma\u00a0<strong class=\"rb fm\">non \u00e8 solo il NVD a\u00a0<\/strong>mancare di pezzi critici nel puzzle delle vulnerabilit\u00e0. Il\u00a0<strong class=\"rb fm\">Ransomware Spotlight Report 2022\u00a0<\/strong>ha rilevato che tre dei pi\u00f9\u00a0<strong class=\"rb fm\">popolari scanner di vulnerabilit\u00e0 \u2014\u00a0<\/strong>Nessus, Quals e Nexpose<strong class=\"rb fm\">\u00a0<\/strong>\u2014 hanno individuato solo il\u00a0<strong class=\"rb fm\">77%<\/strong>\u00a0di tutte le vulnerabilit\u00e0 sfruttabili nel 2021.<\/p>\n<p id=\"7b49\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Quindi si consiglia di integrare\u00a0<strong class=\"rb fm\">diverse fonti di vulnerabilit\u00e0<\/strong>\u00a0\u2014 molteplici database (NVD, CISA, MITRE, Exploit Database e Packet Storm ecc.), test di penetrazione umani, autorit\u00e0 dei numeri CVE (CNA) e persino comunit\u00e0 online \u2014 per un monitoraggio il pi\u00f9 possibile completo.<\/p>\n\n<ul class=\"\">\n \t<li id=\"c6fa\" class=\"sm sn pd rb b rc rd rf rg ri so rm sp rq sq ru sr ss st su dq\" data-selectable-paragraph=\"\"><strong class=\"rb fm\">prioritizzazione delle vulnerabilit\u00e0<\/strong><\/li>\n<\/ul>\n<p id=\"2547\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Non \u00e8 detto che ogni vulnerabilit\u00e0 debba essere rimediata in quanto critica!\u00a0<strong class=\"rb fm\">Un\u2019adeguata prioritizzazione delle risorse e dell\u2019implementazione delle patch\u00a0<\/strong>(le \u201cpezze\u201d rilasciate per la correzione dei problemi del software) \u00e8 fondamentale per ogni strategia di cybersecurity.<\/p>\n<p id=\"d8ea\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Da un lato si potrebbe essere tentati di\u00a0<strong class=\"rb fm\">correggere e sanare tutte le vulnerabilit\u00e0<\/strong>\u00a0garantendo la massima copertura al proprio ambiente, ma le segnalazioni rischiano di eccedere la\u00a0<strong class=\"rb fm\">capacit\u00e0 di intervento dei reparti IT<\/strong>\u00a0delle aziende e di sprecare in modo inefficiente il budget destinato alla sicurezza. D\u2019altra parte, sistemare solo le vulnerabilit\u00e0 ad alto rischio ci lascerebbe esposti ad\u00a0<strong class=\"rb fm\">altre vulnerabilit\u00e0<\/strong>.<\/p>\n<p id=\"2fc3\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">La sfida \u00e8 trovare il giusto bilanciamento tra le diverse opzioni a partire da un\u2019analisi di quelle che sono\u00a0<strong class=\"rb fm\">le risorse<\/strong>\u00a0<strong class=\"rb fm\">business-critical.<\/strong><\/p>\n\n<ul class=\"\">\n \t<li id=\"866a\" class=\"sm sn pd rb b rc rd rf rg ri so rm sp rq sq ru sr ss st su dq\" data-selectable-paragraph=\"\"><strong class=\"rb fm\">automazione degli interventi di rimediazione<\/strong><\/li>\n<\/ul>\n<p id=\"7504\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Dato che il rischio zero \u00e8 praticamente impossibile, con la corretta definizione delle priorit\u00e0 e il supporto dell\u2019automazione, i team IT possono\u00a0<strong class=\"rb fm\">mantenere le vulnerabilit\u00e0 a un livello gestibile\u00a0<\/strong>e prendersi cura di quelle che presentano il maggior rischio per l\u2019organizzazione.<\/p>\n<p id=\"7591\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Esistono, infatti, strumenti che applicano\u00a0<strong class=\"rb fm\">automaticamente gli aggiornamenti e le patch<\/strong>\u00a0a\u00a0<strong class=\"rb fm\">sistemi e dispositivi vulnerabili<\/strong>\u00a0che possono essere un valido supporto. Per quelle vulnerabilit\u00e0 per le quali le patch non sono applicabili, l\u2019automazione permette al personale di concentrarsi sulla\u00a0<strong class=\"rb fm\">stesura di piani di mitigazione<\/strong>\u00a0per minimizzare le possibilit\u00e0 che possano essere sfruttate.<\/p>\n\n<h2 id=\"e1fe\" class=\"rv rw pd bn dr rx ry rz fq sa sb sc fu qe sd qf fy qh se qi gc qk sf ql gg sg dq\"><strong class=\"ba\">La gestione uniforme della sicurezza delle postazioni<\/strong><\/h2>\n<p id=\"7234\" class=\"pw-post-body-paragraph qz ra pd rb b rc sh fo re rf si fs rh ri sj rk rl rm sk ro rp rq sl rs rt ru kr dq\" data-selectable-paragraph=\"\">Con un\u00a0<strong class=\"rb fm\">uso sempre pi\u00f9 diffuso e sofisticato<\/strong>\u00a0di dispositivi in mobilit\u00e0, \u00e8 difficile garantire la distribuzione di criteri di accesso e sicurezza rigorosi: il tema della sicurezza delle postazioni digitali (<strong class=\"rb fm\"><a href=\"https:\/\/wegg.it\/work-from-anywhere\/workplace-security\/\">Workplace Security<\/a><\/strong>)\u00a0\u00e8 di importanza fondamentale.<\/p>\n<p id=\"6cfb\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Bisogna riuscire a\u00a0<strong class=\"rb fm\">distribuire<\/strong>\u00a0<strong class=\"rb fm\">un insieme comune di criteri di identit\u00e0 e accesso<\/strong>\u00a0per tutti i device utilizzati da ciascun dipendente. Le sfide sono molte: perimetro allargato, sistemi di gestione differenti, criteri applicati a macchia di leopardo.<\/p>\n<p id=\"c888\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">L\u2019approccio pi\u00f9 semplice \u00e8 quello di\u00a0<strong class=\"rb fm\">centralizzare la gestione della sicurezza<\/strong>\u00a0in un\u2019unica piattaforma di\u00a0<strong class=\"rb fm\">gestione dei device<\/strong>: in questo modo\u00a0<strong class=\"rb fm\">qualsiasi modifica allo stato dell\u2019utente o ai diritti di accesso<\/strong>\u00a0non richiede pi\u00f9 interventi, con un maggiore dispendio di risorse e una maggiore probabilit\u00e0 di errori.<\/p>\n<p id=\"7edd\" class=\"pw-post-body-paragraph qz ra pd rb b rc rd fo re rf rg fs rh ri rj rk rl rm rn ro rp rq rr rs rt ru kr dq\" data-selectable-paragraph=\"\">Il vantaggio principale \u00e8 quello di poter assicurare\u00a0<strong class=\"rb fm\">l\u2019aderenza delle configurazioni e dei criteri di accesso alle policy di sicurezza<\/strong>\u00a0definiti dall\u2019azienda, riducendo l\u2019esposizione agli attacchi.<\/p>\n<p id=\"f7d7\" class=\"pw-subtitle-paragraph jw iy iz bn b jx jy jz ka kb kc kd ke kf kg kh ki kj kk kl km kn co\"><em>*L&#8217;articolo, a firma Camilla Bottin, \u00e8 stato originariamente pubblicato su <a href=\"https:\/\/medium.com\/catobistrategy\/leverywhere-workplace-%C3%A8-sotto-attacco-935d502075bb\" rel=\"dofollow\">Catobium &#8211; Il Magazine dei Writers di Catobi.\u00a0<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4c0349\" data-id=\"d4c0349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a6278 elementor-widget elementor-widget-text-editor\" data-id=\"54a6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondimenti<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb23 elementor-grid-1 elementor-posts--thumbnail-none elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"6dceb23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;1&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42682 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-service-experience category-live-event tag-low-code tag-mendix\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/partecipa-con-wegg-al-connect-italy-alla-ducati-factory\/\" >\n\t\t\t\tPartecipa con WEGG\u00a0al\u00a0Mendix\u00a0Connect\u00a0Italy\u00a0alla Ducati\u00a0Factory!\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-39418 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-digitalizzazione-processi category-facilitare-adozione-digitale tag-contratto-prematrimoniale-tecnologico tag-digitalizzazione-processi-aziendali tag-gestione-separazione-tecnologica tag-mendix-piattaforma-low-code tag-migrazione-applicazioni-low-code tag-piattaforme-no-code tag-prevenzione-vendor-lock-in tag-proprieta-intellettuale-applicazioni tag-software-selection tag-vendor-lock-in\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/il-contratto-prematrimoniale-nel-divorzio-tecnologico-come-prevenire-il-vendor-lock-in\/\" >\n\t\t\t\tIl contratto prematrimoniale nel divorzio tecnologico: come prevenire il vendor lock-in\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32951 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-riduzione-non-conformita category-riduzione-spesa-it category-spend-optimization tag-compliance tag-licensing tag-licenze-java tag-oracle-java tag-software-asset-management tag-sottoscrizione tag-spend-optimization\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/licenze-java-quando-fare-una-sottoscrizione\/\" >\n\t\t\t\tLicenze Java, quando \u00e8 richiesta una sottoscrizione?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38386 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-digital-service-experience category-digitalizzazione-processi category-facilitare-adozione-digitale category-migliorare-erogazione-servizi category-process-automation category-riduzione-attivita-manuali category-semplificazione-utilizzo-postazioni tag-adozione-mendix tag-automazione-ciclo-sviluppo tag-continuita-sviluppo-it tag-efficienza-team-it tag-gestione-risorse-it tag-innovazione-software-aziendale tag-low-code-piattaforme tag-migliorare-risposta-it-aziendale tag-ottimizzare-sviluppo-software tag-ottimizzazione-processi-it tag-progetti-sviluppo-agili tag-riduzione-discontinuita-sviluppo tag-strategie-sviluppo-software tag-sviluppo-applicazioni-aziendali tag-sviluppo-collaborativo-low-code\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/robustezza-e-resilienza-del-parco-applicativi-imperativi-strategici-per-proteggere-e-far-crescere-il-business\/\" >\n\t\t\t\tRobustezza e resilienza: imperativi strategici per proteggere e far crescere il business\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42152 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti tag-assistenza-tecnica tag-customer-care tag-service-manager\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/misurare-per-migliorare-il-nostro-approccio-alla-soddisfazione-del-cliente\/\" >\n\t\t\t\tMisurare per migliorare: il nostro approccio alla soddisfazione del cliente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24785 post type-post status-publish format-standard has-post-thumbnail hentry category-allestimento-postazioni-digitali category-approfondimenti category-work-from-anywhere category-workplace-management tag-everywhere-workplace tag-lavoro-agile tag-lavoro-remoto tag-mobile-device tag-postazioni-agili tag-smart-working\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/everywhere-workplace-come-creare-ambienti-di-lavoro-agili\/\" >\n\t\t\t\tEverywhere Workplace: come creare ambienti di lavoro agili\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc87895 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc87895\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6f41e\" data-id=\"7e6f41e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01244f8 elementor-widget elementor-widget-image\" data-id=\"01244f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/04\/02-s-pattern02.png\" title=\"02-s pattern02\" alt=\"02-s pattern02\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1655px; --smush-placeholder-aspect-ratio: 1655\/388;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb98fd6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cb98fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32d69c elementor-widget elementor-widget-heading\" data-id=\"f32d69c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorresti mitigare il rischio informatico?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20b313 elementor-widget elementor-widget-heading\" data-id=\"a20b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTATTACI PER APPROFONDIRE!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe88395 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fe88395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372754d elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"372754d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contattaci per una consulenza\" aria-label=\"Contattaci per una consulenza\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"25530\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"372754d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"25530\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCognome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_298f6a1 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_298f6a1\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_298f6a1]\" id=\"form-field-field_298f6a1\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_fa5f1b6 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_fa5f1b6\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNumero di Telefono:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_fa5f1b6]\" id=\"form-field-field_fa5f1b6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c83c665 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c83c665\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tRuolo aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c83c665]\" id=\"form-field-field_c83c665\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tSpiegaci meglio la tua situazione:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_687c4cc elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_687c4cc]\" id=\"form-field-field_687c4cc\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_687c4cc\">Ho preso visione dell'<a href=\"https:\/\/wegg.it\/privacy-policy\">informativa privacy<\/a> di WEGG e acconsento il trattamento dei miei dati.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_ea8ed71 elementor-col-100\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_ea8ed71]\" id=\"form-field-field_ea8ed71\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-field_ea8ed71\">Voglio rimanere in contatto con WEGG e ricevere contenuti gratuiti.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d2bf274]\" id=\"form-field-field_d2bf274\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Invia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Come si fa a tutelare sistemi e postazioni dal rischio informatico nell&#8217;epoca dell&#8217;Everywhere Workplace?<\/p>","protected":false},"author":8828,"featured_media":22832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[101,14,99,71,72],"tags":[130,128,129,126,127],"class_list":["post-25530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-abilitazione-sicura-postazioni","category-approfondimenti","category-protezione-dei-dati","category-work-from-anywhere","category-workplace-security","tag-patching","tag-rischio-informatico","tag-vulnerability-management","tag-work-from-anywhere","tag-workplace-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG<\/title>\n<meta name=\"description\" content=\"Nell&#039;Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wegg.it\/eng\/everywhere-workplace-tutelarsi-rischio-informatico\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG\" \/>\n<meta property=\"og:description\" content=\"Nell&#039;Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wegg.it\/eng\/everywhere-workplace-tutelarsi-rischio-informatico\/\" \/>\n<meta property=\"og:site_name\" content=\"WEGG\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-27T13:16:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-02T09:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camilla Bottin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camilla Bottin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/\"},\"author\":{\"name\":\"Camilla Bottin\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\"},\"headline\":\"Everywhere Workplace: come tutelarsi dal rischio informatico\",\"datePublished\":\"2022-07-27T13:16:28+00:00\",\"dateModified\":\"2024-02-02T09:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/\"},\"wordCount\":879,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg\",\"keywords\":[\"patching\",\"rischio informatico\",\"vulnerability management\",\"work from anywhere\",\"workplace security\"],\"articleSection\":[\"Abilitazione sicura postazioni\",\"Approfondimenti\",\"Protezione dei dati\",\"Work From Anywhere\",\"Workplace Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/\",\"url\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/\",\"name\":\"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG\",\"isPartOf\":{\"@id\":\"https:\/\/www.wegg.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg\",\"datePublished\":\"2022-07-27T13:16:28+00:00\",\"dateModified\":\"2024-02-02T09:47:44+00:00\",\"description\":\"Nell'Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.\",\"breadcrumb\":{\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg\",\"width\":1920,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wegg.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everywhere Workplace: come tutelarsi dal rischio informatico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wegg.it\/#website\",\"url\":\"https:\/\/www.wegg.it\/\",\"name\":\"WEGG\",\"description\":\"The Impact factory\",\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wegg.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wegg.it\/#organization\",\"name\":\"WEGG\",\"url\":\"https:\/\/www.wegg.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"width\":968,\"height\":236,\"caption\":\"WEGG\"},\"image\":{\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\",\"name\":\"Camilla Bottin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"caption\":\"Camilla Bottin\"},\"url\":\"https:\/\/wegg.it\/eng\/author\/cbottin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG","description":"Nell'Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wegg.it\/eng\/everywhere-workplace-tutelarsi-rischio-informatico\/","og_locale":"en_US","og_type":"article","og_title":"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG","og_description":"Nell'Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.","og_url":"https:\/\/wegg.it\/eng\/everywhere-workplace-tutelarsi-rischio-informatico\/","og_site_name":"WEGG","article_published_time":"2022-07-27T13:16:28+00:00","article_modified_time":"2024-02-02T09:47:44+00:00","og_image":[{"width":1920,"height":467,"url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg","type":"image\/jpeg"}],"author":"Camilla Bottin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camilla Bottin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#article","isPartOf":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/"},"author":{"name":"Camilla Bottin","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89"},"headline":"Everywhere Workplace: come tutelarsi dal rischio informatico","datePublished":"2022-07-27T13:16:28+00:00","dateModified":"2024-02-02T09:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/"},"wordCount":879,"commentCount":0,"publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"image":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg","keywords":["patching","rischio informatico","vulnerability management","work from anywhere","workplace security"],"articleSection":["Abilitazione sicura postazioni","Approfondimenti","Protezione dei dati","Work From Anywhere","Workplace Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/","url":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/","name":"Everywhere Workplace: come tutelarsi dal rischio informatico - WEGG","isPartOf":{"@id":"https:\/\/www.wegg.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage"},"image":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg","datePublished":"2022-07-27T13:16:28+00:00","dateModified":"2024-02-02T09:47:44+00:00","description":"Nell'Everywhere Workplace, come possono le aziende e i team IT tutelare i loro sistemi e le loro postazioni dal rischio informatico.","breadcrumb":{"@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#primaryimage","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/01-e2-TESTATA-1.jpg","width":1920,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/wegg.it\/everywhere-workplace-tutelarsi-rischio-informatico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wegg.it\/"},{"@type":"ListItem","position":2,"name":"Everywhere Workplace: come tutelarsi dal rischio informatico"}]},{"@type":"WebSite","@id":"https:\/\/www.wegg.it\/#website","url":"https:\/\/www.wegg.it\/","name":"WEGG","description":"The Impact factory","publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wegg.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.wegg.it\/#organization","name":"WEGG","url":"https:\/\/www.wegg.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","width":968,"height":236,"caption":"WEGG"},"image":{"@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory"]},{"@type":"Person","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89","name":"Camilla Bottin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","caption":"Camilla Bottin"},"url":"https:\/\/wegg.it\/eng\/author\/cbottin\/"}]}},"_links":{"self":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/25530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/users\/8828"}],"replies":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/comments?post=25530"}],"version-history":[{"count":18,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/25530\/revisions"}],"predecessor-version":[{"id":36677,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/25530\/revisions\/36677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media\/22832"}],"wp:attachment":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media?parent=25530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/categories?post=25530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/tags?post=25530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}