{"id":14939,"date":"2021-08-23T07:00:59","date_gmt":"2021-08-23T05:00:59","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=14939"},"modified":"2021-08-25T15:14:18","modified_gmt":"2021-08-25T13:14:18","slug":"sei-consigli-per-la-sicurezza-informatica","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/it\/sei-consigli-per-la-sicurezza-informatica\/","title":{"rendered":"Sei consigli per la sicurezza informatica"},"content":{"rendered":"<figure id=\"attachment_14940\" aria-describedby=\"caption-attachment-14940\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14940 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\" alt=\"eco - Associazione tedesca dell&#039;industria Internet, sicurezza IT\" width=\"1000\" height=\"752\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg 1000w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-768x578.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-233x175.jpg 233w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-465x350.jpg 465w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-920x692.jpg 920w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019-300x226.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-14940\" class=\"wp-caption-text\">Suggerimenti da eco - Associazione dell'industria di Internet. \u00a9 Depositphotos, alphaspirit<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>I criminali informatici conoscono le lacune di sicurezza comuni e attuali, per esempio sui server di posta elettronica, e cercano specificamente i sistemi che non le hanno ancora chiuse. Circa una societ\u00e0 su cinque ha avuto uno o pi\u00f9 gravi incidenti di sicurezza l'anno scorso, secondo l'eco - Association of the Internet Industry. In circa il 20 per cento di questi incidenti, i criminali informatici avevano <a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DbQW1EatTviuCwqAnRKoECPPn-2Bpt19Gpki5qfnT42hT8sCIcbW5mUAwY5U0oz9lTljmqUAUr03GQO4oDc3oROuo3p3rp3agSeT-2Bn86D2ljOmdXbDWdVFwxQJirHs6ds25rWw1f2-2FrfLZvFRNPpVFPUhTyLI4Cnpl-2BfiJ0ZtSEq0yXLKoy-2FhTyUzt0XUQyf9BjinX18d4jliQRMyb6NlDRK4oeWZVMLYX5QiPdDj1cvk1aO_V_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUWpHM7iaPLioGr72SgCXBP-2Fb2-2BHvCRE46OcHoU-2BkceJp-2B7AHmj7DpMvo3dHxv0Y6JBc-2FVHQC52ZPVkhF75PSt-2FZEC4lvOrONqUyhqmkPcRF0DUiYqVyln2falQjOSxmItnxwt5AzBcW3AdppRXxCOw9-2B726ul-2BaGZQxR1ZJ0Qg-2Fdg-3D-3D\">Software trojan utilizzato<\/a>per estorcere denaro per il riscatto alle aziende in modo che i file criptati vengano rilasciati di nuovo.<\/p>\n<h2><strong>Controllare la sicurezza di tutti i sistemi informatici<\/strong><\/h2>\n<p>\"Se le applicazioni e i dati vengono criptati da trojan di estorsione, i cosiddetti ransomware, e persino i dati dei clienti vengono rubati, allora le aziende subiscono una grave perdita di reputazione. Nel caso peggiore, la situazione pu\u00f2 essere esistenzialmente minacciosa\", dice Markus Schaffrin, esperto di sicurezza informatica e responsabile dei servizi ai membri di eco - Verband der Internetwirtschaft. \"Le aziende devono proteggersi al massimo in ogni momento ed essere in grado di reagire rapidamente se il peggio arriva al peggio\". I manager IT dovrebbero controllare regolarmente la sicurezza di tutti i sistemi IT, specialmente durante le vacanze, e formare e sensibilizzare i loro colleghi. In termini concreti, eco - Verband der Internetwirtschaft e. V. (Associazione dell'industria di Internet) d\u00e0 sei consigli per questo:<\/p>\n<ol>\n<li>Mantenere tutti i sistemi sempre aggiornati. Per fare questo, fate un inventario del software e dei sistemi in uso: Cosa viene usato dove? Quali sistemi sono attualmente in funzione e quali sono stati messi fuori servizio? Definite i processi per gli aggiornamenti regolari e le patch di emergenza e metteteli in pratica con il vostro staff.<\/li>\n<li>Raccogliere proattivamente informazioni su possibili vulnerabilit\u00e0, per esempio dal\u00a0<a href=\"applewebdata:\/\/B37B2A27-8961-461A-B72B-CCD6DB3623BF\/BSI%20-%20Bundesamt%20fu%CC%88r%20Sicherheit%20in%20der%20Informationstechnikwww.bsi.bund.de\">BSI (Ufficio federale per la sicurezza delle informazioni)<\/a>\u00a0e\u00a0<a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DaOjDYW4RhLud9EcNbVQ2HW56j-2B78iheXvsdvl1W4mVSJeBr_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUVbpHPfOD0NkvMLeBYz-2BNJZ055CDKhey7YwrscSxSkWrnoshneMfsFwUDV6SUB6ucKmpCDV7xkIzX-2F2lVedO3G6QifHeDWVpMsZmmk6I4vArOu14TTDGWAakjUWvWKxi4LUN4ViBVaTQkmhPib6VOCt6iirZIyKlVHBn0UJMa0bsw-3D-3D\">CERT-Bund<\/a>. Valutare i rischi e classificarli di conseguenza: quali servizi sono pi\u00f9 importanti per la mia azienda, quale impatto hanno le vulnerabilit\u00e0 sul mio business?<\/li>\n<li>Pianificate in anticipo la vostra risposta a una possibile crisi o emergenza. Quasi un'azienda su tre (31%) non ha ancora stabilito un piano di emergenza per rispondere adeguatamente. Fatelo il prima possibile e informate i dipendenti di conseguenza per limitare o prevenire i danni alle organizzazioni, alle aziende o agli individui.<\/li>\n<li>Aumenta regolarmente la consapevolezza del tuo staff sui pericoli informatici, come quelli posti dagli attacchi di phishing. Educare regolarmente i dipendenti e costruire competenze adeguate affinch\u00e9 i loro colleghi reagiscano correttamente in caso di dubbio. Con una formazione regolare, mantieni alta la consapevolezza della sicurezza e dei pericoli informatici nella cultura aziendale.<\/li>\n<li>Usare password forti secondo il <a href=\"http:\/\/link.mediaoutreach.meltwater.com\/ls\/click?upn=tBgUFXc4cNv26XYmXro7DbQW1EatTviuCwqAnRKoECPPn-2Bpt19Gpki5qfnT42hT8sCIcbW5mUAwY5U0oz9lTliC3zbqR6aw35V-2BKyXyvpJZiPzJWAO-2FkMWLKhL9UlD9Zz3N1y26tT-2F8Zk7VP8xCrkxCZ8GNDiJ3PbQW7YBd-2Bj7sGBxWu9h-2F-2FG0LnyU4OkulfWyb7Nz2c6JNsU3zJJ-2Fl1e12y-2BdtZpu4Bg87kjdDn-2FemGy53b06W4hM6VOzBysW42V06N9gfxCWD0GfaeTdjPJNjZPAhFT8xJxYfZTqMO4fArARguvAivp13Ew7hFa9cme6eA_TCZ3FQTm-2Beo2X3vwx2Homw0sknNUn-2FwGk1O82R6mTjIPU7SqLnHq6oRVyM-2BfOgUaPSl86Cb6himg7CaWQguJODN2nw1O-2FwrkUYTZsDtR53Xaf3FsEemsFF1D0oM96I4Emf7HEeY4RTptvhaegPT-2F7lRAI25CXjSvk4xCc-2F-2FzjK5oipfUDF-2FphWmUMAbZ16sT1PP4sTT917i4QttFA7mUgsgybb1C80uPmzllrlcQjUVo6ErtPW6YJX7kz-2Fb-2FVuuF6gTh-2FHFH9LyWBzNPHVfJZnTsa-2Fe5zCKwangGbQHzzAE4BK5dH7E-2Fd6QqtFLen-2BsW9MZ-2F8q2rq72qTCPLkRqTVjj5H5s2dz4zj10C1Q-2BGU23raQ217R0r7Clg3JBzmoJXkIQnROUpWAW-2BIcUmUB-2BRhw-3D-3D\">Raccomandazione del BSI<\/a>Scegliete una password di almeno otto caratteri, usate lettere maiuscole e minuscole, nonch\u00e9 caratteri speciali e numeri. Le password non devono essere scritte, ma solo memorizzate in modo criptato sul computer. Suggerimento: i dispositivi mnemonici possono aiutare a ricordare le password criptiche.<\/li>\n<li>Fate backup regolari, proteggono voi e la vostra azienda dalla perdita di dati, per esempio in caso di incidenti ransomware e danni all'hardware. Le applicazioni per computer, tablet e smartphone rendono il backup possibile per tutti in breve tempo - per esempio tramite soluzioni cloud o archiviazione su dispositivi esterni. Il backup del computer e dei dispositivi mobili dovrebbe diventare un rituale indispensabile come lavarsi i denti ogni giorno.<\/li>\n<\/ol>\n<p><em>Fonte: <a href=\"http:\/\/www.eco.de\">eco - Associazione dell'industria Internet\u00a0<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Altri argomenti:<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"http:\/\/www.m-q.ch\/it\/10-impulsi-per-la-politica-di-sicurezza-informatica\/\">10 Impulsi per la politica di sicurezza informatica<\/a><\/li>\n<li><a href=\"http:\/\/www.m-q.ch\/it\/suissedigital-amplia-il-controllo-della-sicurezza-informatica\/\"><em>Suissedigital espande il suo controllo della sicurezza informatica<\/em><\/a><\/li>\n<li><a href=\"http:\/\/www.m-q.ch\/it\/sicurezza-informatica-pericoli-sottovalutati\/\"><em>Sicurezza informatica: pericoli sottovalutati<\/em><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; I criminali informatici sono consapevoli delle vulnerabilit\u00e0 di sicurezza comuni e attuali, ad esempio nei server di posta elettronica, e sono alla ricerca specifica di sistemi che non le hanno ancora chiuse. Secondo eco - Association of the Internet Industry, l'anno scorso circa un'azienda su cinque ha subito uno o pi\u00f9 gravi incidenti di sicurezza. In circa il 20% di questi incidenti, i criminali informatici hanno utilizzato software Trojan, [...]<\/p>","protected":false},"author":35,"featured_media":14940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[5104,4499],"class_list":["post-14939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-eco-verband-der-internetwirtschaft","tag-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/it\/sei-consigli-per-la-sicurezza-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/it\/sei-consigli-per-la-sicurezza-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T05:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T13:14:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"752\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Sechs IT-Security-Tipps\",\"datePublished\":\"2021-08-23T05:00:59+00:00\",\"dateModified\":\"2021-08-25T13:14:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"keywords\":[\"eco \u2013 Verband der Internetwirtschaft\",\"IT-Security\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\",\"url\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\",\"name\":\"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"datePublished\":\"2021-08-23T05:00:59+00:00\",\"dateModified\":\"2021-08-25T13:14:18+00:00\",\"description\":\"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg\",\"width\":1000,\"height\":752,\"caption\":\"\u00a9 Depositphotos, alphaspirit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs IT-Security-Tipps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/it\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sei consigli sulla sicurezza IT - MQ Management and Quality","description":"L'eco - Association of the Internet Industry d\u00e0 sei consigli di sicurezza informatica su come proteggersi meglio dai criminali informatici.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/it\/sei-consigli-per-la-sicurezza-informatica\/","og_locale":"it_IT","og_type":"article","og_title":"Sechs IT-Security-Tipps - MQ Management und Qualit\u00e4t","og_description":"Der eco \u2013 Verband der Internetwirtschaft\u00a0gibt sechs IT-Security-Tipps, wie man sich vor Cyberkriminellen besser sch\u00fctzen kann.","og_url":"https:\/\/www.m-q.ch\/it\/sei-consigli-per-la-sicurezza-informatica\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-08-23T05:00:59+00:00","article_modified_time":"2021-08-25T13:14:18+00:00","og_image":[{"width":1000,"height":752,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Roger Str\u00e4ssle","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Sechs IT-Security-Tipps","datePublished":"2021-08-23T05:00:59+00:00","dateModified":"2021-08-25T13:14:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","keywords":["eco \u2013 Verband der Internetwirtschaft","IT-Security"],"articleSection":["Risikomanagement"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/","url":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/","name":"Sei consigli sulla sicurezza IT - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","datePublished":"2021-08-23T05:00:59+00:00","dateModified":"2021-08-25T13:14:18+00:00","description":"L'eco - Association of the Internet Industry d\u00e0 sei consigli di sicurezza informatica su come proteggersi meglio dai criminali informatici.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/sechs-it-security-tipps\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/08\/Depositphotos_11019107_s-2019.jpg","width":1000,"height":752,"caption":"\u00a9 Depositphotos, alphaspirit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/sechs-it-security-tipps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Sechs IT-Security-Tipps"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestione e qualit\u00e0 MQ","description":"Piattaforma per sistemi di gestione integrati.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Fachmedien AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/it\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/14939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/comments?post=14939"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/14939\/revisions"}],"predecessor-version":[{"id":14941,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/14939\/revisions\/14941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/media\/14940"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/media?parent=14939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/categories?post=14939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/tags?post=14939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}