{"id":40518,"date":"2018-04-10T10:57:49","date_gmt":"2018-04-10T08:57:49","guid":{"rendered":"https:\/\/www.retarus.com\/it\/protect-your-company-now\/"},"modified":"2023-11-28T13:34:29","modified_gmt":"2023-11-28T12:34:29","slug":"protect-your-company-now","status":"publish","type":"lp","link":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/","title":{"rendered":"Proteggete la vostra azienda. Adesso."},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9…","protected":false},"author":3,"featured_media":40538,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|desktop\" module_id=\"email-sec-lp\" _builder_version=\"3.22\" custom_padding=\"|-110px||\" custom_padding_tablet=\"50px||50px|\" custom_padding_phone=\"\"][et_pb_row module_class=\"url_link\" _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Language link\" _builder_version=\"3.27.4\"]IT<\/a>\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_css_after=\"#post-40322 .et_pb_section .et_pb_column_1_3{ margin-right: 0; }\" custom_padding__hover=\"|||\"][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][et_pb_text admin_label=\"Die 10 peinlichsten E-Mail Security Pannen\" _builder_version=\"4.8.1\"]

I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail<\/h1>[\/et_pb_text][et_pb_video src=\"https:\/\/youtu.be\/6EVy1W6u1fQ\" admin_label=\"Video 10\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#10\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 10<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Hackern\" _builder_version=\"4.8.1\"]

Un\u2019intera infrastruttura IT paralizzata dagli hacker.
Ferie forzate per tutti.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"ATP\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker. Con Retarus Advanced Threat Protection i file sospetti presenti negli allegati, oltre agli altri controlli a cui sono sottoposti, vengono eseguiti in una macchina virtuale per verificare la presenza di comportamenti insoliti. Dopo questo Sandboxing,<\/a> le e-mail rilevate come infette vengono eliminate o messe in quarantena. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo e come potrete aumentare il vostro livello di protezione con Retarus Advanced Threat Protection.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/_J23U7looLo\" admin_label=\"Video 9\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#9\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 9<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Der CSO hat die Ransomware\" _builder_version=\"4.8.1\"]

Il direttore della sicurezza informatica ha aperto il ransomware contenuto in un allegato.
Tutti i computer sono stati bloccati.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Kann jedem mal passieren\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Pu\u00f2 succedere a chiunque, ma non dovrebbe. Pertanto, \u00e8 bene prevenire tali attacchi estorsivi fin dall\u2019inizio. Per esempio, con Retarus Attachment Blocker<\/a>, che impedisce l\u2019apertura di allegati precedentemente definiti come dannosi. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/sWnPnRdd6Pg\" admin_label=\"Video 8\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#8\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 8<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Chef-Trick\" _builder_version=\"3.27.4\"]

Il direttore finanziario trasferisce 20 mila\r\n euro ad un falso CEO.\r\n Il truffatore si diverte. Il CEO no!<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Kein Wunder!\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Non c\u2019\u00e8 da meravigliarsi! Gli aggressori che si avvalgono dello spear phishing raccolgono specificamente informazioni sulle loro vittime per poi persuaderle a trasferire denaro via e-mail. Retarus CxO Fraud Detection<\/a> riconosce gli indirizzi dei mittenti falsificati e mette in quarantena i messaggi fraudolenti. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/6W2nwSOOD_A\" admin_label=\"Video 7\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#7\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 7<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Admin\" _builder_version=\"4.8.1\" hover_enabled=\"0\" sticky_enabled=\"0\"]

L\u2019amministratore informatico pensava che un antivirus fosse sufficiente.
Invece, tutti i computer sono stati infettati.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Rund 270 neue Virenvarianten\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Ogni giorno vengono create circa 322.000 nuove varianti di virus. Pertanto, vale la pena controllare i messaggi in arrivo con tutti i mezzi disponibili. Retarus AntiVirus MultiScan,<\/a> grazie a un massimo di quattro engine disponibili, raggiunge tassi di riconoscimento significativamente pi\u00f9 alti rispetto agli scanner convenzionali. Retarus utilizza anche il sandboxing e metodi di analisi brevettati per proteggere dal malware precedentemente sconosciuto. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/KycoaWM4zaw\" admin_label=\"Video 6\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#6\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 6<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Scanner\" _builder_version=\"3.27.4\"]

Nonostante gli scanner, un virus \u00e8 penetrato nella rete.\r\n Un anno dopo sono iniziate le infezioni.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Schadprogramme\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

I malware nuovi di zecca sono inizialmente sconosciuti anche ai migliori scanner antivirus. Retarus Patient Zero Detection<\/a> segnala la presenza di malware e phishing anche nel caso di e-mail gi\u00e0 recapitate. PZD Real Time Response pu\u00f2 anche eliminarli automaticamente dalle caselle di posta prima che sia troppo tardi. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/uDnLAeKg0Dw\" admin_label=\"Video 5\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#5\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 5<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Kunden fl\u00f6ten\" _builder_version=\"3.27.4\"]

Prima sono stati persi i dati dei clienti.\r\n Poi i clienti stessi.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Datenbanken\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Attraverso il phishing, gli hacker ottengono prima l\u2019accesso alle credenziali personali, poi a dati sensibili ed infine al sistema. Pertanto, impedite in tempo reale ai vostri dipendenti di aprire pagine di siti web non affidabili. Retarus Time-of-Click Protection<\/a> controlla continuamente gli indirizzi web all\u2019interno delle e-mail, blocca le pagine web sospette e avvisa immediatamente i vostri dipendenti quando vi cliccano sopra. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/Chm7ZNGHy1M\" admin_label=\"Video 4\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#4\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 4<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Top Secret\" _builder_version=\"3.27.4\"]

Il progetto di fabbricazione era top secret.\r\n Ora \u00e8 finito in mano alla concorrenza.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"DLP\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

La perdita di progetti, piani o documenti contrattuali sono una minaccia costante per l\u2019esistenza di qualsiasi azienda. Retarus Data Loss Prevention<\/a> impedisce che informazioni riservate come i dati dei clienti, finanziari o di progettazione fuoriescano involontariamente dalla vostra rete aziendale. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/akS_T5sGTd8\" admin_label=\"Video 3\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#3\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 3<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Einkaufchef\" _builder_version=\"3.27.4\"]

Il responsabile degli acquisti \u00e8 stato ingannato dal phishing.\r\n Conto aziendale prosciugato.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Phishing\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Attraverso il phishing, gli hacker ottengono prima l\u2019accesso alle credenziali personali, poi a dati sensibili ed infine al sistema. Pertanto, impedite ai vostri dipendenti di aprire direttamente le pagine di siti non affidabili. Retarus Time-of-Click Protection<\/a> controlla continuamente gli indirizzi web all\u2019interno delle e-mail, blocca le pagine web sospette e avvisa immediatamente gli utenti quando vi cliccano sopra. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/XM3WPHiPMDM\" admin_label=\"Video 2\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#2\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 2<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Asian Office\" _builder_version=\"3.27.4\"]

Qualcuno ha inviato dati riservati alla sede asiatica.\r\n Ma non esiste una sede asiatica!<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Domain-Spoofing\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Con il phishing, i truffatori impersonano identit\u00e0 affidabili per ottenere dati sensibili. Con le funzioni di\u00a0 Retarus Advanced Threat Protection,<\/a> impedite in modo affidabile che i vostri utenti si facciano ingannare. Speciali algoritmi rilevano il \u201cfrom-spoofing\u201d e il \u201cdomain-spoofing\u201d e identificano cos\u00ec gli indirizzi dei mittenti falsificati. Le e-mail fasulle vengono spostate in quarantena o cancellate immediatamente. Saremo lieti di spiegarvi di persona<\/a> come funziona esattamente questo processo.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_video src=\"https:\/\/youtu.be\/6eXiPAxCXhg\" admin_label=\"Video 1\" _builder_version=\"3.0.106\"][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"#1\" module_class=\"email-sec-lp-count\" _builder_version=\"4.8.1\" text_text_color=\"#16a086\"]

N. 1<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Datenklau\" _builder_version=\"4.8.1\"]

Due giorni di stop completo dell\u2019attivit\u00e0.\r\n E, per giunta, cattiva stampa.<\/h2>[\/et_pb_text][et_pb_text admin_label=\"Email Infrastruktur\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"4.8.1\" text_font_size=\"18px\"]

Ci sono molte ragioni per adottare un approccio olistico e aumentare il livello di protezione della propria infrastruttura e-mail. Molte di esse vengono purtroppo comprese fino in fondo solo quando \u00e8 gi\u00e0 troppo tardi! Con l\u2019innovativa Retarus Secure Email Platform<\/a> potete fare in modo che questo non accada e che le vostre comunicazioni procedano senza intoppi in ogni momento. Contattateci<\/a> per scoprire quale pacchetto si adatta meglio alle specifiche esigenze di comunicazione della vostra azienda.<\/p>[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.23.4\" height=\"35px\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" custom_padding_last_edited=\"off|phone\" disabled_on=\"off|off|off\" _builder_version=\"3.25\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_blurb use_icon=\"on\" font_icon=\"%%519%%\" icon_color=\"#16a086\" use_icon_font_size=\"on\" icon_font_size=\"105\" _builder_version=\"3.0.106\" header_font_size=\"16\" animation=\"off\"][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"3.25\" custom_padding=\"|||50px\" custom_padding_tablet=\"\" custom_padding_phone=\"|||0px\" custom_padding_last_edited=\"on|phone\" custom_padding__hover=\"|||\"][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][et_pb_text admin_label=\"Sch\u00fctzen Sie Ihr Unternehmen\" module_class=\"cc-seccomp email-sec-lp-text\" _builder_version=\"3.27.4\" text_font_size=\"18px\"]

Proteggete la vostra azienda. Adesso.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Contact Form\" module_id=\"contactform\" module_class=\"cc-seccomp \" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" module_alignment=\"left\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" use_border_color=\"off\"][gravityform id=\"24\" title=\"false\" description=\"false\" ajax=\"true\"]\r\n [\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|on\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" disabled=\"on\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_image src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/0-email-fails.jpg\" align_tablet=\"center\" align_phone=\"\" align_last_edited=\"on|desktop\" _builder_version=\"3.23\" always_center_on_mobile=\"on\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|on\" _builder_version=\"3.25\" background_color=\"#efefef\" disabled=\"on\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text _builder_version=\"3.27.4\" text_text_color=\"#16a086\"]

Proteggete la vostra azienda. Adesso.<\/h2>\r\n [\/et_pb_text][et_pb_text admin_label=\"Contact Form\" module_id=\"contactform\" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" background_layout=\"dark\" module_alignment=\"left\" use_border_color=\"off\"][content type=contblock name=general-contact-form]\r\n [\/et_pb_text][et_pb_divider show_divider=\"off\" disabled_on=\"on|on|off\" _builder_version=\"3.23.4\" height=\"10px\" hide_on_mobile=\"on\"][\/et_pb_divider][et_pb_divider show_divider=\"off\" _builder_version=\"3.2\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[2088,2],"tags":[],"class_list":["post-40518","lp","type-lp","status-publish","has-post-thumbnail","hentry","category-campaign","category-security"],"acf":[],"yoast_head":"\nProteggete la vostra azienda - Email Security di Retarus<\/title>\n<meta name=\"description\" content=\"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proteggete la vostra azienda - Email Security di Retarus\" \/>\n<meta property=\"og:description\" content=\"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Italia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/retarus\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T12:34:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Proteggete la vostra azienda - Email Security di Retarus\" \/>\n<meta name=\"twitter:description\" content=\"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.\" \/>\n<meta name=\"twitter:site\" content=\"@retarus\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/\",\"url\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/\",\"name\":\"Proteggete la vostra azienda - Email Security di Retarus\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png\",\"datePublished\":\"2018-04-10T08:57:49+00:00\",\"dateModified\":\"2023-11-28T12:34:29+00:00\",\"description\":\"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png\",\"contentUrl\":\"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png\",\"width\":1250,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proteggete la vostra azienda. Adesso.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/it\/#website\",\"url\":\"https:\/\/www.retarus.com\/it\/\",\"name\":\"Retarus Italia\",\"description\":\"Just another Retarus Global Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Proteggete la vostra azienda - Email Security di Retarus","description":"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/","og_locale":"it_IT","og_type":"article","og_title":"Proteggete la vostra azienda - Email Security di Retarus","og_description":"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.","og_url":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/","og_site_name":"Retarus Italia","article_publisher":"https:\/\/www.facebook.com\/retarus","article_modified_time":"2023-11-28T12:34:29+00:00","og_image":[{"width":1250,"height":500,"url":"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Proteggete la vostra azienda - Email Security di Retarus","twitter_description":"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.","twitter_site":"@retarus","twitter_misc":{"Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/","url":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/","name":"Proteggete la vostra azienda - Email Security di Retarus","isPartOf":{"@id":"https:\/\/www.retarus.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png","datePublished":"2018-04-10T08:57:49+00:00","dateModified":"2023-11-28T12:34:29+00:00","description":"I 10 incidenti pi\u00f9 imbarazzanti per la sicurezza delle e-mail. N. 10: Un\u2019intera infrastruttura IT paralizzata dagli hacker. Ferie forzate per tutti. Proteggete la vostra infrastruttura IT dalle sempre pi\u00f9 intelligenti routine dannose degli hacker.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#primaryimage","url":"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png","contentUrl":"https:\/\/www.retarus.com\/it\/wp-content\/uploads\/sites\/16\/2018\/04\/email-security-fails10.png","width":1250,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/it\/lp\/protect-your-company-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/it\/"},{"@type":"ListItem","position":2,"name":"Proteggete la vostra azienda. Adesso."}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/it\/#website","url":"https:\/\/www.retarus.com\/it\/","name":"Retarus Italia","description":"Just another Retarus Global Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/lp\/40518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/lp"}],"about":[{"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/types\/lp"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/comments?post=40518"}],"version-history":[{"count":13,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/lp\/40518\/revisions"}],"predecessor-version":[{"id":48176,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/lp\/40518\/revisions\/48176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/media\/40538"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/media?parent=40518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/categories?post=40518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/it\/wp-json\/wp\/v2\/tags?post=40518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}