{"id":21412,"date":"2020-04-23T13:37:50","date_gmt":"2020-04-23T11:37:50","guid":{"rendered":"https:\/\/www.kaspersky.it\/blog\/?p=21412"},"modified":"2020-04-23T13:37:50","modified_gmt":"2020-04-23T11:37:50","slug":"awareness-telecommuting","status":"publish","type":"post","link":"https:\/\/www.kaspersky.it\/blog\/awareness-telecommuting\/21412\/","title":{"rendered":"Formare i dipendenti per uno smart working sicuro"},"content":{"rendered":"<p><span data-contrast=\"auto\">I\u00a0<\/span><b><span data-contrast=\"auto\">dipendenti<\/span><\/b><span data-contrast=\"auto\">\u00a0sono l\u2019anello debole di qualsiasi\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/kwts-appliance\/20845\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">sistema di sicurezza aziendale<\/span><\/b><\/a><span data-contrast=\"auto\">. Chiunque abbia il compito di proteggere i sistemi informatici pu\u00f2 confermarlo:\u00a0<\/span><span data-contrast=\"auto\">n<\/span><span data-contrast=\"auto\">on importa quanto sia avanzata una tecnologia di sicurezza, un\u00a0<\/span><b><span data-contrast=\"auto\">dipendente disattento o incauto<\/span><\/b><span data-contrast=\"auto\"> pu\u00f2 sempre <\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/common-smb-mistakes\/21307\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">commettere un errore<\/span><\/b><\/a><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">e mettere a rischio l\u2019infrastruttura. Se di recente si<\/span><span data-contrast=\"auto\">ete<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">passati alla modalit\u00e0<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/work-from-home\/20873\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">smart<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><b><span data-contrast=\"none\">working<\/span><\/b><\/a><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">(come quasi la met\u00e0 della popolazione attual<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">), il margine di errore\u00a0<\/span><span data-contrast=\"auto\">adesso\u00a0<\/span><span data-contrast=\"auto\">\u00e8<\/span><span data-contrast=\"auto\">\u00a0di\u00a0<\/span><span data-contrast=\"auto\">gran lunga<\/span><span data-contrast=\"auto\">\u00a0maggiore.\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Quando\u00a0<\/span><span data-contrast=\"auto\">si<\/span><span data-contrast=\"auto\">\u00a0lavora<\/span><span data-contrast=\"auto\">\u00a0in\u00a0<\/span><b><span data-contrast=\"auto\">ufficio<\/span><\/b><span data-contrast=\"auto\">, i sistemi di protezione e il\u00a0<\/span><b><span data-contrast=\"auto\">personale IT\u00a0<\/span><\/b><span data-contrast=\"auto\">sono l\u00ec per\u00a0<\/span><span data-contrast=\"auto\">sobbarcarsi una<\/span><span data-contrast=\"auto\">\u00a0parte\u00a0<\/span><span data-contrast=\"auto\">de<\/span><span data-contrast=\"auto\">ll\u2019onere<\/span><span data-contrast=\"auto\">. Non \u00e8 una garanzia di perfetta sicurezza, naturalmente, ma almeno la soluzione antivirus dell\u2019azienda bloccher\u00e0 i siti di <\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/phishing-prevalence-effect\/19459\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">phishing<\/span><\/b><\/a><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">e il\u00a0<\/span><b><span data-contrast=\"auto\">team di sicurezza informatica <\/span><\/b><span data-contrast=\"auto\">potr\u00e0<\/span><span data-contrast=\"auto\"> individuare anomalie nel traffico di un dispositivo infetto. <\/span><span data-contrast=\"auto\">Il\u00a0<\/span><span data-contrast=\"auto\">team<\/span><span data-contrast=\"auto\">IT<\/span><span data-contrast=\"auto\">\u00a0installa prontamente gli aggiornamenti per correggere le<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">vulnerabilit\u00e0<\/span><span data-contrast=\"auto\">\u00a0pi\u00f9<\/span><span data-contrast=\"none\">\u00a0recenti<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">I\u00a0<\/span><b><span data-contrast=\"auto\">dipendenti\u00a0<\/span><\/b><span data-contrast=\"auto\">che sono\u00a0<\/span><span data-contrast=\"auto\">passati alla modalit\u00e0 smart\u00a0<\/span><span data-contrast=\"auto\">working<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">ora\u00a0<\/span><span data-contrast=\"auto\">si\u00a0<\/span><span data-contrast=\"auto\">devono occupar<\/span><span data-contrast=\"auto\">e\u00a0<\/span><span data-contrast=\"auto\">di tutt<\/span><span data-contrast=\"auto\">i questi\u00a0<\/span><span data-contrast=\"auto\">aspetti\u00a0e<\/span><span data-contrast=\"auto\">\u00a0anche di altr<\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">. Qui \u00e8 dove la\u00a0<\/span><span data-contrast=\"auto\">cosiddetta \u201c<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/winter-holidays\/16749\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">security\u00a0<\/span><\/b><b><span data-contrast=\"none\">awareness<\/span><\/b><\/a><span data-contrast=\"auto\">\u201d comincia<\/span><span data-contrast=\"auto\"> a svolgere un ruolo molto pi\u00f9 significativo.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Essere\u00a0<\/span><span data-contrast=\"none\">l\u2019<\/span><span data-contrast=\"none\">amministratore IT<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">di s\u00e9 stessi<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Quali\u00a0<\/span><b><span data-contrast=\"auto\">dispositivi<\/span><\/b><span data-contrast=\"auto\">\u00a0utilizzano i vostri dipendenti per\u00a0<\/span><b><span data-contrast=\"auto\">lavorare da casa<\/span><\/b><span data-contrast=\"auto\">? Un\u00a0<\/span><b><span data-contrast=\"auto\">portatile\u00a0<\/span><\/b><span data-contrast=\"auto\">da ufficio in conformit\u00e0 con le politiche aziendali? Ottimo, ma non \u00e8 ancora abbastanza. Quel portatile \u00e8 ora collegato a una\u00a0<\/span><b><span data-contrast=\"auto\">rete domestica <\/span><\/b><span data-contrast=\"auto\">sconosciuta. Quali altri dispositivi sono collegati al\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/hacked-routers-dns-hijacking\/17220\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">router<\/span><\/b><\/a><span data-contrast=\"auto\">? Che tipo di router \u00e8? Quanto \u00e8 forte la sua\u00a0<\/span><b><span data-contrast=\"auto\">password<\/span><\/b><span data-contrast=\"auto\">, chi ha configurato il dispositivo<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">e come? Se il dipendente utilizza un computer di casa personale invece di uno aziendale, non si sa chi altro vi ha accesso, quale\u00a0<\/span><b><span data-contrast=\"auto\">soluzione di sicurezza<\/span><\/b><span data-contrast=\"auto\"> sia installata o se qualcuno si occupi di <\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/office-365-protection-update\/21115\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">aggiornare il sistema operativo<\/span><\/b><\/a><span data-contrast=\"auto\">.\u00a0\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Non stiamo suggerendo che tutti debbano diventare\u00a0<\/span><span data-contrast=\"auto\">de<\/span><span data-contrast=\"auto\">gli\u00a0<\/span><b><span data-contrast=\"auto\">amministratori di sistema<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">professionisti da<\/span><span data-contrast=\"auto\">\u00a0un giorno all\u2019altro, ma\u00a0<\/span><span data-contrast=\"auto\">se si fosse in grado di\u00a0<\/span><span data-contrast=\"auto\">identificare le\u00a0<\/span><b><span data-contrast=\"auto\">minacce\u00a0<\/span><\/b><span data-contrast=\"auto\">e i\u00a0<\/span><b><span data-contrast=\"auto\">punti deboli<\/span><\/b><span data-contrast=\"auto\">\u00a0sarebbe un grande vantaggio per tutti. Questo impedirebbe a<\/span><span data-contrast=\"auto\">i dipendenti<\/span><span data-contrast=\"auto\">\u00a0di connettersi direttamente ai database aziendali se<\/span><span data-contrast=\"auto\">nza<\/span><span data-contrast=\"auto\"> un<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><a href=\"https:\/\/www.kaspersky.it\/blog\/remote-work-security\/21028\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">filtro<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><b><span data-contrast=\"none\">VPN<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0mess<\/span><span data-contrast=\"auto\">o<\/span><span data-contrast=\"auto\"> a disposizione dall\u2019azienda<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">o eviterebbe l\u2019installazione di\u00a0<\/span><span data-contrast=\"auto\">falsi \u201caggiornamenti flash player\u201d e <\/span><span data-contrast=\"auto\">di lasciare\u00a0<\/span><span data-contrast=\"auto\">che\u00a0<\/span><span data-contrast=\"auto\">de<\/span><span data-contrast=\"auto\">gli \u201cesperti\u201d esterni giochino con le impostazioni.<\/span><\/p>\n<h2>Essere il responsabile dati di s\u00e9 stessi<\/h2>\n<p><span data-contrast=\"auto\">Quali\u00a0<\/span><b><span data-contrast=\"auto\">dati\u00a0<\/span><\/b><span data-contrast=\"auto\">utilizzano i vostri dipendenti\u00a0<\/span><span data-contrast=\"auto\">per svolgere\u00a0<\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">l loro<\/span><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><b><span data-contrast=\"auto\">tele<\/span><\/b><b><span data-contrast=\"auto\">lavoro<\/span><\/b><span data-contrast=\"auto\"> quotidiano? Sanno cosa significa effettivamente detenere delle <strong><a href=\"https:\/\/www.kaspersky.it\/blog\/disjointed-work-life-balance\/17685\/\" target=\"_blank\" rel=\"noopener\">informazioni riservate<\/a> <\/strong><\/span><span data-contrast=\"auto\">e quali dati\u00a0<\/span><span data-contrast=\"auto\">costituiscon<\/span><span data-contrast=\"auto\">o un\u00a0<\/span><b><span data-contrast=\"auto\">segreto aziendale<\/span><\/b><span data-contrast=\"auto\">? In un mondo perfetto, lo avrebbero imparato il primo giorno, in ufficio. Tuttavia,\u00a0<\/span><span data-contrast=\"auto\">per un dipendente\u00a0<\/span><span data-contrast=\"auto\">una cosa \u00e8 lavorare con un\u00a0<\/span><b><span data-contrast=\"auto\">elenco di clienti\u00a0<\/span><\/b><span data-contrast=\"auto\">dell\u2019UE su una sottorete di un ufficio isolato,\u00a0<\/span><span data-contrast=\"auto\">un\u2019altra<\/span><span data-contrast=\"auto\">\u00a0completamente divers<\/span><span data-contrast=\"auto\">a \u00e8<\/span><span data-contrast=\"auto\">\u00a0accedere a tali file da casa.\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Dopotutto, quando si lavora da remoto, la possibilit\u00e0 di utilizzare un\u00a0<\/span><span data-contrast=\"none\">tool di collaborazione non monitorato<\/span><span data-contrast=\"auto\">\u00a0e non ufficiale pu\u00f2 essere\u00a0<\/span><span data-contrast=\"auto\">piuttosto<\/span><span data-contrast=\"auto\">\u00a0allettante. Tutti devono avere ben chiaro quali dati possono essere inviati attraverso canali non ufficiali e quali non devono mai lasciare\u00a0<\/span><span data-contrast=\"auto\">la rete indicat<\/span><span data-contrast=\"auto\">a\u00a0<\/span><span data-contrast=\"auto\">in nessuna circostanza.<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Essere\u00a0l\u2019esperto<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">in<\/span><span data-contrast=\"none\">\u00a0sicurezza informatica<\/span><span data-contrast=\"none\">\u00a0di s\u00e9 stessi<\/span><span data-ccp-props='{\"201341983\":0,\"335559738\":40,\"335559739\":0,\"335559740\":259}'>\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Sia i\u00a0<\/span><b><span data-contrast=\"auto\">lavoratori a distanza<\/span><\/b><span data-contrast=\"auto\">, sia<\/span><span data-contrast=\"auto\">\u00a0gli\u00a0<\/span><b><span data-contrast=\"auto\">esperti informatici <\/span><\/b>d<span data-contrast=\"auto\">evono capire che l\u2019attuale pandemia \u00e8 una benedizione per i\u00a0<\/span><b><span data-contrast=\"auto\">cyber<\/span><\/b><b><span data-contrast=\"auto\">criminali<\/span><\/b><b><span data-contrast=\"auto\">.<\/span><\/b><span data-contrast=\"auto\">\u00a0Abbiamo visto ondate di\u00a0<\/span><b><span data-contrast=\"auto\">phishing\u00a0<\/span><\/b><b><span data-contrast=\"auto\">relazionato al\u00a0<\/span><\/b><b><span data-contrast=\"auto\">COVID-19,<\/span><\/b>\u00a0<span data-contrast=\"none\">attacchi di massa o<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">diretti a aziende specifiche<\/span><span data-contrast=\"auto\">. Alcuni truffatori cercano di portare a termine <\/span><span data-contrast=\"none\">attacchi BEC<\/span><span data-contrast=\"auto\">, sperando che i loro messaggi sfuggano a<\/span><span data-contrast=\"auto\">l<\/span><span data-contrast=\"auto\">\u00a0fluss<\/span><span data-contrast=\"auto\">o<\/span><span data-contrast=\"auto\">\u00a0di e<\/span><span data-contrast=\"auto\">-mail<\/span><span data-contrast=\"auto\">\u00a0in aumento\u00a0<\/span><span data-contrast=\"auto\">dovuto\u00a0<\/span><span data-contrast=\"auto\">allo smart<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">working<\/span><span data-contrast=\"auto\">. Le nostre\u00a0<\/span><b><span data-contrast=\"auto\">tecnologie di sicurezza <\/span><\/b><span data-contrast=\"auto\">hanno rilevato infrastrutture aziendali sottoposte a costanti scansioni dall\u2019esterno alla ricerca di\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/vulnerabilities-in-public-clouds\/18112\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">porte RDP<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0aperte<\/span><span data-contrast=\"auto\"> per portare a termine\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/kwts-enterprise-6-1\/19738\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">attacchi mirati.<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0Questo \u00e8 un motivo sufficiente per raddoppiare la vigilanza.<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Come formare i dipendenti in questo scenario\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Innanzitutto, b<\/span><span data-contrast=\"auto\">isogn<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0trasmettere ai\u00a0<\/span><b><span data-contrast=\"auto\">dipendenti<\/span><\/b><span data-contrast=\"auto\">\u00a0l\u2019idea che oggi\u00a0<\/span><span data-contrast=\"auto\">sono<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">pi\u00f9<\/span><span data-contrast=\"auto\">\u00a0responsabili che mai della\u00a0<\/span><b><span data-contrast=\"auto\">sicurezza delle informazioni. <\/span><\/b><span data-contrast=\"auto\">Questo pu\u00f2 sembrarvi ovvio, ma semplicemente\u00a0<\/span><span data-contrast=\"auto\">molte persone\u00a0<\/span><span data-contrast=\"auto\">non\u00a0<\/span><span data-contrast=\"auto\">ci pensano<\/span><span data-contrast=\"auto\">. Inoltre,\u00a0<\/span><span data-contrast=\"auto\">\u00e8 necessario\u00a0<\/span><span data-contrast=\"auto\">aumentate il loro livello di\u00a0<\/span><b><span data-contrast=\"auto\">sensibilizzazione in materia di sicurezza<\/span><\/b><span data-contrast=\"auto\">. Certo, al momento non ci sono\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/rsa2020-generational-divide\/20922\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">sessioni di\u00a0<\/span><\/b><b><span data-contrast=\"none\">formazione in\u00a0<\/span><\/b><b><span data-contrast=\"none\">sicurezza informatica<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0faccia a faccia, ma i nostri programmi\u00a0<\/span><span data-contrast=\"auto\">a distanza compensano ampiamente questo\u00a0<\/span><span data-contrast=\"auto\">inconveniente, programmi che\u00a0<\/span><span data-contrast=\"auto\">aggiorniamo e<\/span><span data-contrast=\"auto\">\u00a0miglioriamo costantemente.\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Il modo pi\u00f9 semplice per impostare la\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/memory-effects-awareness\/19630\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">formazione sulla cybersecurity<\/span><\/b><\/a><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">a distanza \u00e8\u00a0<\/span><span data-contrast=\"auto\">utilizzando la<\/span><span data-contrast=\"auto\">\u00a0nostra\u00a0<\/span><b><span data-contrast=\"auto\">piattaforma<\/span><\/b><span data-contrast=\"auto\"> <a href=\"https:\/\/k-asap.com\/it\/?icid=it_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\"><strong>Kaspersky Automated Security Awareness<\/strong><\/a>. <\/span><span data-contrast=\"auto\">Non <\/span><span data-contrast=\"auto\">solo mantiene<\/span><span data-contrast=\"auto\"> i dipendenti informati sulle ultime minacce, ma insegna anche <\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">contra<\/span><span data-contrast=\"auto\">starle<\/span><span data-contrast=\"auto\">. Inoltre, il manager ha il controllo del processo e pu\u00f2 impostare il programma di formazione a distanza. Le lezioni sono state create da specialisti nel campo dell\u2019educazione e della psicologia, che hanno reso il materiale\u00a0<\/span><span data-contrast=\"auto\">interessante e facile da memo<\/span><span data-contrast=\"auto\">rizzare<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Proprio di recente, i nostri esperti hanno aggiunto due\u00a0<\/span><b><span data-contrast=\"auto\">moduli di formazione<\/span><\/b><span data-contrast=\"auto\">\u00a0sui temi pi\u00f9 rilevanti\u00a0<\/span><span data-contrast=\"auto\">che riguardano i<\/span><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">dati\u00a0<\/span><\/b><b><span data-contrast=\"auto\">riservati<\/span><\/b><span data-contrast=\"auto\">\u00a0e\u00a0<\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">l\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/british-airways-fined\/17604\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">GDPR<\/span><\/b><\/a><span data-contrast=\"auto\">. Il primo \u00e8 destinato ai dipendenti che lavorano con\u00a0<\/span><b><span data-contrast=\"auto\">dati personali,<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">segreti commerciali\u00a0<\/span><\/b><span data-contrast=\"auto\">o<\/span><b><span data-contrast=\"auto\">\u00a0documenti interni.<\/span><\/b><span data-contrast=\"auto\">\u00a0Il secondo \u00e8 per le aziende i cui clienti o dipendenti sono\u00a0<\/span><b><span data-contrast=\"auto\">cittadini dell\u2019UE<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n<p><span data-contrast=\"auto\">Inoltre, i nostri esperti di formazione, insieme ad<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/area9lyceum.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><b><span data-contrast=\"none\">Area9<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><b><span data-contrast=\"none\">Lyceum<\/span><\/b><\/a><b><span data-contrast=\"auto\">,<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">hanno creato un modulo\u00a0<\/span><span data-contrast=\"auto\">complementar<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">\u00a0gratuito che si compone di due parti principali. La prima insegna ai partecipanti\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0organizzare un\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/smart-working-portare-a-casa-il-pc-non-basta\/21167\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">ambiente di lavoro sicuro<\/span><\/b><span data-contrast=\"none\">\u00a0<\/span><b><span data-contrast=\"none\">da casa<\/span><\/b><\/a><span data-contrast=\"auto\">. La seconda non\u00a0<\/span><span data-contrast=\"auto\">riguarda la<\/span><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">sicurezza delle informazioni<\/span><\/b><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-contrast=\"auto\">in s\u00e9<\/span><span data-contrast=\"auto\">, ma\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">piega\u00a0<\/span><span data-contrast=\"auto\">come minimizzare il rischio di contrarre<\/span><span data-contrast=\"auto\">\u00a0il<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.kaspersky.it\/blog\/ginp-trojan-coronavirus-finder\/20973\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">COVID-19<\/span><\/b><\/a><span data-contrast=\"auto\">. Il modulo \u00e8\u00a0<\/span><span data-contrast=\"none\">disponibile <a href=\"https:\/\/go.kaspersky.com\/stay_secure_course.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_KB_nv0092&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_9wzv92bc6olmduz\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">qui<\/a><\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props='{\"201341983\":0,\"335559739\":160,\"335559740\":259}'>\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avete avuto la possibilit\u00e0 di formare i vostri dipendenti con le nozioni base di sicurezza informatica prima di spingere loro a lavorare da casa? <\/p>\n","protected":false},"author":700,"featured_media":21414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"tags":[3261,2190,2427,941,3297,3290,1338],"class_list":{"0":"post-21412","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-coronavirus","9":"tag-formazione","10":"tag-gdpr","11":"tag-prodotti","12":"tag-sensibilizzazione","13":"tag-smart-working","14":"tag-telelavoro"},"hreflang":[{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/awareness-telecommuting\/21412\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/awareness-telecommuting\/20664\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/awareness-telecommuting\/16481\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/awareness-telecommuting\/8124\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/awareness-telecommuting\/21538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/awareness-telecommuting\/19789\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/awareness-telecommuting\/18486\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/awareness-telecommuting\/22491\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/awareness-telecommuting\/28180\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/awareness-telecommuting\/8135\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/awareness-telecommuting\/34972\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/awareness-telecommuting\/14685\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/awareness-telecommuting\/15047\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/awareness-telecommuting\/13518\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/awareness-telecommuting\/23751\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/awareness-telecommuting\/25324\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/awareness-telecommuting\/22103\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/awareness-telecommuting\/27374\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/awareness-telecommuting\/27212\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.it\/blog\/tag\/smart-working\/","name":"smart working"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/21412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/comments?post=21412"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/21412\/revisions"}],"predecessor-version":[{"id":21421,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/posts\/21412\/revisions\/21421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/media\/21414"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/media?parent=21412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/categories?post=21412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.it\/blog\/wp-json\/wp\/v2\/tags?post=21412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}