{"id":1286,"date":"2022-03-07T08:57:55","date_gmt":"2022-03-07T08:57:55","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1286"},"modified":"2022-03-07T09:00:34","modified_gmt":"2022-03-07T09:00:34","slug":"la-violazione-dei-dati-proviene-dallinterno","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/","title":{"rendered":"La violazione dei dati proviene dall\u2019interno"},"content":{"rendered":"<h3>Storie di vita reale: perdita di dati, minacce interne e violazione degli utenti<\/h3>\n<p>Le perdite di dati non avvengono per magia. Sono sempre innescate dalle persone. Possono derivare da una condivisione accidentale di un file, un atto di sabotaggio da parte di un utente interno malintenzionato, un errore di configurazione di un server o di un utente compromesso. In ogni caso, la perdita di dati \u00e8 un problema umano. Negli attuali ambienti aziendali distribuiti e in cloud, la maggior parte dei team IT non ha visibilit\u00e0 sulla perdita di dati causata dai dipendenti e non ne ha alcun controllo. Questa situazione ha portato a importanti problemi di sicurezza e conformit\u00e0 tra cui:<br \/>\n\u2022 Takeover degli account cloud<br \/>\n\u2022 Condivisione eccessiva dei dati<br \/>\n\u2022 Applicazioni cloud non approvate<br \/>\n\u2022 Minacce interne<br \/>\nTutte possono causare perdita di dati, violazioni o furto nonch\u00e9 le conseguenze che ne derivano. Questo eBook prende in esame cinque casi reali di perdita dati, nonch\u00e9 i punti in comune, le loro unicit\u00e0 e come sarebbe stato possibile evitarli.<\/p>\n<p>[dlm_gf_form download_id=1251 ajax=&#8221;true&#8221;]<\/p>","protected":false},"excerpt":{"rendered":"<p>Storie di vita reale: perdita di dati, minacce interne e violazione degli utenti Le perdite di dati non avvengono per&#8230;<\/p>","protected":false},"author":25,"featured_media":1258,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,44],"tags":[],"class_list":["post-1286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology","category-proofpoint"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La violazione dei dati proviene dall\u2019interno - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La violazione dei dati proviene dall\u2019interno - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Storie di vita reale: perdita di dati, minacce interne e violazione degli utenti Le perdite di dati non avvengono per...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T08:57:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T09:00:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1117\" \/>\n\t<meta property=\"og:image:height\" content=\"789\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/\",\"url\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/\",\"name\":\"La violazione dei dati proviene dall\u2019interno - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg\",\"datePublished\":\"2022-03-07T08:57:55+00:00\",\"dateModified\":\"2022-03-07T09:00:34+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg\",\"width\":1117,\"height\":789},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Proofpoint\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/proofpoint\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"La violazione dei dati proviene dall\u2019interno\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La violazione dei dati proviene dall\u2019interno - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/","og_locale":"fr_FR","og_type":"article","og_title":"La violazione dei dati proviene dall\u2019interno - Techknowledge","og_description":"Storie di vita reale: perdita di dati, minacce interne e violazione degli utenti Le perdite di dati non avvengono per...","og_url":"https:\/\/b2btechknowledge.net\/fr\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/","og_site_name":"Techknowledge","article_published_time":"2022-03-07T08:57:55+00:00","article_modified_time":"2022-03-07T09:00:34+00:00","og_image":[{"width":1117,"height":789,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg","type":"image\/jpeg"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Steph Napier","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/","url":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/","name":"La violazione dei dati proviene dall\u2019interno - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg","datePublished":"2022-03-07T08:57:55+00:00","dateModified":"2022-03-07T09:00:34+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Data-Breach-IT.jpg","width":1117,"height":789},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/brands\/proofpoint\/la-violazione-dei-dati-proviene-dallinterno\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Proofpoint","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/proofpoint\/"},{"@type":"ListItem","position":4,"name":"La violazione dei dati proviene dall\u2019interno"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=1286"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1286\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/1258"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=1286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=1286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=1286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}