<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security, Privacy &amp; Digital Identity | RENOR &amp; Partners S.r.l.</title>
	<atom:link href="https://renor.it/en/blog/security-privacy-digital-identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://renor.it/en/blog/security-privacy-digital-identity/</link>
	<description></description>
	<lastBuildDate>Sat, 20 Dec 2025 22:49:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Goodbye passwords? 2025 is the year of passkeys.</title>
		<link>https://renor.it/en/blog/security-privacy-digital-identity/goodbye-passwords-2025-is-the-year-of-passkeys/</link>
		
		<dc:creator><![CDATA[Simone Renzi]]></dc:creator>
		<pubDate>Fri, 09 May 2025 13:02:11 +0000</pubDate>
				<category><![CDATA[Security, Privacy & Digital Identity]]></category>
		<category><![CDATA[anti-phishing]]></category>
		<category><![CDATA[biometric login]]></category>
		<category><![CDATA[CTAP2]]></category>
		<category><![CDATA[cybersecurity 2025]]></category>
		<category><![CDATA[Face ID]]></category>
		<category><![CDATA[fast login]]></category>
		<category><![CDATA[FIDO2]]></category>
		<category><![CDATA[hardware authenticator]]></category>
		<category><![CDATA[key pair]]></category>
		<category><![CDATA[passkey]]></category>
		<category><![CDATA[passkey-ready device]]></category>
		<category><![CDATA[passwordless authentication]]></category>
		<category><![CDATA[passwordless login]]></category>
		<category><![CDATA[private key]]></category>
		<category><![CDATA[public key]]></category>
		<category><![CDATA[secure login]]></category>
		<category><![CDATA[Touch ID]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[WebAuthn]]></category>
		<guid isPermaLink="false">https://renor.it/goodbye-passwords-2025-is-the-year-of-passkeys/</guid>

					<description><![CDATA[<p>Passkey 2025: goodbye passwords thanks to FIDO2/WebAuthn standards, faster and more secure logins with biometrics and cryptographic keys.</p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/goodbye-passwords-2025-is-the-year-of-passkeys/">Goodbye passwords? 2025 is the year of passkeys.</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Have you ever opened a website, tapped the “email” field, and found yourself already authenticated thanks to your iPhone’s Face ID or fingerprint, without typing a single letter?</p>
<p>Behind that gesture—imperceptible yet revolutionary—there is a passkey: a pair of cryptographic keys, securely stored on your device, that permanently retires the use of passwords.</p>
<h1>Why the year of passkeys?</h1>
<p>This is far from just a catchy headline. As of May 2025, 90.93% of devices globally are capable of passkey-based authentication. 74% of consumers with a passkey-ready device are aware of this technology. Of these, 69% have already enabled it, and 50% of the world’s top 100 websites have integrated it into their systems.   </p>
<p>We can therefore confidently state that 2024 was the pilot year, while 2025 is the year of mass adoption, with figures now surpassing those of any previous login technology.</p>
<h2>How does the passkey work?</h2>
<p>I’ll explain it to you in three key concepts:</p>
<ol>
<li>Key pair – One public key that is stored on the server, and one private key that never leaves your device.</li>
<li>FIDO2 and WebAuthn – These are two open standards, already supported by all modern browsers.</li>
<li>Biometrics as unlock, not as credentials – It’s your face that unlocks the private key, without that key ever “travelling around” the network.</li>
</ol>
<h3>Key pair – The double-lock mechanism</h3>
<p>We mentioned that one of the key elements of the passkey system is a key pair (public and private).</p>
<p>The public key is like the address of your mailbox: anyone can know it and use it to “drop in” a letter. This key is saved in the service’s database when you register. </p>
<p>The private key is the key that physically opens the mailbox, and it always stays in your pocket (in the phone’s chip or your browser). It never leaves your pocket/device. </p>
<h4>How does the login work?</h4>
<p>The server sends a random challenge, the device signs the challenge with the private key. The server then verifies the signature using the public key it already has. </p>
<p>If the signature is valid, you’re authenticated—without any password ever crossing the network.</p>
<h4>Why is this a more secure system?</h4>
<p>Because a hacker who gains access to the database can only obtain public keys, which are useless without the corresponding private key.</p>
<h3>FIDO2 + WebAuthn: the standard that bridges hardware and the web</h3>
<p>To understand why passkeys work everywhere without the user needing to install anything, it’s enough to see how FIDO2 has united two worlds that previously didn’t communicate: the Web and the world of security hardware.</p>
<p>Imagine a charter of laws that establishes general rules. The core principles are passwordless authentication, anti-phishing protection, and interoperability across devices. Under these laws, two components coexist:  </p>
<h4>WebAuthn</h4>
<p>It’s an official W3C JavaScript API already built into Chrome, Safari, Firefox, Edge, and other minor browsers. From the developer’s point of view, it’s the only interface needed, called:<br />WebAuthn </p>
<p><code>navigator.credentials.create()<br />
</code></p>
<p>to register the passkey and</p>
<p><code>navigator.credentials.get()<br />
</code></p>
<p>to use it.</p>
<p>&nbsp;</p>
<p>Everything else—key pair generation, Face ID/Touch ID display and usage, signing the challenge—happens behind the scenes.</p>
<h4>CTAP2</h4>
<p>Once the browser receives the request via WebAuthn, it needs to communicate with the hardware that holds the private key: this could be the Secure Enclave chip on an iPhone, the TPM on a Windows laptop, a YubiKey USB-C, or an NFC security key.<br />The language used for this communication is CTAP2 (Client To Authenticator Protocol 2), defined by the FIDO Alliance.<br />This way, the authenticator is free to evolve—today it might be a fingerprint, tomorrow it could be a retinal scan—without requiring websites to change their code.  </p>
<h4>Why is this dual layer important?</h4>
<p>Because it ensures that the same backend integrating WebAuthn will seamlessly communicate with either an Android phone or a hardware key, since the CTAP2 layer is abstracted.<br />It’s important because it provides anti-phishing security: the private key is bound to the domain for which it was created; if a fake site tries to deceive the browser, CTAP2 refuses to sign the challenge.<br />It also enables graceful compatibility—if a device doesn’t natively support a compatible authenticator, the browser can fall back to traditional authentication methods (e.g., password and OTP) without breaking the user experience.  </p>
<p>In essence, FIDO2 is the bridge, WebAuthn is the developer’s lane, and CTAP2 is the expressway reserved for security chips. Thanks to this layered architecture, we can enable passkeys with just a few lines of code and be confident that they will continue to work as new devices emerge that may implement other forms of biometrics. </p>
<h3>Where are we already using Passkey technology?</h3>
<p>Since iOS 18, Apple has integrated the “Passwords” app, which centralizes both passwords and passkeys; Touch ID or Face ID are used to unlock them.</p>
<p>With Windows Hello on Windows 11, you can create and use passkeys on Edge, Chrome, and Firefox without installing anything.</p>
<p>In Android 15, the Credential Manager API enables “single-tap sign-in” across passkeys, Google Sign-In, and traditional passwords.</p>
<p>For the user, it’s the phone that logs in on its own; for the security team, it’s a farewell to phishing.</p>
<p>&nbsp;</p>
<h2>Advantages only for security?</h2>
<p>The advantages aren’t limited to security—they also include speed. Google has measured login times cut in half compared to entering a username and password. Moreover, there’s no need to remember any password, since passkeys are password-free. </p>

<p><strong>[starbox] </strong></p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/goodbye-passwords-2025-is-the-year-of-passkeys/">Goodbye passwords? 2025 is the year of passkeys.</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How they steal your social login information</title>
		<link>https://renor.it/en/blog/security-privacy-digital-identity/how-they-steal-your-social-login-information/</link>
		
		<dc:creator><![CDATA[Simone Renzi]]></dc:creator>
		<pubDate>Thu, 25 Aug 2022 07:45:09 +0000</pubDate>
				<category><![CDATA[Security, Privacy & Digital Identity]]></category>
		<category><![CDATA[access data]]></category>
		<category><![CDATA[hacking techniques]]></category>
		<category><![CDATA[keylogger]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[renor]]></category>
		<category><![CDATA[renor & partners]]></category>
		<category><![CDATA[steal access data]]></category>
		<category><![CDATA[steal facebook login data]]></category>
		<category><![CDATA[trojan]]></category>
		<guid isPermaLink="false">https://renor.it/how-they-steal-your-social-login-information/</guid>

					<description><![CDATA[<p>Ancora una volta ci troviamo a parlare di formazione in ambito di sicurezza informatica. I Social network ormai sono diventati un must-have. Ognuno di noi si è registrato almeno ad un social network. Gli usi che se ne possono fare sono i più disparati: si va dal ritrovare amici d&#8217;infanzia con cui ci si è [&#8230;]</p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/how-they-steal-your-social-login-information/">How they steal your social login information</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ancora una volta ci troviamo a parlare di formazione in ambito di sicurezza informatica. I Social network ormai sono diventati un must-have. Ognuno di noi si è registrato almeno ad un social network. Gli usi che se ne possono fare sono i più disparati: si va dal ritrovare amici d&#8217;infanzia con cui ci si è persi, alla pubblicità della propria impresa. I social network sono sicuramente una distrazione più o meno utile a secondo dell&#8217;uso che se ne fa, ma può anche trasformarsi in un&#8217;esperienza da incubo se cadiamo nei tranelli di persone poco raccomandabili che rubano le nostre password. Si parla di incubo non tanto per l&#8217;uso che si può fare delle foto, che si possono scaricare facilmente senza la necessità di rubare password (dal momento che sono per lo più pubbliche sul social).</p>
<p>Può essere un&#8217;esperienza da incubo perché l&#8217;accoppiata user/password potrebbe essere utilizzata anche per sistemi di pagamento online come PayPal o come password del conto corrente bancario. Insomma, la sicurezza informatica è una cosa SERIA e come tale dev&#8217;essere trattata.</p>
<p>In <a href="https://renor.it/en/informatics/no-training-no-security/">questo altro articolo</a> avevamo parlato dell&#8217;importanza della formazione. Essere formati permette di saper riconoscere questo genere di raggiri e tutelare i nostri dati ma anche i nostri conti economici.</p>
<p>Ma andiamo adesso a vedere quali sono le tecniche più utilizzate per rubare le utenze.</p>
<h2>Phishing</h2>
<p>Il Phishing è un metodo geniale per rubare dati di accesso ed ho voluto menzionarlo di proposito per primo perché è anche il metodo più utilizzato dai Lamer.</p>
<p>Consiste nel creare una pagina web perfettamente identica alla pagina del sito o social di riferimento. Compilando la form di accesso, i nostri dati finiscono nelle mani dei Lamer.</p>
<p>Poniamo ad esempio che siate iscritti su Facebook.<br />
Il sistema per fare Phishing è totalmente automatico:</p>
<ul>
<li>Ricevete una finta mail da Facebook che vi induce a fare l&#8217;accesso cliccando su un link presente sulla mail</li>
<li>Cliccando, il link non punta al dominio facebook.com ma ad un altro dominio, ad esempio fakebook.com</li>
<li>Vi trovate in una pagina di accesso esattamente identica a quella di facebook</li>
<li>Non fate caso al dominio che nella maggior parte dei casi è in qualche modo simile all&#8217;originale</li>
<li>Compilate i vostri dati nella form e confermate l&#8217;accesso</li>
<li>L&#8217;accesso non va a buon fine perché dietro a quella pagina di accesso non c&#8217;è nulla e vi viene chiesto di riprovare più tardi</li>
<li>Dopo un paio di tentativi abbandonate e tutte le password che avete provato ad inserire vengono salvate all&#8217;interno di un database</li>
<li>Il lamer viene notificato della ricezione dei dati di accesso di una nuova vittima e li utilizza per accedere al vostro account e fare il suo comodo</li>
<li>In alcuni casi lo stesso prova ad utilizzare quella combinazione username e password per accedere ad altre informazioni: ad esempio sulla posta eletttronica, conto corrente postale, ecc. ecc.</li>
</ul>
<h3>Come proteggersi dal Phishing</h3>
<p>Per proteggersi da questo genere di attacchi ci sono una serie di controlli da effettuare.</p>
<ol>
<li>All&#8217;arrivo di una mail che richiede la connessione ad un portale in cui siete iscritti la prima cosa da fare è verificare l&#8217;indirizzo email del mittente (anche se questo può essere facilmente contraffatto). Se già l&#8217;indirizzo email del mittente presenta degli elementi strani possiamo serenamente soprassedere. Es. support@<strong>fakebook.com</strong></li>
<li>Questa è una norma generale&#8230; Mentre è facile camuffare un indirizzo email, è IMPOSSIBILE camuffare un dominio. Pertanto ogni volta che vi trovate nel vostro browser ad inserire i vostri dati di accesso <strong>verificate l&#8217;attendibilità del nome del dominio. </strong>Se siete sul dominio fakebook.com chiudete immediatamente la pagina, se siete sul dominio facebook.com potrete procedere con tranquillità.</li>
<li>È sempre bene installare un software antivirus e tenerlo aggiornato. Molti di questi messaggi vengono segnalati e un buon antivirus può identificare posta malevola ed eliminarla.</li>
</ol>
<h2></h2>
<h2>Keylogger</h2>
<p>Questa è una metodologia di furto di dati che può essere attuata o previo l&#8217;installazione di software sulla macchina, o attraverso l&#8217;utilizzo di particolari strumenti hardware inseriti tra il connettore della tastiera e quello della scheda madre.</p>
<p>Un keylogger è più genericamente uno strumento che permette di registrare tutto ciò che viene digitato su una tastiera. Nel caso di KeyLogger software, questi realizzano dei file contenenti tutto il testo digitato e lo inviano sistematicamente per email al Lamer. Per i keylogger hardware è invece necessario raggiungere fisicamente il computer per effettuare il suo inserimento in serie alla tastiera e allo stesso modo rimuoverlo.</p>
<p>I Keylogger non vengono utilizzati unicamente con lo scopo di rubare dati di accesso, ma per rubare informazioni in generale. Come già detto, quello che fanno è copiare su un file tutto ciò che viene digitato sulla tastiera.</p>
<h3>Come proteggersi dai Keylogger</h3>
<p>Per i keylogger software non c&#8217;è altro modo che installare e tenere aggiornato un buon antivirus.</p>
<p>Per i keylogger hardware la strada è quella di verificare che dietro al nostro computer tra la spina della tastiera ed il connetture USB o PS/2 del PC non ci sia nulla di mezzo. Spesso dentro un semplice adattatore potrebbe nascondersi un keylogger.</p>
<p>&nbsp;</p>
<h2>Ricordati di fare il logout</h2>
<p>Il personal computer si chiama così proprio perché è personale. Molte persone accedono ad account personali dall&#8217;ufficio su computer che possono essere utilizzati da tutti alla ricerca di informazioni e dimenticano di fare il logout. Anche questo può esporre a rischio. Pertanto ogni volta che devi collegarti da un computer che non sia il tuo personale ricordati sempre di effettuare il logout e di non salvare mail la password nel browser.</p>
<p>&nbsp;</p>
<h2>I Trojan</h2>
<p>Chi non conosce la storia del cavallo di Troia dell&#8217;Eneide? Il gigantesco Cavallo che i greci inviarono in dono alla regina Didone pieno dei più valorosi guerrieri di Agamennone guidati da Ulisse in persona&#8230;</p>
<p>Questo genere di virus prendono come esempio proprio la storia del cavallo di Troia. Si insinuano all&#8217;interno del nostro computer e cominciano a fare danni. Il tutto avviene in background. L&#8217;utente non si accorge di nulla, si accorge della presenza del Trojan solamente quando è troppo tardi e i danni sono stati già fatti.</p>
<p>È possibile prendere Trojan attraverso allegati della posta elettronica ma anche attraverso la rete lasciando delle porte aperte.</p>
<h3>Come proteggersi dai Trojan</h3>
<p>Si raccomanda l&#8217;uso di un Firewall e di un buon antivirus. Come sempre si ricorda che l&#8217;uso dell&#8217;antivirus potrebbe non essere sufficiente se questo non viene costantemente aggiornato al fine di poter riconoscere minacce di nuovi virus.</p>
<p>&nbsp;</p>
<p>Esisterebbero anche altri metodi, ma i più utilizzati sono quelli che abbiamo menzionato.<br />
Ora che conoscete il nemico e sapete come difendersi potrete sicuramente navigare con più sicurezza e tranquillità.</p>

<p><strong>[starbox] </strong></p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/how-they-steal-your-social-login-information/">How they steal your social login information</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No training? No security!</title>
		<link>https://renor.it/en/blog/security-privacy-digital-identity/no-training-no-security/</link>
		
		<dc:creator><![CDATA[Simone Renzi]]></dc:creator>
		<pubDate>Mon, 15 Aug 2022 22:28:48 +0000</pubDate>
				<category><![CDATA[Security, Privacy & Digital Identity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[staff training]]></category>
		<guid isPermaLink="false">https://renor.it/no-training-no-security/</guid>

					<description><![CDATA[<p>Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of “education” in the use of digital tools could lead to major issues in the area of IT security. Such security issues can range from [&#8230;]</p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/no-training-no-security/">No training? No security!</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of “education” in the use of digital tools could lead to major <strong>issues in the area of IT security.</strong> Such security issues can range from the infection of a single PC to the <strong>compromise of the data store</strong> contained in data centers and all data within computers connected to the network. </p>
<p>It is necessary to pay the utmost attention!</p>
<h2>Interviews should not only be asked if they can use Excel</h2>
<div id="attachment_51" style="width: 310px" class="wp-caption alignleft"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-51" class="wp-image-51 size-medium" src="https://renor.it/wp-content/uploads/2022/08/job-interview-300x200.jpg" alt="Job interview" width="300" height="200" srcset="https://renor.it/wp-content/uploads/2022/08/job-interview-300x200.jpg 300w, https://renor.it/wp-content/uploads/2022/08/job-interview-768x512.jpg 768w, https://renor.it/wp-content/uploads/2022/08/job-interview.jpg 800w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-51" class="wp-caption-text">What to ask at the job interview as computer skills</p></div>
<p>Personally, I was in charge of recruiting only IT-related personnel concerning Web application development. Of course, interesting resumes or people with a solid foundation, not overly skilled but with a great desire to learn, were contacted. In other areas, such as administration, marketing, etc., the recruiting of figures and the subsequent cognitive interview was left to the Personnel Selection Department.  </p>
<p>Very often, recruiters, unless they have already worked as recruiters within IT companies, are not sufficiently knowledgeable about the requirements a candidate should have regarding the <strong>minimum knowledge</strong> about the use of the IT tools they will have to work with.</p>
<p>Very often he is asked if he has already used excel and e-mail <strong>without elaborating</strong>, on the latter, what his knowledge is limited to; because it should be emphasized that knowing how to open an e-mail message and reply, perhaps using other e-mail addresses in copy and hidden copy, is not sufficiently comprehensive for the purpose of defending the data within corporate data centers.</p>
<p>One question that should definitely be asked is, <em>“before opening an attachment, do you verify that the sender&#8217;s email address is trustworthy?”</em></p>
<h2>How to recognize messages containing malware?</h2>
<p>If the message contains no attachments and no links it is probably just SPAM, i.e., email advertising practices not authorized by the direct recipient of the message. Many e-mail servers recognize these messages and automatically <em>“flag”</em> them as SPAM. </p>
<p>What about messages that contain attachments instead?</p>
<h3>Check the sender&#8217;s address</h3>
<p>Many candidates do not know that it is possible to write anything within the message body, but it is <strong>much more problematic</strong> to send an email with the same email address as the original sender. So probably if you receive an email from a fake Facebook, the sender&#8217;s email address will not be<strong> support@facebook.com,</strong> but something like <strong>support@facebok.com</strong> (note a single “o” in the fake address). </p>
<p>Just as a quick aside, it is exactly in this way that Hackers steal users&#8217; Social account login data&#8230;. They send an email with HTML body identical to the emails sent by Facebook for example, requesting to log in to their account. The point is that clicking on the link does not end up on Facebook but on a site exactly the same as Facebook but with a different though similar domain name (see the Facebok example), where entering the data and trying to log in will continue to give an error: in reality the data has already been stored by the hacker on the first attempt, continuing to enter other passwords for fear of not remembering them will also be stored. The Hacker will use this data to log into Social and replace your password with one of his own. It would be good to never put the same passwords that you use for Social Networks also for online accounts, PayPal and online payment platforms, because the first step done with these data is to see if the same ones give access to online payment portals&#8230; So be careful for online payment systems always use passwords that you would never put for Social Network registration!     </p>
<h3>Check the body of the message</h3>
<p>Very often within the message body of an email containing Malware, there are a number of <strong>strange symbols</strong>, <strong>misspellings</strong>, and in some cases even sentences that make no sense. This must make you suspicious. It is very difficult for a person who writes and speaks the same language as you to write that endless sequence of <strong>nonsensical sentences</strong>.  </p>
<h3>Extension of the attached file</h3>
<p>Although the most polished hackers are able to disguise executables with .doc and .pdf extensions, there are cases where the file extension attached is a zipper containing an executable. <strong>Executable files should NEVER be opened under any circumstances</strong>.</p>
<h3>Use a good antivirus</h3>
<p>Finally, if the PC is not already equipped with one, it would be a<strong> good</strong> idea to request the<strong> licensed installation of a good antivirus</strong> in order to immediately identify and block the threat before it can create damage to the data shared on the network.</p>
<h2>What kind of damage can Malware do?</h2>
<div id="attachment_52" style="width: 310px" class="wp-caption alignright"><img decoding="async" aria-describedby="caption-attachment-52" class="wp-image-52 size-medium" src="https://renor.it/wp-content/uploads/2022/08/malware-300x200.jpg" alt="Malware" width="300" height="200" srcset="https://renor.it/wp-content/uploads/2022/08/malware-300x200.jpg 300w, https://renor.it/wp-content/uploads/2022/08/malware-768x513.jpg 768w, https://renor.it/wp-content/uploads/2022/08/malware.jpg 800w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-52" class="wp-caption-text">Malware</p></div>
<p>There are many types of Malware that can attack a single computer or settle inside data-center servers or transmit to other computers in the network. One very dangerous class of Malware is <strong>Ransomware</strong>. This class of Malware encrypts data with a 256bit key and an algorithm known only to the Hackers who developed it. <strong>A ransom is</strong> usually <strong>demanded</strong> in order to get hold of the decryption key and restore unencrypted reading of the data.   </p>
<p>Of course, the damage it can cause on a PC used by a user at home to surf the Internet and watch movies on Netflix is very relative. On the other hand, it can become <strong>a total catastrophe</strong> if the Virus spreads within a corporate network that contains all documents such as invoices, contracts with other companies, employee contracts, payroll, etc. </p>
<h2>How does the entrepreneur prevent these harms?</h2>
<p>The only effective method is the use of Antivirus on all computers and good staff training.</p>
<p>If you need counseling and training of your staff in proper PC use in order to decrease the risk of attacks contact us!</p>

<p><strong>[starbox] </strong></p>
<p>L'articolo <a href="https://renor.it/en/blog/security-privacy-digital-identity/no-training-no-security/">No training? No security!</a> proviene da <a href="https://renor.it/en/">RENOR &amp; Partners S.r.l.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
