{"id":760,"date":"2022-08-16T00:28:48","date_gmt":"2022-08-15T22:28:48","guid":{"rendered":"https:\/\/renor.it\/no-training-no-security\/"},"modified":"2025-12-20T15:53:34","modified_gmt":"2025-12-20T14:53:34","slug":"no-training-no-security","status":"publish","type":"post","link":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/","title":{"rendered":"No training? No security!"},"content":{"rendered":"<p>Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of \u201ceducation\u201d in the use of digital tools could lead to major <strong>issues in the area of IT security.<\/strong> Such security issues can range from the infection of a single PC to the <strong>compromise of the data store<\/strong> contained in data centers and all data within computers connected to the network. <\/p>\n<p>It is necessary to pay the utmost attention!<\/p>\n<h2>Interviews should not only be asked if they can use Excel<\/h2>\n<div id=\"attachment_51\" style=\"width: 310px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51\" class=\"wp-image-51 size-medium\" src=\"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/job-interview-300x200.jpg\" alt=\"Job interview\" width=\"300\" height=\"200\" srcset=\"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/job-interview-300x200.jpg 300w, https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/job-interview-768x512.jpg 768w, https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/job-interview.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-51\" class=\"wp-caption-text\">What to ask at the job interview as computer skills<\/p><\/div>\n<p>Personally, I was in charge of recruiting only IT-related personnel concerning Web application development. Of course, interesting resumes or people with a solid foundation, not overly skilled but with a great desire to learn, were contacted. In other areas, such as administration, marketing, etc., the recruiting of figures and the subsequent cognitive interview was left to the Personnel Selection Department.  <\/p>\n<p>Very often, recruiters, unless they have already worked as recruiters within IT companies, are not sufficiently knowledgeable about the requirements a candidate should have regarding the <strong>minimum knowledge<\/strong> about the use of the IT tools they will have to work with.<\/p>\n<p>Very often he is asked if he has already used excel and e-mail <strong>without elaborating<\/strong>, on the latter, what his knowledge is limited to; because it should be emphasized that knowing how to open an e-mail message and reply, perhaps using other e-mail addresses in copy and hidden copy, is not sufficiently comprehensive for the purpose of defending the data within corporate data centers.<\/p>\n<p>One question that should definitely be asked is, <em>\u201cbefore opening an attachment, do you verify that the sender&#8217;s email address is trustworthy?\u201d<\/em><\/p>\n<h2>How to recognize messages containing malware?<\/h2>\n<p>If the message contains no attachments and no links it is probably just SPAM, i.e., email advertising practices not authorized by the direct recipient of the message. Many e-mail servers recognize these messages and automatically <em>\u201cflag\u201d<\/em> them as SPAM. <\/p>\n<p>What about messages that contain attachments instead?<\/p>\n<h3>Check the sender&#8217;s address<\/h3>\n<p>Many candidates do not know that it is possible to write anything within the message body, but it is <strong>much more problematic<\/strong> to send an email with the same email address as the original sender. So probably if you receive an email from a fake Facebook, the sender&#8217;s email address will not be<strong> support@facebook.com,<\/strong> but something like <strong>support@facebok.com<\/strong> (note a single \u201co\u201d in the fake address). <\/p>\n<p>Just as a quick aside, it is exactly in this way that Hackers steal users&#8217; Social account login data&#8230;. They send an email with HTML body identical to the emails sent by Facebook for example, requesting to log in to their account. The point is that clicking on the link does not end up on Facebook but on a site exactly the same as Facebook but with a different though similar domain name (see the Facebok example), where entering the data and trying to log in will continue to give an error: in reality the data has already been stored by the hacker on the first attempt, continuing to enter other passwords for fear of not remembering them will also be stored. The Hacker will use this data to log into Social and replace your password with one of his own. It would be good to never put the same passwords that you use for Social Networks also for online accounts, PayPal and online payment platforms, because the first step done with these data is to see if the same ones give access to online payment portals&#8230; So be careful for online payment systems always use passwords that you would never put for Social Network registration!     <\/p>\n<h3>Check the body of the message<\/h3>\n<p>Very often within the message body of an email containing Malware, there are a number of <strong>strange symbols<\/strong>, <strong>misspellings<\/strong>, and in some cases even sentences that make no sense. This must make you suspicious. It is very difficult for a person who writes and speaks the same language as you to write that endless sequence of <strong>nonsensical sentences<\/strong>.  <\/p>\n<h3>Extension of the attached file<\/h3>\n<p>Although the most polished hackers are able to disguise executables with .doc and .pdf extensions, there are cases where the file extension attached is a zipper containing an executable. <strong>Executable files should NEVER be opened under any circumstances<\/strong>.<\/p>\n<h3>Use a good antivirus<\/h3>\n<p>Finally, if the PC is not already equipped with one, it would be a<strong> good<\/strong> idea to request the<strong> licensed installation of a good antivirus<\/strong> in order to immediately identify and block the threat before it can create damage to the data shared on the network.<\/p>\n<h2>What kind of damage can Malware do?<\/h2>\n<div id=\"attachment_52\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52\" class=\"wp-image-52 size-medium\" src=\"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/malware-300x200.jpg\" alt=\"Malware\" width=\"300\" height=\"200\" srcset=\"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/malware-300x200.jpg 300w, https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/malware-768x513.jpg 768w, https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/malware.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-52\" class=\"wp-caption-text\">Malware<\/p><\/div>\n<p>There are many types of Malware that can attack a single computer or settle inside data-center servers or transmit to other computers in the network. One very dangerous class of Malware is <strong>Ransomware<\/strong>. This class of Malware encrypts data with a 256bit key and an algorithm known only to the Hackers who developed it. <strong>A ransom is<\/strong> usually <strong>demanded<\/strong> in order to get hold of the decryption key and restore unencrypted reading of the data.   <\/p>\n<p>Of course, the damage it can cause on a PC used by a user at home to surf the Internet and watch movies on Netflix is very relative. On the other hand, it can become <strong>a total catastrophe<\/strong> if the Virus spreads within a corporate network that contains all documents such as invoices, contracts with other companies, employee contracts, payroll, etc. <\/p>\n<h2>How does the entrepreneur prevent these harms?<\/h2>\n<p>The only effective method is the use of Antivirus on all computers and good staff training.<\/p>\n<p>If you need counseling and training of your staff in proper PC use in order to decrease the risk of attacks contact us!<\/p>\n\n<p><strong>[starbox] <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of \u201ceducation\u201d in the use of digital tools could lead to major issues in the area of IT security. Such security issues can range from [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":50,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_writerflow_disable_suggestions":false,"footnotes":""},"categories":[1980],"tags":[1689,1690,1691,1692],"class_list":["post-760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-privacy-identita-digitale","tag-cybersecurity","tag-hacker-en","tag-hacking-en","tag-staff-training"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>No training? No security! | RENOR &amp; Partners S.r.l.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No training? No security!\" \/>\n<meta property=\"og:description\" content=\"Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of \u201ceducation\u201d in the use of digital tools could lead to major issues in the area of IT security. Such security issues can range from [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RENOR &amp; Partners S.r.l.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/renorsrl\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/simone.renzi.3954\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-15T22:28:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T14:53:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Renzi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Renzi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/\"},\"author\":{\"name\":\"Simone Renzi\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#\\\/schema\\\/person\\\/21343be04e5983a87f3a9a6182cf8795\"},\"headline\":\"No training? No security!\",\"datePublished\":\"2022-08-15T22:28:48+00:00\",\"dateModified\":\"2025-12-20T14:53:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/no-formazione.jpg\",\"keywords\":[\"cybersecurity\",\"hacker\",\"hacking\",\"staff training\"],\"articleSection\":[\"Sicurezza, Privacy &amp; Identit\u00e0 Digitale\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/\",\"url\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/\",\"name\":\"No training? No security! | RENOR &amp; Partners S.r.l.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/no-formazione.jpg\",\"datePublished\":\"2022-08-15T22:28:48+00:00\",\"dateModified\":\"2025-12-20T14:53:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/no-formazione.jpg\",\"contentUrl\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/no-formazione.jpg\",\"width\":1200,\"height\":675,\"caption\":\"Se non formi il tuo personale in modo adeguato all'utilizzo dei principali programmi in uso nella tua azienda potresti trovarti in guai grossi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/sicurezza-privacy-identita-digitale\\\/no-training-no-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/renor.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security, Privacy &amp; Digital Identity\",\"item\":\"https:\\\/\\\/renor.it\\\/en\\\/blog\\\/security-privacy-digital-identity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"No training? No security!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/renor.it\\\/en\\\/\",\"name\":\"RENOR & Partners S.r.l.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#organization\"},\"alternateName\":\"RENOR & Partners S.r.l.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/renor.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#organization\",\"name\":\"RENOR & Partners S.r.l.\",\"url\":\"https:\\\/\\\/renor.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/logo-new-1.webp\",\"contentUrl\":\"https:\\\/\\\/renor.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/logo-new-1.webp\",\"width\":432,\"height\":146,\"caption\":\"RENOR & Partners S.r.l.\"},\"image\":{\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/renorsrl\",\"https:\\\/\\\/www.instagram.com\\\/renorpartners\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/renor-partners\\\/posts\\\/?feedView=all\"],\"description\":\"RENOR & Partners Srl \u00e8 una societ\u00e0 di consulenza tecnologica e ingegneristica specializzata in sviluppo software, cloud computing, integrazione di sistemi, intelligenza artificiale applicata e progettazione elettronica. L\u2019azienda supporta imprese e pubbliche amministrazioni nella realizzazione di soluzioni digitali affidabili, scalabili e orientate all\u2019efficienza, con un approccio pragmatico basato su competenze tecniche, progettazione su misura e innovazione concreta.\",\"email\":\"info@renor.it\",\"telephone\":\"3791489430\",\"legalName\":\"RENOR AND PARTNERS S.r.l.\",\"foundingDate\":\"2022-06-21\",\"vatID\":\"16768411007\",\"taxID\":\"16768411007\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/renor.it\\\/en\\\/#\\\/schema\\\/person\\\/21343be04e5983a87f3a9a6182cf8795\",\"name\":\"Simone Renzi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g\",\"caption\":\"Simone Renzi\"},\"description\":\"Senior full-stack web engineer with over 20 years of experience in cloud architectures, AI, and SaaS solutions; member of Mensa Italia. Creator of platforms such as HR24.ai and Paghe.ai, he oversaw the web development of FNS, a neural network simulator cited in Scientific Reports (Nature Portfolio), and has collaborated on research projects with INFN \u2013 Laboratori Nazionali di Frascati, Universit\u00e0 di Roma \u201cTor Vergata\u201d, Universidad Complutense, Universidad Polit\u00e9cnica and Centro de Tecnolog\u00eda Biom\u00e9dica in Madrid. A classical pianist, he combines musical creativity and technological rigor in every project.\",\"sameAs\":[\"https:\\\/\\\/renor.it\",\"https:\\\/\\\/www.facebook.com\\\/simone.renzi.3954\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/simone-renzi\"],\"url\":\"https:\\\/\\\/renor.it\\\/en\\\/author\\\/thesimon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"No training? No security! | RENOR &amp; Partners S.r.l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/","og_locale":"en_US","og_type":"article","og_title":"No training? No security!","og_description":"Over the years that I have worked in large companies as a CIO, I have become more aware than ever of the importance of training employees and how this lack of \u201ceducation\u201d in the use of digital tools could lead to major issues in the area of IT security. Such security issues can range from [&hellip;]","og_url":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/","og_site_name":"RENOR &amp; Partners S.r.l.","article_publisher":"https:\/\/www.facebook.com\/renorsrl","article_author":"https:\/\/www.facebook.com\/simone.renzi.3954\/","article_published_time":"2022-08-15T22:28:48+00:00","article_modified_time":"2025-12-20T14:53:34+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg","type":"image\/jpeg"}],"author":"Simone Renzi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simone Renzi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#article","isPartOf":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/"},"author":{"name":"Simone Renzi","@id":"https:\/\/renor.it\/en\/#\/schema\/person\/21343be04e5983a87f3a9a6182cf8795"},"headline":"No training? No security!","datePublished":"2022-08-15T22:28:48+00:00","dateModified":"2025-12-20T14:53:34+00:00","mainEntityOfPage":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/"},"wordCount":999,"publisher":{"@id":"https:\/\/renor.it\/en\/#organization"},"image":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#primaryimage"},"thumbnailUrl":"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg","keywords":["cybersecurity","hacker","hacking","staff training"],"articleSection":["Sicurezza, Privacy &amp; Identit\u00e0 Digitale"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/","url":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/","name":"No training? No security! | RENOR &amp; Partners S.r.l.","isPartOf":{"@id":"https:\/\/renor.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#primaryimage"},"image":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#primaryimage"},"thumbnailUrl":"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg","datePublished":"2022-08-15T22:28:48+00:00","dateModified":"2025-12-20T14:53:34+00:00","breadcrumb":{"@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#primaryimage","url":"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg","contentUrl":"https:\/\/renor.it\/wp-content\/uploads\/2022\/08\/no-formazione.jpg","width":1200,"height":675,"caption":"Se non formi il tuo personale in modo adeguato all'utilizzo dei principali programmi in uso nella tua azienda potresti trovarti in guai grossi"},{"@type":"BreadcrumbList","@id":"https:\/\/renor.it\/en\/blog\/sicurezza-privacy-identita-digitale\/no-training-no-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/renor.it\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/renor.it\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Security, Privacy &amp; Digital Identity","item":"https:\/\/renor.it\/en\/blog\/security-privacy-digital-identity\/"},{"@type":"ListItem","position":4,"name":"No training? No security!"}]},{"@type":"WebSite","@id":"https:\/\/renor.it\/en\/#website","url":"https:\/\/renor.it\/en\/","name":"RENOR & Partners S.r.l.","description":"","publisher":{"@id":"https:\/\/renor.it\/en\/#organization"},"alternateName":"RENOR & Partners S.r.l.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/renor.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/renor.it\/en\/#organization","name":"RENOR & Partners S.r.l.","url":"https:\/\/renor.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/renor.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/renor.it\/wp-content\/uploads\/2025\/12\/logo-new-1.webp","contentUrl":"https:\/\/renor.it\/wp-content\/uploads\/2025\/12\/logo-new-1.webp","width":432,"height":146,"caption":"RENOR & Partners S.r.l."},"image":{"@id":"https:\/\/renor.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/renorsrl","https:\/\/www.instagram.com\/renorpartners\/","https:\/\/www.linkedin.com\/company\/renor-partners\/posts\/?feedView=all"],"description":"RENOR & Partners Srl \u00e8 una societ\u00e0 di consulenza tecnologica e ingegneristica specializzata in sviluppo software, cloud computing, integrazione di sistemi, intelligenza artificiale applicata e progettazione elettronica. L\u2019azienda supporta imprese e pubbliche amministrazioni nella realizzazione di soluzioni digitali affidabili, scalabili e orientate all\u2019efficienza, con un approccio pragmatico basato su competenze tecniche, progettazione su misura e innovazione concreta.","email":"info@renor.it","telephone":"3791489430","legalName":"RENOR AND PARTNERS S.r.l.","foundingDate":"2022-06-21","vatID":"16768411007","taxID":"16768411007","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/renor.it\/en\/#\/schema\/person\/21343be04e5983a87f3a9a6182cf8795","name":"Simone Renzi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54f81b51be6bda6d63a06a1cd6563d9b0d5778d7af4f0bda4e246fc3e5737e2e?s=96&d=mm&r=g","caption":"Simone Renzi"},"description":"Senior full-stack web engineer with over 20 years of experience in cloud architectures, AI, and SaaS solutions; member of Mensa Italia. Creator of platforms such as HR24.ai and Paghe.ai, he oversaw the web development of FNS, a neural network simulator cited in Scientific Reports (Nature Portfolio), and has collaborated on research projects with INFN \u2013 Laboratori Nazionali di Frascati, Universit\u00e0 di Roma \u201cTor Vergata\u201d, Universidad Complutense, Universidad Polit\u00e9cnica and Centro de Tecnolog\u00eda Biom\u00e9dica in Madrid. A classical pianist, he combines musical creativity and technological rigor in every project.","sameAs":["https:\/\/renor.it","https:\/\/www.facebook.com\/simone.renzi.3954\/","https:\/\/www.linkedin.com\/in\/simone-renzi"],"url":"https:\/\/renor.it\/en\/author\/thesimon\/"}]}},"_links":{"self":[{"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/posts\/760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":0,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/posts\/760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/media\/50"}],"wp:attachment":[{"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/media?parent=760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/categories?post=760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renor.it\/en\/wp-json\/wp\/v2\/tags?post=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}