Companies in Italy are increasingly suffer significant economic damage due to data loss.

There are mainly three causes: cyber attacks, human errors, malalaware that affect the system.

Related to informal attacks only, an article in ‘Il Sole 24 ORE’ reports impressive data:

In Italia il costo medio annuo per azienda delle violazioni della sicurezza informatica ha raggiunto gli 8 milioni di dollari (13 milioni di dollari per azienda a livello globale), con un incremento del 19% nel 2018 (12% a livello globale). È quanto emerge dal nono studio annuale di Accenture Security sui costi del cybercrime” (cit. )

“In Italy, the average annual cost per company of cyber security breaches reached $ 8 million ($ 13 million per company globally), an increase of 19% in 2018 (12% globally). This is what emerges from the ninth annual Accenture Security study on cybercrime costs “(cit.


In this article we will try to give you some advice, based on our decades of experience in IT, about what are the good rules to follow to protect

pc, company data, your customers’ data, your private company network and, if you are a natural person, your personal data.

The first step is awareness:
What data is to be protected and why it is valuable

To protect your data, you must first start with three basic questions:

1) What are the data to be protected?

2) How much and why are they precious?

3) Who in the company or in the organization has access to that data?


Let’s focus for a moment on the first two points

To defend ourselves from cyber attacks it is necessary to know what we have in “safe”, that is what we have to defend.

For this reason, it becomes fundamental for companies to have awareness

  • how valuable your data is;
  • of the infinite information that can be drawn, both from a mere data and from the intersection of the same with other data by means of AI and machine learning.

Not being aware of this makes you weak in the face of a possible cyber attack.

To be able to become aware of your data, try asking yourself the following questions

  • What benefits could my data bring to my business?
  • Why would someone, a haker for example, need my data? How could it use it?

A private individual must have the same awareness. He often suffers cyber attacks aimed at the theft of the credit card – used for online purchases – and identity theft on social networks or on the mail service.


Third point: who in the company or organization has access to data

For this purpose, we suggest you to draw up a list of people within the company, who  have free access to those data. Once drafted, it must be updated periodically.


The choice of passwords

It is a good practice to choose effective passwords for both individuals and companies. To do this, follow the following tips:

Choose strong passwords and change them often and regularly.


  • So-called “strong” passwords must have certain characteristics: they usually have eight characters and use a combination of letters, numbers and symbols;
  • For greater security, change your password about every three months. The password must be completely changed: therefore do not make the mistake of changing only a few letters;
  • Don’t use the same password for different services, apps and sites. You often may make this mistake for haste and for simplicity, so remember that it is extremely safer to use different passwords;

Antivirus: good practices

To protect the PC and company data – as well as personal data – one of the fundamental measures is to install good antivirus and antimalware software on each PC.

To surf the internet safely, it is vital to have software that is able to defend ourselves from potentially dangerous programs and software from the network.

It is also important:

  • Configure them to update automatically

Outdated antivirus software is ineffective antivirus software. This is because it must be ready to face all those new threats that arise on the net every day.

  • Perform regular scans

There are two main types of scans: the fast one and the thorough one.

The first is very simple and superficial, and is the best solution for the most harmless viruses and malware. The second one is an in-depth scan of the computer that can last even hours, and allows you to find even the most hidden problems.

We recommend for each PC to scan quickly once every three days and scan in depth once a month.

  • Have an operating system always updated, also with active automatic updates.


In addition to the antivirus, it is necessary to have a firewall.

A system that acts as a wall to defend our PC, and/or a private network, from threats from network.

What is that?

Software or hardware device that stands between the internal network and the router for external access. In this way, it becomes an obligatory passage channel that controls the input and output data.

It is therefore a filter that creates a shield between the huge amount of information that comes from the web and our PC.

How does it work:

By carrying out control actions, the firewall monitors and modifies all data packets entering and leaving our computer or a private network.

Regular data backup

Another very important measure for the protection of your data or company data is to perform a regular backup of your data.

What backup is

The backup is a copy of files or databases that is hosted in a different ‘place’ than the device in which it is housed (for example, inside an external hard disk or in a virtual place).

Why it is important to do it regularly

Backups allow you to restore data that is lost or damaged as a result of cyber attacks or natural disasters (such as a fire or an earthquake).

A regular saving of data will allow the company to be able to restore files avoiding the loss of important information.

It is therefore necessary for each company to plan a ‘Disaster Recovery’ procedure, that is, a procedure capable of recovering data and restoring the functioning of the system in a reasonably short time.

For more advice on computer security and how to protect company and personal data, continue to follow us on our blog and on our pages Facebook and Linkedin.

To request a consultation and check the IT protection level of your company click here: 


How to free memory on your Android smartphone

How to do not lose the internet connection on your smartphone

Business Digitalization