{"id":1106,"date":"2022-10-04T10:47:44","date_gmt":"2022-10-04T08:47:44","guid":{"rendered":"https:\/\/gltsafeandsound.nohup.it\/best-practice-per-piccole-e-microimprese\/"},"modified":"2022-11-02T12:56:39","modified_gmt":"2022-11-02T11:56:39","slug":"best-practice-per-piccole-e-microimprese","status":"publish","type":"post","link":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/","title":{"rendered":"Best practices for small and micro enterprises"},"content":{"rendered":"<p>The adoption of security measures: in order to choose and implement the most appropriate security measures, it is necessary to discuss with experts in the field in order to identify which measures are actually necessary and to what extent.<\/p>\n<p>The continuous and constant monitoring of security and the measures taken is also of decisive importance. Indeed, the changing regulatory and technological environment requires that the safeguards implemented keep pace with existing obligations and threats.<\/p>\n<p>To this end, periodic <strong>penetration tests<\/strong> and <strong>vulnerability assessments<\/strong> can be carried out, aimed at assessing the degree of security of the measures implemented and identifying any gaps that may exist. Furthermore, the contractual models used must be constantly updated. Audits, both internal and external, are also extremely useful (also in order to obtain the various security certifications)<\/p>\n","protected":false},"excerpt":{"rendered":"The adoption of security measures: in order to choose and&nbsp;&#8230;","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-1106","post","type-post","status-publish","format-standard","hentry","category-best-practices"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best practices for small and micro enterprises - GLT Cyber Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best practices for small and micro enterprises - GLT Cyber Security\" \/>\n<meta property=\"og:description\" content=\"The adoption of security measures: in order to choose and&nbsp;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/\" \/>\n<meta property=\"og:site_name\" content=\"GLT Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T08:47:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-02T11:56:39+00:00\" \/>\n<meta name=\"author\" content=\"Nohup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nohup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/\",\"url\":\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/\",\"name\":\"Best practices for small and micro enterprises - GLT Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#website\"},\"datePublished\":\"2022-10-04T08:47:44+00:00\",\"dateModified\":\"2022-11-02T11:56:39+00:00\",\"author\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b\"},\"breadcrumb\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gltsafeandsound.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best practices for small and micro enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#website\",\"url\":\"https:\/\/gltsafeandsound.com\/en\/\",\"name\":\"GLT Cyber Security\",\"description\":\"Cyber Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gltsafeandsound.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b\",\"name\":\"Nohup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g\",\"caption\":\"Nohup\"},\"sameAs\":[\"https:\/\/gltsafeandsound.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best practices for small and micro enterprises - GLT Cyber Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/","og_locale":"en_US","og_type":"article","og_title":"Best practices for small and micro enterprises - GLT Cyber Security","og_description":"The adoption of security measures: in order to choose and&nbsp;...","og_url":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/","og_site_name":"GLT Cyber Security","article_published_time":"2022-10-04T08:47:44+00:00","article_modified_time":"2022-11-02T11:56:39+00:00","author":"Nohup","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nohup","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/","url":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/","name":"Best practices for small and micro enterprises - GLT Cyber Security","isPartOf":{"@id":"https:\/\/gltsafeandsound.com\/en\/#website"},"datePublished":"2022-10-04T08:47:44+00:00","dateModified":"2022-11-02T11:56:39+00:00","author":{"@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b"},"breadcrumb":{"@id":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gltsafeandsound.com\/en\/best-practice-per-piccole-e-microimprese\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gltsafeandsound.com\/en\/"},{"@type":"ListItem","position":2,"name":"Best practices for small and micro enterprises"}]},{"@type":"WebSite","@id":"https:\/\/gltsafeandsound.com\/en\/#website","url":"https:\/\/gltsafeandsound.com\/en\/","name":"GLT Cyber Security","description":"Cyber Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gltsafeandsound.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b","name":"Nohup","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g","caption":"Nohup"},"sameAs":["https:\/\/gltsafeandsound.com"]}]}},"_links":{"self":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1106"}],"collection":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/comments?post=1106"}],"version-history":[{"count":1,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1106\/revisions"}],"predecessor-version":[{"id":1775,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1106\/revisions\/1775"}],"wp:attachment":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/media?parent=1106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/categories?post=1106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/tags?post=1106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}