{"id":14075,"date":"2024-05-31T11:17:40","date_gmt":"2024-05-31T11:17:40","guid":{"rendered":"https:\/\/www.telda.it\/it\/?p=14075"},"modified":"2024-05-31T11:18:34","modified_gmt":"2024-05-31T11:18:34","slug":"why-make-a-vulnerability-assessment","status":"publish","type":"post","link":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/","title":{"rendered":"Why make a Vulnerability Assessment"},"content":{"rendered":"\n<p>Assessing the state of your systems through a Vulnerability Assessment allows you to identify the vulnerabilities present so you can optimize the company\u2019s posture by strengthening security..&nbsp;<\/p>\n\n\n\n<p>News of cyber attacks and violations are constantly increasing, analyzing the Clutis 2024 report we can see that this trend also affects Italy.<\/p>\n\n\n\n<p>But what are the risks for Italian companies? Data are a fundamental asset for every company and keeping them safe is necessary to safeguard the company\u2019s well-being as an exfiltration of data would bring with it significant damage to the company with the risk of fines by the Privacy Guarantor, reputational loss, system shutdowns, data loss, consequences that can also lead to business shutdowns.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"530\" src=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2024\/05\/clutis-2024-1024x530.png\" alt=\"clutis-2024\" class=\"wp-image-14036\" srcset=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2024\/05\/clutis-2024-1024x530.png 1024w, https:\/\/www.telda.it\/it\/wp-content\/uploads\/2024\/05\/clutis-2024-980x507.png 980w, https:\/\/www.telda.it\/it\/wp-content\/uploads\/2024\/05\/clutis-2024-480x248.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p>In the last year 2.779 incidents have been recorded in Italy, the highest number ever.<\/p>\n\n\n\n<p>The sectors most affected are healthcare, finance and manufacturing, but no company can be considered safe, even companies that implement antivirus, firewalls and IPS, as even a wrong configuration or for example a failure to update can expose the company to the risk of cyber attacks since the attackers exploit precisely the vulnerabilities present in the systems to launch their attacks.<\/p>\n\n\n\n<p>Why make a Vulnerability Assessment?<\/p>\n\n\n\n<p>The Vulnerability Assessment can be carried out on different levels of technology, at the host\/server\/client level, at the network, application, web Application, websites etc., it is not invasive as a Penetration Test and does not involve operational interruptions.<\/p>\n\n\n\n<p>Making a Vulnerability Assessment are identified the vulnerabilities present after which, through a careful analysis, which will assess the severity and possible damage that could cause, and excluding any false positives, A detailed report will be drawn up with the classification of vulnerabilities and indications of remedietion to be implemented to secure the systems.<\/p>\n\n\n\n<p>The report will also be used to support GDPR compliance and can be attached to the privacy documentation in view of Accountability and to demonstrate the security implemented.<\/p>\n\n\n\n<p>By organising Vulnerability Assessment at regular intervals, it is possible to ensure the security of systems while safeguarding the future of the company.<\/p>\n\n\n\n<p>If you want more information or request a quote do not hesitate to contact us<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assessing the state of your systems through a Vulnerability Assessment allows you to identify the vulnerabilities present so you can optimize the company\u2019s posture by strengthening security..&nbsp; News of cyber attacks and violations are constantly increasing, analyzing the Clutis 2024 report we can see that this trend also affects Italy. But what are the risks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13570,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[104,107,110,113],"tags":[],"class_list":["post-14075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-en","category-data-protection-en","category-gdpr-en","category-web-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection<\/title>\n<meta name=\"description\" content=\"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"og:description\" content=\"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-31T11:17:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T11:18:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Telda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Telda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\"},\"author\":{\"name\":\"Telda\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7\"},\"headline\":\"Why make a Vulnerability Assessment\",\"datePublished\":\"2024-05-31T11:17:40+00:00\",\"dateModified\":\"2024-05-31T11:18:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\"},\"wordCount\":361,\"publisher\":{\"@id\":\"https:\/\/www.telda.it\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg\",\"articleSection\":[\"Cyber Security\",\"Data Protection\",\"GDPR\",\"web\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\",\"url\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\",\"name\":\"Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.telda.it\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg\",\"datePublished\":\"2024-05-31T11:17:40+00:00\",\"dateModified\":\"2024-05-31T11:18:34+00:00\",\"description\":\"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage\",\"url\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg\",\"contentUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg\",\"width\":1170,\"height\":700,\"caption\":\"consulenza cybersecurity one shot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.telda.it\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why make a Vulnerability Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.telda.it\/it\/#website\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"name\":\"Telda - Telecom & Data Protection\",\"description\":\"IT Company\",\"publisher\":{\"@id\":\"https:\/\/www.telda.it\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.telda.it\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.telda.it\/it\/#organization\",\"name\":\"TELDA\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"contentUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"width\":114,\"height\":114,\"caption\":\"TELDA\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/telda_it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7\",\"name\":\"Telda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g\",\"caption\":\"Telda\"},\"url\":\"https:\/\/www.telda.it\/it\/author\/webedesign\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection","description":"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/","og_locale":"it_IT","og_type":"article","og_title":"Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection","og_description":"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.","og_url":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/","og_site_name":"Telda - Telecom &amp; Data Protection","article_published_time":"2024-05-31T11:17:40+00:00","article_modified_time":"2024-05-31T11:18:34+00:00","og_image":[{"width":1170,"height":700,"url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg","type":"image\/jpeg"}],"author":"Telda","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Telda","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#article","isPartOf":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/"},"author":{"name":"Telda","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7"},"headline":"Why make a Vulnerability Assessment","datePublished":"2024-05-31T11:17:40+00:00","dateModified":"2024-05-31T11:18:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/"},"wordCount":361,"publisher":{"@id":"https:\/\/www.telda.it\/it\/#organization"},"image":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg","articleSection":["Cyber Security","Data Protection","GDPR","web"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/","url":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/","name":"Why make a Vulnerability Assessment - Telda - Telecom &amp; Data Protection","isPartOf":{"@id":"https:\/\/www.telda.it\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage"},"image":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg","datePublished":"2024-05-31T11:17:40+00:00","dateModified":"2024-05-31T11:18:34+00:00","description":"Why make a Vulnerability Assessment, it is not invasive as a Penetration Test and does not involve operational interruptions.","breadcrumb":{"@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#primaryimage","url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg","contentUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/08\/Canva-Security-Logo-1.jpg","width":1170,"height":700,"caption":"consulenza cybersecurity one shot"},{"@type":"BreadcrumbList","@id":"https:\/\/www.telda.it\/it\/why-make-a-vulnerability-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.telda.it\/it\/"},{"@type":"ListItem","position":2,"name":"Why make a Vulnerability Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.telda.it\/it\/#website","url":"https:\/\/www.telda.it\/it\/","name":"Telda - Telecom & Data Protection","description":"IT Company","publisher":{"@id":"https:\/\/www.telda.it\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.telda.it\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.telda.it\/it\/#organization","name":"TELDA","url":"https:\/\/www.telda.it\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","contentUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","width":114,"height":114,"caption":"TELDA"},"image":{"@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/telda_it"]},{"@type":"Person","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7","name":"Telda","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g","caption":"Telda"},"url":"https:\/\/www.telda.it\/it\/author\/webedesign\/"}]}},"_links":{"self":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/comments?post=14075"}],"version-history":[{"count":1,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14075\/revisions"}],"predecessor-version":[{"id":14076,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14075\/revisions\/14076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/media\/13570"}],"wp:attachment":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/media?parent=14075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/categories?post=14075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/tags?post=14075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}