cyber-security-difensori-rete cyber-security-difensori-rete

Defenders of the Web

Who protects your data?

- + Text size
Print

How do you combat a hacker attack? And, above all, what damage can an attack cause for end users? We only need to think of the sensitive data in our smartphones to understand the impact it would have on our lives.

In recent years, the security risk scenario has dramatically changed. The activities of cybercriminals are continuously developing with regard to the extent of the phenomenon and the complexity of the attacks, which are gradually becoming more and more “refined”.

But very few people, other than “experts”, really know the risks associated with this type of crime. This is why Telecom Italia brings into play the best professionals and state-of-the-art technologies in the cybersecurity field to guarantee protection of information, networks and services, and prevent cyber attacks.

Who are the defenders of the Web at Telecom Italia?

At Telecom Italia, activities to prevent and combat cyber attacks are managed by two centres of excellence: the Security Lab and the Security Operation Center (SOC), with a total of over 100 experts working in the field of cybersecurity.

The Security Lab studies the threats of cybersecurity, analyses new risk scenarios, pursues and develops innovative solutions and tools, experiments with them and implements tests in its laboratories to identify preventive solutions for eventual emergency outbreaks, connected, for example, with the development of new technologies.

The Security Operation Center (SOC) is the monitoring centre that handles the security alerts from the telecom networks and the data centres that host applications belonging to Telecom Italia and its customers and users. The SOC puts into action not only cutting-edge tools but also veritable cybersecurity experts, analysts who have also had the opportunity to face challenges on a European scale, achieving excellent results.

The password: ready for anything

To date, a cyber attack cannot be prevented a priori. No products or software can make a system completely secure.

Luckily, it is more than likely, however, that a set of tools and skills can be put into action, combining different approaches and technologies so that an attack in progress can be immediately identified with prompt intervention.

It may seem strange but some types of attackenter the victim’s computer system very slowlyand manage to pass unnoticed. In this case, they are known as APT (Advanced Persistent Threats)continuous intrusions that can be mistaken by the user as temporary malfunctionsTelecom Italia is making considerable investment in order to integrate more and more tools and technologiesspecifically designed to identify these APT attacks, the most difficult to recognise and combat.

In fact, traditional security technologies, from traditional antivirus or Anti-Malware systems to enterprisewide solutions, such as IDS, IPS and URL filtering, can do little to face attacks made with malware that has never been used beforeand that exploit vulnerabilities and unpatched systems yet to be discovered.