2022 2022 News-EN News-IT



why antivirus is not enough

It is often mistakenly believed that antivirus is an sufficient protection of the systems from cyber threats.

But that’s not the case, that’s why.

Antivirus is a protection against malware

Malware is malicious software that can infect computer systems by compromising them or allowing cybercriminals to access data.
The malware types are many: ransomware, trojans, spyware, wipers, cryptominers, worms, skimmers, … just to name a few.
Although malware is a significant problem, used in most cyber attacks (41% in 2021, see our Dashboard), there are other types of cyber threats.
These include, for example, Phishing, Social Engineering, exploitation of vulnerabilities, DDoS (Distributed Denial of Service), and much more.
Unfortunately, antiviruses are unable to deal with these threats and further solutions need to be put in place to mitigate them.

Not all antiviruses are created equal

Whether you choose a free antivirus or a paid one, modern products are generally of good quality, but they can differ in some features:

  • Reliability: the ability to correctly identify threats with a low number of false positives.
  • Quality of protection: the malware landscape is constantly changing, so a good antivirus must be able to update itself frequently and effectively detect and resolve the greatest number of threats.
  • Functionality: the antivirus must be able to perform its functions without significant impact on the system in use.
  • Ease of use: the antivirus must have an intuitive and easy to use interface, so that it can be used successfully even by less experienced users.
Don’t forget mobile devices!

Malware can also compromise mobile devices such as smartphones and tablets.
Since they are connected to the same network where there are computers and servers (both in the company and at home!), it is important to have antivirus protection also for all the used mobile devices.

Cyber Security involves numerous types of threats, which are constantly evolving.
For an adequate protection antivirus is certainly important but it is not enough.
On the contrary, to protect from the latest generation of cyber risks it is essential a targeted and customized strategy based on specific needs.

Find out how we can help you identify your customized Cyber Security strategy!

Latest news


It is often mistakenly believed that antivirus is an sufficient protection of the systems from cyber threats. Here are three reason why is not like...

Read More
2022 News-EN




In the previous article we explored how our cyber attacks analysis works.


Companies, institutions, research centers, insurance companies that offer policies against cyber risks, professionals dealing with threat modeling, cyber risk management and cyber strategy: the cyber attacks analysis can be useful to various entities.

In particular, we can identify 4 main objectives.

a)  Check the Cyber ​​Security strategy

From the analysis of the threats depicted in the scenario that we present each year, it is possible to understand where cyber security strategies have failed and how to improve them.

In fact, it is important that companies, as well as institutions and even more critical infrastructures, frequently check their defenses, as cyber problems are constantly evolving.

Getting insight into the latest threats that have proven successful is certainly the best way to gauge how effective your defenses might be or where to make changes to your overall strategy.

b) Identify threats specific to your industry

Still with regard to the refinement of one’s cyber defenses, evaluating which problems of the digital world particularly afflict one’s own product sector is a priority.

Cyber ​​attacks, in fact, include different types and do not affect all business areas in the same way.

It is reasonable to assume that institutions, critical infrastructures and multinationals or large companies are more exposed to cyber risks than small or medium-sized companies, but it is also true that they have fewer resources to manage emergencies.

Obtaining information on specific threats for your area and analyzing their trends over the years is therefore absolutely strategic to assess the situation and understand how to best defend yourself.

c) Optimize the budgets dedicated to Cyber ​​Security

The world of Cyber ​​Security is complex, we know, and unfortunately there is no single solution capable of remedying all related risks like a “magic bullet“.

On the contrary, the threats are different, so the defensive strategies will have to foresee a mix of technical, training, organizational and management solutions.

The cyber attacks analysis is very important to understand which components must not be missing in your specific mix and how to spend the corporate Cyber ​​Security budget more effectively and efficiently.

Only by understanding which threats concern your own sector you can be certain that you are reasonably evaluating the most correct purchases and actions.

d) Obtain data on cyber incidents

Our sample includes over 7,000 successful cyber attacks in the last 4 years, including more than 2,500 against Critical Infrastructures.

A number of notable events from which it is possible to deduce a lot of information, from the reasons for the attack, the product sector targeted, the type of technique used, the geographical area, the criticality of the attack and related impacts.

These information can be very relevant in particular for insurance companies that provide policies against cyber risks and that need data useful for assessing the frequency and severity of threats and to be able to correctly calculate the premium for the mitigation of the residual risk.

Although the aim of raising awareness on IT Security issues remains our main objective, the criticality of the situation that has arisen following the extraordinary growth of cyber threats has convinced us that this analysis must continue to evolve, transforming itself into a real work and decision support tool.

Contact us for more details and see a sample of our data on our Dashboard.

Latest news


It is often mistakenly believed that antivirus is an sufficient protection of the systems from cyber threats. Here are three reason why is not like...

Read More
2022 News-EN




Cyber ​​risk is something that can no longer be ignored.

Cyber attacks are always lurking and, as we described in the Clusit Report, they increase both in frequency and in criticality, maximizing the impacts of cybercrime.

On the other hand, the average time it takes for a company to identify a violation is 200 days, an exorbitant duration, during which criminals are free to carry out their maneuvers undisturbed.

Malware, data and identity theft, frauds, criminal activity by insiders, human errors, damage to computer hardware and software systems (accidental or not): the list of digital dangers to which business and assets are exposed corporate are infinite.

In addition to damage to IT systems and loss of data (company and customers’ data), it is also important to consider:

  • damage due to the interruption of activities;
  • loss of customers and suppliers;
  • legal issues and any claims for compensation from third parties;
  • reputational damage.

Cyber risk is certainly complex to assess: since it cannot be totally eliminated, it is a priority to find a way to mitigate it as much as possible.

Cyber ​​risk insurance is a useful tool for this purpose.

What is a Cyber ​​Risk Policy?

The insurances that allow you to manage cyber risk are policies useful for protecting commercial activities and business from criminal operations and related threats.

As we have seen, the components to be evaluated in cyber risk are many.

It is very important that the policy you choose offers 360 ° protection.

In addition, like car insurance, it is useful for the policy to allow you to evaluate which protections are worth adding based on the specifics of the client company, such as the sector, the size, the regulatory compliance to which it is subject.

This is in order to cover various potential needs in the event of a malicious or accidental event, such as:

  • economic losses
  • civil liability
  • legal protection
  • event management costs (for professionals to hire, for hardware and software purchases, for the protection of reputation)
Who needs a Cyber ​​Risk policy?

All companies, large and small, are exposed to cyber risks.

Large companies and multinationals can have very complex networks and IT systems and therefore a large attack surface.

Or, being often well known, they may be subject to more targeted attacks.

Small companies and professionals, on the other hand, despite being equally exposed to the risks of the cyber world, do not always have the budget sufficient to manage the consequences of malicious events.

Institutions and companies that offer critical services, such as those in the health sector, must finally protect the sensitive data they deal with and, at the same time, ensure operational continuity since they cannot allow cyber attacks or incidents of various kinds. (accidental or not) impact on the activities.

It is therefore evident that Cyber ​​Risk Policies can be useful to different realities, offering targeted and flexible protection.

Why subscribe to a Cyber ​​Risk policy?

In cyber security, preventive activities, such as the verification of computer systems, hardware and software (Vulnerability Assessment, Penetration Test, Code Review, …), or Awareness courses for staff, as well as defensive solutions (anti-malware, firewall , etc ..), are now essential to reduce exposure to digital threats.

But, however effective these may be, it will always remain a component of cyber risk that is difficult to assess and manage, as it is dependent on unforeseen events and complications.

Cyber ​​risk policies can be useful in mitigating these residual risks that could damage the business.
Cyber ​​risk insurance is useful for companies of all sizes, organizations and institutions.

Certainly not being able to replace the preventive operations or the defensive solutions of cyber security, they must, if anything, be considered as complementary to be sure of implementing a truly effective cyber security strategy.

Good job!

Latest news


It is often mistakenly believed that antivirus is an sufficient protection of the systems from cyber threats. Here are three reason why is not like...

Read More
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----