Cyber ​​attacks are always on the rise, and both the monthly frequency and the criticality are growing because cyber criminals are increasingly determined and precise in their operations.

The victims are the most disparate and no sector is now protected from cybercrime which uses different techniques to pursue the result by penetrating the targeted systems, obtaining data, information or infiltrating malicious software.

On the other hand, digital is increasingly widespread and we all rely every day on computers and smartphones (spoiler: smartphone is a computer!). This exposes us more and more to Cyber ​​risks and threats.

At this point Cybercrime is the main motivation of cyber attacks and more valuable than drugs market. If Cybercrime were a country, it would be the third largest economy in the world after the US and China.

In 2021 Cybercrime causes $6 trillion in damage globally and this figure is expected to increase.

It is therefore a priority to be aware of the situation around us, as well as to stay updated on Cyber ​​Security issues, whose purpose is in fact to protect assets, not only data or IT systems, but everything that has value and is important for companies and people.

In the case of pacemakers connected to the internet or electric cars, for example, we are also talking about human lives because every device connected to the network can potentially be violated.

So, if on the one hand, as we have seen, the value and importance of Cyber ​​Security are undeniable, on the other hand there is still a serious shortage of positions in this sector.

Globally, there are currently 3.5 million job vacancies in the IT security sector, 400,000 in Europe alone, 2 million in the Asia and Pacific regions.

The growth rate in this sector was 350% from 2013 to 2021, a figure never seen before.

And since 2011 the unemployment rate is 0%.

With these tempting premises, why are there no more Cyber ​​Security employees and young people find it hard to choose this course of study?

In part this certainly depends on the still erroneous perception of these functions.

Working in Cyber ​​Security is considered an exclusively technical occupation for which you need a special predisposition, or something reserved only for nerds. Nothing more wrong!

Technical activities are certainly needed, and in this case, the necessary hard skills can be learned.

Positions that are not necessarily technical are also needed to cover managerial, legal, marketing, sales and communication needs.

So, certainly technical skills are useful, but soft skills are equally fundamental: skills such as analytical and deductive reasoning, lateral thinking, predisposition to problem solving, attention to detail, the ability to work in a team and strong communication abilities are more important than you think.

Training it is also essential as well as a good (or better excellent) knowledge of English, curiosity and the desire to continue learning.

But it is above all by leaving your comfort zone that you grow more.

Good job!

Latest news





ECSM (European Cyber Security Month) is an initiative coordinated by Enisa (European Union Agency for Information Security) and the European Commission, with the aim of promoting Cyber Security through events and initiatives to raise awareness.

The campaign takes place every year in October and is supported by EU Member States and hundreds of European partners.

Since its first edition in 2012, the European Cyber Security Month has promoted its activities by adopting the slogan “Information Security is a shared responsibility”.

The EU Cyber Security Agency coordinates the organization of the ECSM campaign each year by acting as a “hub” for all Member States, EU institutions and participating organizations.

The 2021 edition is strongly influenced by the Covid-19 pandemic, which although it helped to spread the use of digital, on the other hand had put system security to a severe test.

The main objective is always to ensure that EU end users and organizations receive correct information about Cyber Security in order to understand risks and main threats.

#ThinkB4UClick (think before clicking) is therefore the main theme of this year’s campaign, in its 2 forms:

  • First aid, guidelines on what to do if you fall victim to a cyber attack
  • Be cyber-safe at home

Even this year the European Cyber Security Month will be supported in Italy by Clusit (Italian Association for Cyber Security) together with various organizations, universities and research centers.


You can find the list of initiatives promoted by the association for the ECSM2021 campaign in CLUSIT website.

As a member of the Clusit Scientific Committee, our CEO Sofia Scozzari is one of the Italian Partners for the ECSM2021 and she will participate with a series of events and initiatives.

To join the campaign, you can add an activity on the Cyber Security Month website or by sending it to Clusit.

You can also support the campaign online on Twitter or Facebook with references to @CyberSecMonth, #CyberSecMonth, #ThinkB4UClick

Latest news





Data backup is not only a necessary step for a good business management.

When ransomware are in fact the most present and worrying cyber threat, Backup represents a solution to deal with any scenario that could compromise data and IT systems functionality, ensuring operational continuity.


Let’s see the three reasons why it’s important to have a good backup solution – and keep it separate from the IT systems! -:


1) Technology is not unfailing


In recent years we have witnessed enormous changes in our relationship with technology, relying always more on electronic devices such as computers and smartphones, and less on paper.

The result is that our most important information is often contained only on devices which by their nature are subject to unpredictable failures and malfunctions.

Backups help manage fatalities without data loss.


2) Humans make mistakes


Although we try to aspire to perfection, the truth is that we are human and therefore sooner or later we will make mistakes.

Errors such as accidental deletion of data, loss of important devices, incorrect procedure, can permanently compromise data.

A data backup and recovery solution is essential in order to be able to correct any mistakes.


3) The unexpected is just around the corner


Malware, and in particular Ransomware, are the main cause of disruption at the moment. It is estimated that 1 in 10 computers are infected with malware every month, while in 2019 a business was victimized by Ransomware every 14 seconds.

Thefts, data breaches, losses, various malfunctions (accidental or not), are other problems now on the agenda and totally unpredictable.

Being caught unprepared can cause, in addition to the permanent loss of data, the increase of IT costs, the reduction of trust in the company, the compromise of the relationship with the customer, reputational problems.


Ensuring a good backup and recovery plan helps to manage the unexpected and to maintain business confidence from customers, employees and investors.


In this scenario, Hackmanac can help you by verifying that the chosen Backup process is valid and sufficiently functional (i.e., separated from the systems it safeguards, always updated and easily manageable), in order to ensure resilience in the event of attacks or accidents.

Latest news

					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----