Cyber Security, or information security, is the set of practices, tools and strategies used to protect computer systems, networks, devices and data from attacks and access [...]
How to protect my email: learn how Shellrent's Mail Protection improves the delivery and security of your emails. The ideal tool for protecting your [...]
In an increasingly digitalized world, online user privacy has become a central issue. Organizations are required to comply with certain relevant regulations [...]
Introduction Recently, I had a rude awakening into the dark world of cybercrime. A card testing attack was performed on our custom platform, peter.gtechgroup.it, [...]
Anonymous search engines are a great option for protecting your online browsing. Find out more about the best options available and how they can help you [...]
Google Analytics is illegal: after the official announcement by the Italian privacy guarantor, the beneficiaries of the service must "come into compliance" with current regulations [...]
Privacy and cookie policy: what are the differences and elements that distinguish these documents relating to data tracking. The one related to cybersecurity is [...]
VAT electronic invoicing, from 1 January 2019 the use of the e-invoice in commercial transactions between private individuals becomes mandatory. Digital in recent years [...]
The text on the new copyright directive brought forward in European buildings protects the copyright of creators of content conveyed on the web. The votes showed [...]
What is Google Play Protect: here is the security system for the Android universe. Continuous control over the applications present on the Play Store and on the system devices [...]
The stop to gambling advertising is among the main focuses of the Dignity Decree promoted by the government that took office a few months ago. This is a maneuver that will have a strong impact [...]
DPIA: Data Protection Impact Assessment, impact assessment of the protection of private data Here are the main characteristics of the DPIA, Data Protection Impact Assessment, the impact assessment of the [...]
DPO – Data Protection Officer, the professional figure created with the EU regulation on privacy To guarantee greater protection of personal information, the European Union has [...]
GDPR checklist, how to adapt your website to the EU privacy regulation To comply with your website with the general privacy regulation, promoted by the Union [...]
GDPR and WordPress: is your site compliant? Download my PDF Here is the ePrivacy Regulation, the EU legislation on the protection of personal data online Currently, [...]
Italiano
Italiano
English
Deutsch (Sie)
Español
Français
Italiano
Italiano
English
Deutsch (Sie)
Español
Français
Manage Cookie Consent
We use cookies to optimize our website and services.
Functional
Always active
Technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
Technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
Technical storage or access that is used exclusively for statistical purposes.Technical storage or access that is used solely for anonymous statistical purposes. Without a subpoena, voluntary compliance by your Internet Service Provider, or additional records from third parties, information stored or retrieved for this purpose alone cannot usually be used for identification.
Marketing
Technical storage or access is necessary to create user profiles to send advertisements, or to track the user on one website or several websites for similar marketing purposes.