Skip to content
10punto10
  • NEXUS
  • NOC10
  • About
  • Blog
  • Academy
IT | EN
Contact Us
IT MANAGEMENT
  • 24/7 IT Monitoring
  • Help Desk
  • IT Infrastructure
  • Networking
  • Backup & DR
  • Cloud Migration
  • Digital Workplace
  • AI for SMBs
CYBERSECURITY
  • Endpoint Protection
  • VAPT: Penetration Testing
  • Business Continuity & DR
  • M365 Security Audit
  • CSPM: Cloud Security
  • NIS2: Compliance
  • Security Awareness
  • SASE: Secure Access
SOLUTIONS
  • Manufacturing & OT
  • Healthcare
  • Hospitality
  • PCI DSS / Retail
  • Professional Firms
  • Public Administration
CYBERSECURITY
  • Sophos
  • Fortinet
  • WatchGuard
  • Check Point
  • Kaspersky
INFRASTRUCTURE
  • Dell Technologies
  • HPE
  • Huawei
  • Acronis
  • Vertiv
AWARENESS
  • Cyber Guru
MONITORING & AUTOMATION
  • NinjaOne
  • Zabbix
10punto10
  • NEXUS
  • NOC10
IT Management
  • 24/7 IT Monitoring
  • Help Desk
  • IT Infrastructure
  • Networking
  • Backup & DR
  • Cloud Migration
  • Digital Workplace
  • AI for SMBs
Cybersecurity
  • Endpoint Protection
  • VAPT: Penetration Testing
  • Business Continuity & DR
  • M365 Security Audit
  • CSPM: Cloud Security
  • NIS2: Compliance
  • Security Awareness
  • SASE: Secure Access
Solutions
  • Manufacturing & OT
  • Healthcare
  • Hospitality
  • PCI DSS / Retail
  • Professional Firms
  • Public Administration
Partners
  • Sophos
  • Fortinet
  • WatchGuard
  • Check Point
  • Dell
  • HPE
  • Huawei
  • Acronis
  • Kaspersky
  • Vertiv
  • Cyber Guru
  • NinjaOne
  • Zabbix
Company
  • About
  • Blog
  • Academy
IT EN
Client Portal →
sales@10punto10.eu · 02 87176855
10punto10 blog on cybersecurity, IT and compliance for SMBs

Blog

Guides and insights on cybersecurity and IT for SMBs

11 mag 2026

Cybersecurity for Medical Devices: Why They Are Critical

Discover why medical device cybersecurity is critical for European healthcare businesses. Learn key risks, EU regulations, and strategies to protect connecte...

cybersicurezza dispositivi medicisicurezza informatica sanitàcybersecurity sanità
Read article →
4 mag 2026

Sustainable Artificial Intelligence: Risks for Businesses

Discover why sustainable AI and ESG risks are a growing concern for businesses. Learn how to balance AI innovation with environmental and governance responsi...

intelligenza artificiale sostenibileAI e sostenibilità aziendalerischi reputazionali intelligenza artificiale
Read article →
27 apr 2026

DORA NIS2 AI Act Compliance: The Triple Regulatory Challenge

Discover how DORA, NIS2 and AI Act converge into one compliance challenge for EU businesses — and the coordinated strategy you need to stay resilient.

conformità DORA NIS2 AI Actnormativa cybersecurity aziendeadeguamento NIS2 PMI
Read article →
20 apr 2026

Technical Debt: Migrating Legacy Systems with Generative AI

Discover how generative AI helps European SMBs tackle technical debt and migrate legacy systems affordably. Cut maintenance costs and unlock growth.

debito tecnicotrasformazione digitale pmiAI generativa per aziende
Read article →
13 apr 2026

APT31: Chinese Cyber Espionage Targeting Russian Tech for Years

Learn how APT31's years-long Chinese cyber espionage campaign targeting tech firms impacts European businesses and what SMBs must do to strengthen cybersecur...

cybersecurity italiasicurezza informatica aziendecyber spionaggio cinese
Read article →
6 apr 2026

CISO on Trial: NIS2, Legislative Decree 231, and Personal Liability

Learn why NIS2 and DORA make CISOs personally liable for cybersecurity failures — and what European SMBs must do now to ensure compliance and protect leaders...

CISO sotto processoNIS2D.Lgs. 231
Read article →
30 mar 2026

Business backup 2026: why 60% of SMBs wouldn't recover from a disaster

60% of SMBs lack adequate business backup. A practical guide to disaster recovery, business continuity and the 3-2-1 rule to protect your company data.

business backupdisaster recoverybusiness continuity
Read article →
24 mar 2026

Digital Omnibus 2026: What Changes for GDPR and How to Prepare

Discover how the EU Digital Omnibus 2026 reforms GDPR compliance for SMBs, cutting administrative burden by 25% while preserving data protection standards.

GDPRDigital Omnibusdata breach
Read article →
23 mar 2026

Cloud Vouchers and Cybersecurity 2026: A Guide for Italian SMEs

Learn how Italy's MIMIT cybersecurity and cloud voucher helps SMBs fund security tools, cloud migration, and training , covering up to 70% of eligible costs.

vouchercybersecurityPMI
Read article →
17 mar 2026

DORA 2026: Requirements and Deadlines for Italian SMEs

DORA compliance 2025-2026: what European SMBs need to know about ICT risk management, reporting obligations, and supply chain resilience under EU Regulation ...

cybersecurityDORA - Regolamento UEDORA
Read article →
19 feb 2026

Wall Street lost $285 billion: what AI agents mean for Italian SMBs

Claude AI for SMBs: realistic analysis of capabilities, GDPR and NIS2 constraints, and automation levels achievable by 2027 for Italian businesses.

Claude AICoworkAI Aziendale
Read article →
17 feb 2026

NIS2: the first month of notifications in Italy

NIS2 notifications are live in Italy since January 2026. What the first month revealed about the gap between compliance and operational readiness.

NIS2CybersecurityCSIRT Italia
Read article →
27 gen 2026

Identity is the new perimeter: why IAM is not enough without ITDR

IAM alone cannot detect credential abuse. Learn how ITDR uses behavioral analytics to catch identity-based threats that bypass MFA and traditional security.

IAMITDRCybersecurity
Read article →
20 gen 2026

Moody's Announces the End of the Firewall: What Changes for Italian CISOs

Moody's predicts the end of traditional firewalls. Learn why perimeter security is obsolete and what European SMBs must do to protect cloud-first operations.

CybersecurityFirewallSASE
Read article →
5 gen 2026

NIS2: ACN Determinations 379887 and 379907 - What Changes From January 2026?

Discover what ACN determinations 379887 and 379907 mean for NIS2 compliance in Italy. Key obligations, deadlines, and steps your business must take now.

NIS2ACNCybersecurity
Read article →
10 dic 2025

NIS2-Compliant Business Logs: Integrity, Timestamps, and Open Source for Real-World Compliance

Learn how NIS2 makes log management a compliance obligation for SMBs. Discover open source tools to build tamper-proof, auditable logging and avoid fines up ...

NIS2Log ManagementCybersecurity
Read article →
14 nov 2025

Clusit Report 2025 [Update]: Italy Is Still a Prime Target

Italy faced 357 serious cyberattacks in 2024, absorbing 10% of global incidents. Discover what the Clusit 2025 report reveals about the sectors most at risk.

cybersecurityThreat Landscape ItaliaClusit
Read article →
28 ott 2025

The Cloud Is an Extraordinary Technology. Not the Solution to All Your Problems.

Cloud computing isn't a magic fix for every business. Discover hidden costs, wasted spend, and when cloud truly makes sense for European SMBs.

ICTCloud Strategystrategia
Read article →
21 ott 2025

AI Act Italy: Complete Guide to Law 132/2025 — Funding, Implementation Challenges, and Critical Issues

Learn how Italy's Law 132/2025 translates the EU AI Act into national rules, what it means for businesses, and how to prepare for AI compliance in Europe.

intelligenza artificialeAI Act / Legge 132/2025Legge
Read article →
13 ott 2025

AI Act Italy: Complete Guide to Law 132/2025 — Critical Sectors and Criminal Penalties

Italy's Law 132/2025 adds criminal sanctions and strict sector rules to the EU AI Act. Here's what European businesses must know to stay compliant.

intelligenza artificialeAI Act / Legge 132/2025settori
Read article →
6 ott 2025

AI Act Italy: Complete Guide to Law 132/2025 — ACN and AgID Leading Italian AI Governance

Learn how Italy's Law 132/2025 enforces the EU AI Act through ACN and AgID, and what it means for business compliance with AI regulations in Europe.

intelligenza artificialeAI Act / Legge 132/2025AgID
Read article →
29 set 2025

TCS: The £800 Million Supplier That Paralyzed Jaguar Land Rover

Learn how Jaguar Land Rover's TCS crisis exposed the dangers of single-vendor IT dependency and what European SMBs must do to reduce vendor lock-in risk.

intelligenza artificialesupply chainVendor Risk / Supply Chain Attack
Read article →
21 set 2025

From Collins Aerospace to NIS2: How a Compromised Supplier Paralyzes Europe

Learn how the Collins Aerospace supply chain breach exposed cascading cyber risks and what NIS2 means for European SMBs protecting their supply chains.

intelligenza artificialesupply chainVendor Risk / NIS2
Read article →
18 set 2025

From Unaware Clicks to Human Firewall: How Security Awareness Is Transforming Corporate Defense

Employees are behind 68% of breaches. Discover how security awareness training turns your team into a human firewall and helps meet NIS2 compliance obligations.

cybersecuritySecurity Awarenesssecurity
Read article →
5 set 2025

From password123 to Zero Trust: How Enterprise Password Management Is Changing the Rules

Discover why weak passwords remain the #1 security risk for businesses and how enterprise password management with Zero Trust architecture protects your comp...

cybersecurityPassword Management / Zero Trustpassword
Read article →
26 ago 2025

ToolShell: The SharePoint Attack That Has Already Compromised 75 Companies

Learn how the ToolShell attack exploits Microsoft SharePoint vulnerabilities to backdoor corporate networks. Discover how European SMBs can detect and defend...

cybersecurityVulnerabilità / CVEvulnerabilità
Read article →
19 ago 2025

Cybersecurity in Hospitality: Why Hotels Have Become Cybercriminals' Favorite Target

Discover why hotels are prime targets for cyberattacks, the unique vulnerabilities in hospitality IT systems, and how European hotel operators can protect gu...

cybersecurityVertical: Hospitalityhotel
Read article →
12 ago 2025

Vishing: The Attack That Compromised Google

Discover how vishing attacks exploited Google's defences and learn practical steps to protect your business from voice phishing and social engineering threats.

cybersecuritySocial Engineeringvishing
Read article →
6 ago 2025

Open Source in Business: Strategic Questions Every IT Manager Should Ask

Discover why open source is a strategic business decision in 2026. Learn key questions IT managers should ask about governance, licensing, and long-term ROI.

ICTOpen Source Strategyopen
Read article →
15 lug 2025

SOC vs MDR vs SIEM: The Ultimate Guide for Italian SMBs to Make the Right Cybersecurity Investment

Discover the key differences between SOC, MDR, and SIEM to find the right cybersecurity solution for your business size, budget, and risk profile.

cybersecuritySOC / MDR / SIEMSIEM
Read article →
8 lug 2025

How to Build an Effective Proactive Monitoring Strategy: NOC, Automation and AI for IT

Reactive IT management drains your budget. Learn how proactive monitoring, NOC services, and AI-driven analytics help European SMBs cut downtime and reduce c...

ICTNOC / Monitoraggio ITmonitoraggio
Read article →
24 giu 2025

AI and Cybersecurity — Why It's No Longer Optional but Survival

Discover why AI-powered cybersecurity is essential for European SMBs. Learn how artificial intelligence detects threats in real time and protects your business.

intelligenza artificialeAI per Cybersecuritycybersecurity
Read article →
17 giu 2025

Copyright and AI — The Legal Wild West Nobody Wants to Face

Discover how AI and copyright law collide for EU businesses. Learn the legal risks of AI-generated content and what the EU AI Act means for your company.

intelligenza artificialeAI e proprietà intellettualecopyright
Read article →
13 giu 2025

EchoLeak: Zero-Click Vulnerability in Microsoft 365 Copilot

Discover how the EchoLeak zero-click vulnerability in Microsoft 365 Copilot exposes sensitive business data through prompt injection, and what European SMBs ...

cybersecurityAI Security / VulnerabilitàEchoLeak
Read article →
10 giu 2025

From Risk to Opportunity — How AI Becomes Your Ally

Discover how AI transforms European SMBs: 23% productivity gains, 15-30 hours saved weekly, and practical strategies to turn AI from a risk into your biggest...

intelligenza artificialeAI Adoption / ROIaziendale
Read article →
3 giu 2025

Shadow AI — The Hidden Time Bomb in Your Company

Shadow AI is the hidden use of unauthorized AI tools in your organization. Learn how it spreads, the risks it creates, and why your business must act now.

intelligenza artificialeShadow AI / AI GovernanceShadow
Read article →
26 mag 2025

Italian Hospitals Under Siege: Shocking Data From the Clusit 2024 Report

Italian hospitals faced a 65% surge in cyberattacks in 2023, making healthcare the top target for ransomware. Learn how breaches exposed sensitive patient data.

cybersecurityHealthcare Cybersecurityospedali
Read article →
8 mag 2025

SessionShark: The Phishing Kit That Bypasses MFA and You Never Want to Encounter

SessionShark phishing toolkit bypasses Microsoft 365 MFA by stealing session tokens. Learn how AitM attacks work and how to protect your business.

cybersecurityPhishing / MFA BypassSessionShark
Read article →
28 apr 2025

How Hard It Is to Be in Europe!

EU digital regulations are reshaping European business. Discover how GDPR, the AI Act, and NIS2 impact SMBs and what compliance strategies actually work in 2...

trend tecnologiciRegolamentazione UE Digitalregolamentazione
Read article →
10 apr 2025

US Tariffs? Everyone's Talking About Them. Choose the Wrong IT Provider, and Your Business Is at Serious Risk.

US tariffs are disrupting IT supply chains worldwide. Learn how European SMBs can avoid budget overruns, delivery delays, and vendor lock-in by choosing the ...

trend tecnologiciGeopolitica & Vendor Riskdazi
Read article →
1 apr 2025

Cyber Risk for Italian SMEs

Italian SMBs face growing cyber threats: learn the real costs of breaches, common security mistakes, and practical steps to protect your business in 2025.

cybersecurityPMI Cybersecurityrischio
Read article →
27 mar 2025

AI Answers You. And Rips You Off.

Discover what prompt injection is and why it threatens your AI-powered tools. Learn how attackers manipulate chatbots and how European SMBs can protect their...

intelligenza artificialeAI Security / Prompt Injectionprompt
Read article →
14 mar 2025

Clusit 2025 Report: A Complete Analysis of the Cybersecurity Landscape in Italy and Global Markets

Clusit 2025 report reveals 3,541 serious cyber incidents globally, up 27%. Italy faces 65% growth in attacks. What European SMBs must know about rising threats.

cybersecurityThreat Landscape ItaliaClusit
Read article →
7 mar 2025

The European Cybersecurity Landscape

Learn how EU cybersecurity regulations like NIS2 affect your business. Discover key compliance requirements for SMBs operating in Italy and across Europe.

cybersecurityCybersecurity Europea / ENISAeuropea
Read article →
26 feb 2025

Microsoft Launches Majorana 1: The Quantum Chip That Promises to Change Everything

Discover how Microsoft's Majorana 1 quantum chip could transform business computing. Learn what topological qubits mean for European SMBs and why preparing n...

intelligenza artificialeQuantum ComputingMicrosoft
Read article →
19 feb 2025

The Era of Wild Innovation Is Over. The EU Has Set New Rules on Digital Product Liability

The EU's new product liability directive puts software, AI and digital products under strict liability. Here's what your business needs to know before 2026.

trend tecnologiciProduct Liability Digitale UEresponsabilità
Read article →
12 feb 2025

Microsoft 365 Copilot: How It Works and What It's For – The New Frontier of Business Productivity

Discover how Microsoft 365 Copilot helps European SMBs boost productivity with AI in Word, Excel, Outlook and Teams. Learn key features, costs and real benef...

intelligenza artificialeMicrosoft 365 CopilotMicrosoft
Read article →
5 feb 2025

DeepSeek: The Chinese Startup Revolutionizing the Artificial Intelligence Market

Discover how DeepSeek is reshaping AI economics for European SMBs with open-source models at a fraction of the cost of Western competitors like OpenAI.

intelligenza artificialeLLM / AI GenerativaDeepSeek
Read article →
30 gen 2025

GhostGPT: The New Frontier of Cybercrime and Its Business Implications

Discover how GhostGPT, an uncensored AI chatbot, is fueling phishing and malware attacks, and what European SMBs must do to defend against this growing threat.

cybersecurityAI e CybercrimeGhostGPT
Read article →
22 gen 2025

From Digital Report Cards to Oil Tanker Routes: How a 15-Year-Old Hacker Infiltrated Critical Systems in the Mediterranean

A teenager hacked oil tankers by exploiting OT security flaws. Learn why operational technology is your business's biggest blind spot and how to fix it.

cybersecurityOT Security / Casi Realihacker
Read article →
15 gen 2025

Welcome to the Corporate Dark Web: When Businesses Fuel the Data Black Market

Discover how businesses accidentally fuel the dark web data black market through credential leaks, misconfigured clouds, and poor security practices.

cybersecurityDark Web / Data Breachdark
Read article →
8 gen 2025

QR Codes? Watch What You Scan!

Learn what quishing is, how QR code phishing attacks target European SMBs, and practical steps your business can take to detect and prevent this growing cybe...

cybersecurityPhishing / Quishingcode
Read article →
2 gen 2025

Welcome 2025! What Tech Innovations Await Us?

Discover the key technology trends reshaping European SMBs in 2025, from practical AI adoption to EU regulations and cybersecurity challenges for small busin...

trend tecnologiciTrend Annuali Techinnovazioni
Read article →
27 dic 2024

Industry from 4.0 to 5.0: What Should We Expect?

Discover how Industry 5.0 differs from Industry 4.0 and what it means for your business. Learn to prepare for the shift toward human-centred, sustainable tech.

trend tecnologiciDigital Transformation / IndustriaIndustria
Read article →
16 dic 2024

Tech Fake News We Still (Probably) Believe

Discover the most common tech myths still misleading businesses in 2025, from Mac security to SMB targeting, and learn how to protect your company.

trend tecnologiciDebunking Techfake
Read article →
10 dic 2024

Can a 16-Year-Old Malware Still Cause Damage? Yes, If It's Called Conficker

Conficker worm still infects hundreds of thousands of systems worldwide. Learn how this 2008 threat spreads and why legacy Windows networks remain at risk.

cybersecurityLegacy Malware / Patch ManagementConficker
Read article →
6 dic 2024

Spotify Wrapped 2024 — The Algorithms Working Behind the Scenes

Discover how Spotify Wrapped uses algorithms and machine learning to turn data into engagement, and what European SMBs can learn from its powerful business s...

trend tecnologiciData Science / AlgoritmiSpotify
Read article →
5 dic 2024

10punto10 Tech News — First Newsletter Issue

Discover why curated tech newsletters help Italian SMBs navigate digital transformation, ICT trends, and business technology decisions in 2026.

trend tecnologiciNewsletter / Brand10punto10
Read article →
IT MANAGEMENT
  • 24/7 IT Monitoring
  • Help Desk
  • IT Infrastructure
  • Networking
  • Backup & DR
  • Cloud Migration
  • Digital Workplace
  • AI for SMBs
CYBERSECURITY
  • Endpoint Protection
  • VAPT: Penetration Testing
  • Business Continuity & DR
  • M365 Security Audit
  • CSPM: Cloud Security
  • NIS2: Compliance
  • Security Awareness
  • SASE: Secure Access
  • NEXUS
PARTNERS
  • Sophos
  • Fortinet
  • WatchGuard
  • Check Point
  • Dell Technologies
  • HPE
  • Huawei
  • Acronis
  • Kaspersky
  • Vertiv
  • NinjaOne
SOLUTIONS
  • Manufacturing & OT
  • Healthcare
  • Hospitality
  • PCI DSS / Retail
  • Professional Firms
  • Public Administration
COMPANY
  • About
  • Blog
  • Academy
CONTACT

sales@10punto10.eu

02 87176855

Viale Monza 347, 20126 Milano (MI)
Via Monfalcone 17-19, 20099 Sesto San Giovanni (MI)

10punto10
Privacy Policy | Cookie Policy | Cookie Settings

© 2026 Sede legale: Viale Monza 347, 20126 Milano | 10punto10 S.r.l. | P.IVA: 10436090962 | REA: MI-2531497 | Reg. Imprese MI: 10436090962 | Cap. Soc. €10.000 i.v.

IT | EN

This website uses cookies. We use technical cookies necessary for proper operation and, with your explicit consent, Google Analytics analytics cookies in anonymized mode for aggregated statistical purposes. We do not share information with advertising or social media partners, nor do we use profiling cookies. Cookie Policy