{"id":62705,"date":"2024-09-16T10:31:58","date_gmt":"2024-09-16T09:31:58","guid":{"rendered":"https:\/\/www.wallix.com\/healthcare-cybersecurity-why-pam-should-be-a-priority\/"},"modified":"2026-03-05T18:15:53","modified_gmt":"2026-03-05T17:15:53","slug":"healthcare-cybersecurity-why-pam-should-be-a-priority","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/","title":{"rendered":"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-llqndvnr-8a8822a09a13f9f4851f0ac978a8fd3c avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-62705'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4wmwti6-7a6f0e59d25330e0526fd9c4532551f0 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq0u6ark-e81e9265da58b892353c5c8ca1d813ec\">\n#top .av-special-heading.av-lq0u6ark-e81e9265da58b892353c5c8ca1d813ec{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq0u6ark-e81e9265da58b892353c5c8ca1d813ec .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq0u6ark-e81e9265da58b892353c5c8ca1d813ec .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq0u6ark-e81e9265da58b892353c5c8ca1d813ec av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  > Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/it\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >5 Marzo 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/privileged-access-management-it\/\" >PRIVILEGED ACCESS MANAGEMENT<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/settore-sanitario\/\" >SETTORE SANITARIO<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-llqnew8e-c5c3a230d164663e3e78d2ca4d5bc3d8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><b><span data-contrast=\"auto\">I recenti attacchi informatici a organizzazioni sanitarie, come l&#8217;ASL Napoli 3 Sud o l&#8217;Ospedale San Giovanni di Roma, hanno evidenziato la necessit\u00e0 per le istituzioni sanitarie di navigare in un panorama in costante cambiamento. Oltre ad adattarsi ai cambiamenti nel settore della salute pubblica, queste organizzazioni devono essere preparate ad affrontare minacce informatiche in evoluzione, spesso aggravate da identit\u00e0 rubate o accessi privilegiati compromessi.<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Che siano facilitati da minacce interne, hacking esterno o negligenza dei dipendenti, tutti i seguenti rappresentano rischi seri per le organizzazioni sanitarie:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Malware e ransomware<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Attacchi DDoS<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Violazioni dei dati personali<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Phishing<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Il settore sanitario non \u00e8 l\u2019unico a dover proteggere dati sensibili da queste minacce. Tuttavia, la natura dell&#8217;industria lo rende un bersaglio di alto profilo con molto da perdere in caso di violazioni. Questo blog esplorer\u00e0 i motivi per cui &#8211; e spiegher\u00e0 perch\u00e9 la gestione degli <\/span><a href=\"https:\/\/www.wallix.com\/it\/prodotti\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">accessi privilegiati (PAM)<\/span><\/a><span data-contrast=\"auto\"> rappresenta la migliore difesa.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Perch\u00e9 gli hacker prendono di mira le organizzazioni sanitarie?<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Come in molti altri settori, anche la sanit\u00e0 ha dovuto adattarsi all&#8217;era digitale e mobile. C&#8217;\u00e8 stato un incremento nell&#8217;uso dei dati sanitari personali elettronici (ePHI) e rapidi progressi nella tecnologia. L&#8217;adozione di dispositivi mobili e portali web self-service ha reso pi\u00f9 comoda l&#8217;interazione per i pazienti. Inoltre, con l&#8217;aumento dei dispositivi IoT e lo spostamento dei dati dei pazienti verso l&#8217;archiviazione nel cloud, si delinea una rete complessa e interconnessa.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Questi avanzamenti tecnologici hanno il potenziale di trasformare in meglio il settore sanitario. Tuttavia, hanno anche ampliato la superficie di attacco e creato un ambiente ricco di obiettivi per gli hacker. Purtroppo, molti ospedali italiani utilizzano software obsoleti o non supportati, e affrontano una carenza di competenze in materia di cybersecurity. Questo li rende un obiettivo particolarmente attraente per i criminali informatici.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Le conseguenze di una violazione dei dati nel settore sanitario sono enormi. La riservatezza dei dati dei pazienti \u00e8 da sempre un pilastro centrale della medicina, e la loro natura sensibile rende questi dati particolarmente preziosi. Le organizzazioni sanitarie italiane gestiscono una grande quantit\u00e0 di informazioni riservate che, nel dark web, hanno un grande valore. Un singolo record sanitario pu\u00f2 essere venduto a prezzi simili a quelli delle carte di credito rubate.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Il costo delle violazioni per le organizzazioni sanitarie italiane<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Investire in solide misure di cybersecurity pu\u00f2 portare risparmi significativi per le organizzazioni sanitarie italiane. Secondo una ricerca condotta da <\/span><b><span data-contrast=\"auto\">IBM Security<\/span><\/b><span data-contrast=\"auto\"> e dal <\/span><b><span data-contrast=\"auto\">Ponemon Institute<\/span><\/b><span data-contrast=\"auto\">, il costo medio di una violazione dei dati in Italia \u00e8 di circa <\/span><b><span data-contrast=\"auto\">\u20ac3,61 milioni<\/span><\/b><span data-contrast=\"auto\">, ma pu\u00f2 essere notevolmente pi\u00f9 alto nel settore sanitario, dove i dati dei pazienti sono particolarmente sensibili. Il costo per ogni record compromesso in Italia \u00e8 stimato intorno a <\/span><b><span data-contrast=\"auto\">\u20ac146<\/span><\/b><span data-contrast=\"auto\">, una cifra inferiore rispetto a paesi come gli Stati Uniti, ma comunque significativa\u200b(<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nel settore sanitario, la perdita di dati pu\u00f2 avere conseguenze devastanti. La violazione dei dati medici o la perdita di accesso a dispositivi vitali pu\u00f2 mettere a rischio la vita dei pazienti. Un esempio emblematico in Italia \u00e8 l&#8217;attacco ransomware del 2021 che ha colpito la <\/span><b><span data-contrast=\"auto\">Regione Lazio<\/span><\/b><span data-contrast=\"auto\">, compromettendo la campagna di vaccinazione COVID-19 e altre operazioni cruciali. Questo evento ha mostrato chiaramente l&#8217;impatto diretto della cybersecurity sulla salute pubblica\u200b.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Come la gestione degli accessi privilegiati (PAM) pu\u00f2 proteggere le organizzazioni sanitarie<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Monitorare e auditare l&#8217;accesso ai sistemi pu\u00f2 essere una sfida con il turnover dei dipendenti e la grande quantit\u00e0 di sistemi e dati privilegiati. I numeri e la natura distribuita degli utenti all&#8217;interno di un&#8217;organizzazione sanitaria rendono difficile gestirli e monitorarli efficacemente. Pi\u00f9 grande e complesso diventa un sistema, pi\u00f9 utenti privilegiati sono necessari. Gli utenti privilegiati possono includere:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Dipendenti<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Fornitori esterni<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Fornitori di cloud<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utenti di macchine automatizzate<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Appaltatori di terze parti<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Un sistema di gestione degli accessi privilegiati come <\/span><a href=\"https:\/\/www.wallix.com\/it\/prodotti\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">WALLIX PAM <\/span><\/a><span data-contrast=\"auto\">mette in sicurezza gli account privilegiati e consente alle organizzazioni sanitarie di proteggersi proattivamente. Controllare gli accessi privilegiati limita i movimenti che un hacker pu\u00f2 fare dopo aver stabilito un punto d&#8217;appoggio nella rete. Questo riduce notevolmente la loro capacit\u00e0 di muoversi lateralmente all&#8217;interno della rete e di accedere ai sistemi sensibili.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Con i giusti passaggi di sicurezza degli accessi privilegiati, la capacit\u00e0 di un hacker di elevare i privilegi e accedere a informazioni riservate come i record dei pazienti sar\u00e0 notevolmente mitigata.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u00c8 tempo di investire nel PAM<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Gli ospedali negli Stati Uniti, nel Regno Unito e in Europa sono stati soggetti a vari schemi di estorsione tramite crittografia dei file e violazioni dei dati. Nel 2024, un attacco ransomware notevole ha colpito Change Healthcare due volte, interrompendo gravemente le loro operazioni e evidenziando le vulnerabilit\u00e0 nel settore sanitario. Il primo attacco del gruppo ALPHV\/BlackCat ha causato ritardi significativi nei servizi di prescrizione e un pagamento di riscatto di 22 milioni di dollari. Questo attacco ha bloccato l&#8217;accesso a sistemi critici, inclusi i dati dei pazienti e le operazioni di fatturazione, portando a lunghe interruzioni operative. Poco dopo, il gruppo RansomHub ha rivendicato un altro furto di 4TB di dati sensibili, richiedendo ulteriori pagamenti e coinvolgendo partner come Medicare e CVS-CareMark. Il secondo attacco ha ulteriormente aggravato la situazione interrompendo l&#8217;elaborazione delle richieste di assicurazione, causando ritardi nelle cure ai pazienti e aumentando il carico amministrativo sui fornitori di servizi sanitari (fonte: ITPro e The Beacon).<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In altri casi, i file dei pazienti sono stati pubblicamente trapelati, presunti compromessi, crittografati e persino cancellati. Questi incidenti di hacking sono vari nei metodi di attacco e non esiste una soluzione unica al problema. Tuttavia, molti attacchi si basano sull&#8217;accesso amministrativo per essere eseguiti \u2013 e questi attacchi sono molto pi\u00f9 difficili da realizzare con un sistema PAM in atto.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.wallix.com\/it\/prodotti\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">WALLIX PAM<\/span><\/a><span data-contrast=\"auto\"> offre monitoraggio, registrazione e isolamento completi di tutte le sessioni degli utenti privilegiati. Questo aiuta con la conformit\u00e0 normativa fornendo alle organizzazioni sanitarie prove documentate e verificabili dei loro sforzi per proteggere gli accessi privilegiati. Quando il comportamento degli utenti privilegiati \u00e8 monitorato e gestito da un sistema PAM, i dati delle organizzazioni sanitarie diventano pi\u00f9 sicuri. Ecco perch\u00e9 il PAM deve diventare una priorit\u00e0.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-g0tdtq-40a83427f9cefd48e1fa166eb9b12b0a\">\n#top .flex_column_table.av-equal-height-column-flextable.av-g0tdtq-40a83427f9cefd48e1fa166eb9b12b0a{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-g0tdtq-40a83427f9cefd48e1fa166eb9b12b0a{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-g0tdtq-40a83427f9cefd48e1fa166eb9b12b0a{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-g0tdtq-40a83427f9cefd48e1fa166eb9b12b0a av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3xf4dy6-130b0cdbe667a6e01adf0f5ee885217e av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Condividi questa voce<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su X\" href='https:\/\/twitter.com\/share?text=Cybersecurity%20Sanitaria%3A%20Perch%C3%A9%20il%20PAM%20Dovrebbe%20Essere%20una%20Priorit%C3%A0&#038;url=https:\/\/www.wallix.com\/it\/?p=62705' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su X'><span class='avia_hidden_link_text'>Condividi su X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Cybersecurity%20Sanitaria%3A%20Perch%C3%A9%20il%20PAM%20Dovrebbe%20Essere%20una%20Priorit%C3%A0&#038;url=https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su LinkedIn'><span class='avia_hidden_link_text'>Condividi su LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Condividi attraverso Mail\" href='mailto:?subject=Cybersecurity%20Sanitaria%3A%20Perch%C3%A9%20il%20PAM%20Dovrebbe%20Essere%20una%20Priorit%C3%A0&#038;body=https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi attraverso Mail'><span class='avia_hidden_link_text'>Condividi attraverso Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3l9ehzy-76b835f6f63096a89fd963ea508861d4\">\n#top .hr.hr-invisible.av-3l9ehzy-76b835f6f63096a89fd963ea508861d4{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3l9ehzy-76b835f6f63096a89fd963ea508861d4 hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-378chj2-13bb60e7ec7030e388fb15f81fd13830\">\n#top .av-special-heading.av-378chj2-13bb60e7ec7030e388fb15f81fd13830{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-378chj2-13bb60e7ec7030e388fb15f81fd13830 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-378chj2-13bb60e7ec7030e388fb15f81fd13830 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-378chj2-13bb60e7ec7030e388fb15f81fd13830 av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenuti correlati<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2gg74hq-16ca1b0679dcbec44d4a838e3850a93b\">\n#top .hr.hr-invisible.av-2gg74hq-16ca1b0679dcbec44d4a838e3850a93b{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2gg74hq-16ca1b0679dcbec44d4a838e3850a93b hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-1zzk8xq-5655e298c29d10f549ccb52769161e55  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-62819 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: L&#039;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T14:53:40+01:00\" >17 Settembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/' title='Link a: L&#8217;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili'>L&#8217;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-62705 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-16T10:31:58+01:00\" >16 Settembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/' title='Link a: Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0'>Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-62116 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Cybersecurity e salute: \u201cla sfida non \u00e8 solo finanziaria ma anche umana\u201d (F. Lancereau, WALLIX)\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-09T14:21:11+01:00\" >9 Settembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/cybersecurity-and-health-the-challenge-is-not-only-financial-but-also-human-f-lancereau-wallix\/' title='Link a: Cybersecurity e salute: \u201cla sfida non \u00e8 solo finanziaria ma anche umana\u201d (F. Lancereau, WALLIX)'>Cybersecurity e salute: \u201cla sfida non \u00e8 solo finanziaria ma anche umana\u201d (F. Lancereau, WALLIX)<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5unsse-fef99c4e2cb95f8de27137cad8e859fc\">\n#top .av-special-heading.av-5unsse-fef99c4e2cb95f8de27137cad8e859fc{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-5unsse-fef99c4e2cb95f8de27137cad8e859fc .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-5unsse-fef99c4e2cb95f8de27137cad8e859fc .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-5unsse-fef99c4e2cb95f8de27137cad8e859fc av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Risorse correlate<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1arhx32-4d609ac31f2e05fc928790b1905a0806\">\n#top .hr.hr-invisible.av-1arhx32-4d609ac31f2e05fc928790b1905a0806{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1arhx32-4d609ac31f2e05fc928790b1905a0806 hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lzg5em-e724fb793026d367ae81235d7ff91c5e  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-63647 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue strutture sanitarie con il programma CaRE!\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-04T09:46:40+01:00\" >4 Ottobre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/proteggi-le-tue-strutture-sanitarie-con-il-programma-care\/' title='Link a: Proteggi le tue strutture sanitarie con il programma CaRE!'>Proteggi le tue strutture sanitarie con il programma CaRE!<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-61251 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-08-09T10:32:59+01:00\" >9 Agosto 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/garantire-il-futuro-salvaguardare-gli-ambienti-ot-nellindustria-manifatturiera-italiana-e-non-solo\/' title='Link a: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo'>GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-60634 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue operazioni di produzione dai cyber attacchi\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-07-22T11:13:25+01:00\" >22 Luglio 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/proteggi-le-tue-operazioni-di-produzione-dai-cyber-attacchi\/' title='Link a: Proteggi le tue operazioni di produzione dai cyber attacchi'>Proteggi le tue operazioni di produzione dai cyber attacchi<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-59493 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggere l&#039;assistenza sanitaria: 7 modi per resistere ai cyberattacchi\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-06-19T12:27:48+01:00\" >19 Giugno 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/proteggere-lassistenza-sanitaria-7-modi-per-resistere-ai-cyberattacchi\/' title='Link a: Proteggere l&#8217;assistenza sanitaria: 7 modi per resistere ai cyberattacchi'>Proteggere l&#8217;assistenza sanitaria: 7 modi per resistere ai cyberattacchi<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":23916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1642,1790,1733],"tags":[],"class_list":["post-62705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-privileged-access-management-it","category-settore-sanitario"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX<\/title>\n<meta name=\"description\" content=\"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-16T09:31:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T17:15:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0\",\"datePublished\":\"2024-09-16T09:31:58+00:00\",\"dateModified\":\"2026-03-05T17:15:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/\"},\"wordCount\":2829,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/sante.jpg\",\"articleSection\":[\"BLOGPOST\",\"PRIVILEGED ACCESS MANAGEMENT\",\"SETTORE SANITARIO\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/\",\"name\":\"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/sante.jpg\",\"datePublished\":\"2024-09-16T09:31:58+00:00\",\"dateModified\":\"2026-03-05T17:15:53+00:00\",\"description\":\"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/healthcare-cybersecurity-why-pam-should-be-a-priority\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/sante.jpg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/sante.jpg\",\"width\":2000,\"height\":1184},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX","description":"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX","og_description":"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.","og_url":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/","og_site_name":"WALLIX","article_published_time":"2024-09-16T09:31:58+00:00","article_modified_time":"2026-03-05T17:15:53+00:00","og_image":[{"width":2000,"height":1184,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Scritto da":"WALLIX","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0","datePublished":"2024-09-16T09:31:58+00:00","dateModified":"2026-03-05T17:15:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/"},"wordCount":2829,"publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg","articleSection":["BLOGPOST","PRIVILEGED ACCESS MANAGEMENT","SETTORE SANITARIO"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/","url":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/","name":"Cybersecurity Sanitaria: Perch\u00e9 il PAM Dovrebbe Essere una Priorit\u00e0 - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg","datePublished":"2024-09-16T09:31:58+00:00","dateModified":"2026-03-05T17:15:53+00:00","description":"Read the blog and learn the reasons why Privileged Access Management (PAM) is the best form of cyberdefense.","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/blogpost\/healthcare-cybersecurity-why-pam-should-be-a-priority\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/12\/sante.jpg","width":2000,"height":1184},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/it\/#website","url":"https:\/\/www.wallix.com\/it\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/it\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/it\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/comments?post=62705"}],"version-history":[{"count":7,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62705\/revisions"}],"predecessor-version":[{"id":85087,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62705\/revisions\/85087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media\/23916"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media?parent=62705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/categories?post=62705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/tags?post=62705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}