{"id":62819,"date":"2024-09-17T14:53:40","date_gmt":"2024-09-17T13:53:40","guid":{"rendered":"https:\/\/www.wallix.com\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/"},"modified":"2025-02-13T11:29:23","modified_gmt":"2025-02-13T10:29:23","slug":"the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/","title":{"rendered":"L&#8217;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-llxjvkj8-8b96e9e5df8befa8a315bd611af44dfb avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-62819'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4so2xto-2fcfb471b63097f9dcf76e909ccc26b0 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq0ud5lu-c2405d226a4f2f3d6eea844ff5a1461c\">\n#top .av-special-heading.av-lq0ud5lu-c2405d226a4f2f3d6eea844ff5a1461c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq0ud5lu-c2405d226a4f2f3d6eea844ff5a1461c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq0ud5lu-c2405d226a4f2f3d6eea844ff5a1461c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq0ud5lu-c2405d226a4f2f3d6eea844ff5a1461c av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >L\u2019Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili <\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-llxjw6lx-0dea3a4f0df95dec029666472628e179 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Le\u00a0organizzazioni\u00a0sanitarie\u00a0sono\u00a0confrontate\u00a0a\u00a0numerosi\u00a0sfide\u00a0in\u00a0materia\u00a0di\u00a0cybersicurezza. Tra\u00a0queste, la\u00a0riduzione\u00a0dei budget\u00a0informatici, la\u00a0conformit\u00e0\u00a0alle\u00a0leggi\u00a0sulla\u00a0protezione\u00a0dei\u00a0dati, l&#8217;aumento\u00a0del\u00a0rischio\u00a0di\u00a0attacchi\u00a0informatici\u00a0e la\u00a0preservazione\u00a0di\u00a0informazioni\u00a0sensibili\u00a0e\u00a0estremamente\u00a0importanti:\u00a0i\u00a0dati\u00a0medici, sempre pi\u00f9\u00a0ambiti\u00a0dai\u00a0criminali. Con la\u00a0digitalizzazione\u00a0del\u00a0settore\u00a0sanitario, l&#8217;Internet\u00a0degli\u00a0oggetti\u00a0medici\u00a0(IoMT) \u00e8\u00a0diventato\u00a0un\u00a0ambito\u00a0in forte\u00a0crescita. I\u00a0dispositivi\u00a0connessi\u00a0utilizzati\u00a0da\u00a0infermieri\u00a0e\u00a0medici\u00a0hanno\u00a0trasformato\u00a0il\u00a0settore\u00a0in\u00a0meglio,\u00a0migliorando\u00a0i\u00a0risultati\u00a0delle cure per\u00a0molti\u00a0pazienti.<\/p>\n<p>Tuttavia, i\u00a0dispositivi\u00a0IoMT\u00a0rappresentano\u00a0anche un\u00a0problema\u00a0di\u00a0sicurezza\u00a0maggiore.\u00a0Secondo\u00a0i\u00a0dati\u00a0pubblicati\u00a0da\u00a0Irdeto,\u00a0fino\u00a0all&#8217;80% delle\u00a0aziende\u00a0di\u00a0tecnologia\u00a0medica\u00a0ha subito un attacco\u00a0informatico\u00a0negli\u00a0ultimi\u00a0cinque\u00a0anni.\u00a0Infatti, la\u00a0crescita\u00a0del\u00a0numero\u00a0di\u00a0dispositivi\u00a0di\u00a0nuova\u00a0tecnologia\u00a0che\u00a0si\u00a0connettono\u00a0a\u00a0vasti\u00a0reti\u00a0ha\u00a0creato\u00a0un&#8217;ulteriore\u00a0possibilit\u00e0\u00a0di\u00a0esposizione\u00a0per le\u00a0organizzazioni\u00a0sanitarie.<\/p>\n<h2><strong>Numerosi<\/strong><strong>\u00a0punti\u00a0di\u00a0accesso<\/strong><\/h2>\n<p>Il\u00a0numero\u00a0considerevole\u00a0di\u00a0punti\u00a0di\u00a0accesso\u00a0nel\u00a0settore\u00a0iperconnesso\u00a0dell&#8217;assistenza\u00a0sanitaria\u00a0rappresenta\u00a0un\u00a0obiettivo\u00a0lucroso\u00a0per\u00a0gli\u00a0attori\u00a0delle\u00a0minacce\u00a0che\u00a0hanno\u00a0perfezionato\u00a0le\u00a0loro\u00a0tattiche\u00a0di\u00a0estorsione. I\u00a0dati\u00a0dei\u00a0pazienti\u00a0sono\u00a0estremamente\u00a0preziosi\u00a0e il dossier\u00a0medico\u00a0elettronico\u00a0(DME) di\u00a0una\u00a0persona\u00a0comprende\u00a0generalmente\u00a0il\u00a0nome\u00a0completo, il\u00a0numero\u00a0di\u00a0sicurezza\u00a0sociale, la\u00a0storia\u00a0clinica, le\u00a0informazioni\u00a0bancarie, le carte di\u00a0credito\u00a0e i\u00a0nomi\u00a0dei\u00a0membri\u00a0della\u00a0famiglia;\u00a0una\u00a0miniera\u00a0di\u00a0informazioni\u00a0molto\u00a0ambita\u00a0dai\u00a0pirati\u00a0informatici.<\/p>\n<p>Inoltre,\u00a0una\u00a0delle\u00a0maggiori\u00a0vulnerabilit\u00e0\u00a0del\u00a0settore\u00a0sanitario\u00a0\u00e8 la sua\u00a0infrastruttura\u00a0informatica\u00a0complessa, con un\u00a0gran\u00a0numero\u00a0di\u00a0punti\u00a0di\u00a0accesso\u00a0e\u00a0dispositivi\u00a0connessi. Le\u00a0tecnologie\u00a0operative\u00a0comprendono\u00a0le\u00a0risonanze\u00a0magnetiche\u00a0(MRI)\u00a0connesse,\u00a0gli\u00a0iPad e i computer desktop\u00a0utilizzati\u00a0dal personale, i router\u00a0wireless\u00a0negli\u00a0ospedali\u00a0e\u00a0altri\u00a0dispositivi\u00a0elettronici\u00a0che\u00a0possono\u00a0essere\u00a0connessi\u00a0a\u00a0una\u00a0rete.<\/p>\n<p>I ransomware\u00a0rimangono\u00a0anche la principale\u00a0minaccia\u00a0informatica\u00a0per\u00a0gli\u00a0ospedali, come ha\u00a0dimostrato\u00a0l&#8217;attacco al\u00a0sistema\u00a0sanitario\u00a0irlandese\u00a0avvenuto\u00a0alcuni\u00a0mesi\u00a0fa,\u00a0che\u00a0ha\u00a0evidenziato\u00a0quanto il\u00a0settore\u00a0sanitario\u00a0sia\u00a0un\u00a0obiettivo\u00a0principale per i\u00a0criminali\u00a0informatici.<\/p>\n<h2><strong>L&#8217;impatto\u00a0della\u00a0tecnologia\u00a0operativa<\/strong><\/h2>\n<p>\u00c8 importante\u00a0ricordare\u00a0quanto l&#8217;IoMT\u00a0e la\u00a0tecnologia\u00a0operativa, anche\u00a0chiamata\u00a0OT,\u00a0abbiano\u00a0trasformato\u00a0il\u00a0settore\u00a0dell&#8217;assistenza\u00a0sanitaria,\u00a0soprattutto\u00a0negli\u00a0ultimi\u00a0tempi. L&#8217;OT ha\u00a0facilitato\u00a0ricerche\u00a0mediche\u00a0rivoluzionarie, ha\u00a0permesso\u00a0ai\u00a0lavoratori\u00a0e ai\u00a0pazienti\u00a0di\u00a0rimanere\u00a0in\u00a0contatto\u00a0durante\u00a0uno\u00a0dei\u00a0periodi\u00a0pi\u00f9\u00a0difficili\u00a0che\u00a0il\u00a0settore\u00a0abbia\u00a0mai\u00a0conosciuto\u00a0e ha anche\u00a0aiutato\u00a0i\u00a0professionisti\u00a0della\u00a0salute\u00a0a\u00a0lavorare\u00a0a\u00a0distanza,\u00a0cosa\u00a0che\u00a0molte\u00a0organizzazioni\u00a0consideravano\u00a0impossibile\u00a0in\u00a0passato.<\/p>\n<p>In\u00a0questo\u00a0contesto, \u00e8\u00a0essenziale\u00a0che\u00a0i\u00a0professionisti\u00a0della\u00a0salute\u00a0rafforzino\u00a0le\u00a0loro\u00a0competenze\u00a0in\u00a0materia\u00a0di\u00a0cybersicurezza,\u00a0poich\u00e9\u00a0la\u00a0tecnologia\u00a0medica\u00a0trasformativa\u00a0comporta\u00a0una\u00a0grande\u00a0responsabilit\u00e0, e\u00a0gli\u00a0attori\u00a0delle\u00a0minacce\u00a0monitorano\u00a0costantemente\u00a0le\u00a0reti\u00a0sanitarie\u00a0alla\u00a0ricerca\u00a0di\u00a0vulnerabilit\u00e0\u00a0da\u00a0sfruttare.\u00a0Formazioni\u00a0coinvolgenti\u00a0in\u00a0materia\u00a0di\u00a0cybersicurezza,\u00a0che\u00a0vanno\u00a0da\u00a0video\u00a0di\u00a0simulazione\u00a0di phishing a\u00a0sessioni\u00a0di\u00a0gruppo\u00a0su come\u00a0utilizzare\u00a0correttamente\u00a0le\u00a0tecnologie\u00a0operative,\u00a0possono\u00a0avere\u00a0un\u00a0impatto\u00a0positivo\u00a0sulla\u00a0consapevolezza\u00a0dei\u00a0professionisti\u00a0della\u00a0salute\u00a0riguardo\u00a0alla\u00a0cybersicurezza.<\/p>\n<p>Tuttavia, il\u00a0problema\u00a0\u00e8\u00a0che\u00a0i\u00a0medici\u00a0e\u00a0gli\u00a0infermieri\u00a0che\u00a0utilizzano\u00a0dispositivi\u00a0e\u00a0reti\u00a0vulnerabili\u00a0sono\u00a0impegnati\u00a0a curare i\u00a0pazienti\u00a0e\u00a0spesso\u00a0non\u00a0hanno\u00a0il tempo di\u00a0rafforzare\u00a0le\u00a0loro\u00a0competenze\u00a0in\u00a0materia\u00a0di\u00a0sicurezza.\u00a0Questo\u00a0rappresenta\u00a0una\u00a0sfida\u00a0particolare\u00a0per i\u00a0team\u00a0IT,\u00a0soprattutto\u00a0perch\u00e9 le\u00a0minacce\u00a0interne sono\u00a0responsabili\u00a0di pi\u00f9\u00a0della\u00a0met\u00e0\u00a0(60%) di tutte le\u00a0violazioni\u00a0dei\u00a0dati.<\/p>\n<p>I\u00a0team\u00a0informatici,\u00a0generalmente\u00a0di\u00a0piccole\u00a0dimensioni\u00a0e\u00a0spesso\u00a0sovraccarichi,\u00a0possono\u00a0costituire\u00a0un&#8217;altra\u00a0vulnerabilit\u00e0\u00a0per il\u00a0settore\u00a0dell&#8217;assistenza\u00a0sanitaria\u00a0se non\u00a0riescono\u00a0a\u00a0soddisfare\u00a0tutte le\u00a0esigenze\u00a0di\u00a0una\u00a0cybersicurezza\u00a0adeguata.\u00a0In realt\u00e0, il dipartimento informatico ha bisogno di un aiuto supplementare per proteggere i preziosi dati dei pazienti, poich\u00e9 i budget sono spesso ridotti e questi team sono costretti a fare molto con pochi mezzi.<\/p>\n<p>Allora, come\u00a0pu\u00f2\u00a0il\u00a0settore\u00a0dell&#8217;assistenza\u00a0sanitaria\u00a0conformarsi\u00a0alle\u00a0normative e\u00a0proteggere\u00a0efficacemente\u00a0i\u00a0preziosi\u00a0dati\u00a0dei\u00a0pazienti\u00a0e la sua\u00a0infrastruttura\u00a0informatica\u00a0vulnerabile\u00a0utilizzando\u00a0dispositivi\u00a0IoMT\u00a0con un budget\u00a0ridotto\u00a0e un\u00a0rischio\u00a0elevato\u00a0di\u00a0minacce\u00a0interne?\u00a0La\u00a0soluzione\u00a0\u00e8 la\u00a0gestione\u00a0degli\u00a0accessi\u00a0privilegiati.<\/p>\n<h2><strong>Combinare<\/strong><strong>\u00a0tecnologia\u00a0ed\u00a0educazione\u00a0per un\u00a0risultato\u00a0ottimale<\/strong><\/h2>\n<p>Durante la\u00a0pandemia, l&#8217;IoMT\u00a0ha\u00a0trasformato\u00a0le\u00a0organizzazioni\u00a0di\u00a0assistenza\u00a0sanitaria.\u00a0Tuttavia, tutti\u00a0questi\u00a0nuovi\u00a0sistemi\u00a0e\u00a0dispositivi\u00a0ampiamente\u00a0adottati\u00a0dagli\u00a0enti\u00a0sanitari\u00a0sono\u00a0diventati\u00a0una\u00a0fonte di\u00a0rischi\u00a0e\u00a0sfide:\u00a0le\u00a0superfici\u00a0di attacco si sono\u00a0estese\u00a0e l&#8217;intero\u00a0settore\u00a0dell&#8217;assistenza\u00a0sanitaria\u00a0ha\u00a0dovuto\u00a0agire\u00a0rapidamente\u00a0per\u00a0rafforzare\u00a0le\u00a0proprie\u00a0difese,\u00a0mentre\u00a0i\u00a0cybercriminali\u00a0monitorano\u00a0attentamente\u00a0le\u00a0reti\u00a0vulnerabili.<\/p>\n<p>\u00c8 per questo motivo che \u00e8 essenziale che il settore sanitario combini l&#8217;implementazione di piattaforme di cybersicurezza efficaci con la formazione del proprio personale, se vuole mantenere un vantaggio in un contesto in continua evoluzione. Ogni strategia completa di cybersicurezza deve fornire un accesso remoto sicuro, permettere audit e conformit\u00e0 e formare tutti i dipendenti sui rischi informatici.<\/p>\n<p>In\u00a0questo\u00a0modo,\u00a0soluzioni\u00a0sicure\u00a0e\u00a0una\u00a0formazione\u00a0regolare\u00a0sulla\u00a0cybersicurezza\u00a0permetteranno\u00a0agli\u00a0enti\u00a0sanitari\u00a0di\u00a0essere\u00a0completamente\u00a0preparati\u00a0a\u00a0operare\u00a0in un\u00a0mondo\u00a0digitale e a\u00a0combattere\u00a0qualsiasi\u00a0minaccia\u00a0esterna.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-av_button-e7bd3493009a07fe4e066fad555f8c2f-wrap avia-button-center  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_button-e7bd3493009a07fe4e066fad555f8c2f\">\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f{\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f:hover{\nbackground-color:#ffffff;\ncolor:#f17c00;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f:hover .avia-svg-icon svg:first-child{\nfill:#f17c00;\nstroke:#f17c00;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/company\/contact\/'  class='avia-button av-av_button-e7bd3493009a07fe4e066fad555f8c2f av-link-btn avia-icon_select-no avia-size-large avia-position-center'   aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49lhv0c-1f501009684f7c59d3d47065668f60e1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49lhv0c-1f501009684f7c59d3d47065668f60e1{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-49lhv0c-1f501009684f7c59d3d47065668f60e1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49lhv0c-1f501009684f7c59d3d47065668f60e1{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-49lhv0c-1f501009684f7c59d3d47065668f60e1 av_one_third  avia-builder-el-5  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3y5obvg-bb4b7064165d871e69bb648c31df2ea0 av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Condividi questa voce<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su X\" href='https:\/\/twitter.com\/share?text=L%E2%80%99Internet%20degli%20oggetti%20medici%3A%20la%20protezione%20dei%20sistemi%20informatici%20sempre%20pi%C3%B9%20vulnerabili&#038;url=https:\/\/www.wallix.com\/it\/?p=62819' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su X'><span class='avia_hidden_link_text'>Condividi su X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=L%E2%80%99Internet%20degli%20oggetti%20medici%3A%20la%20protezione%20dei%20sistemi%20informatici%20sempre%20pi%C3%B9%20vulnerabili&#038;url=https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su LinkedIn'><span class='avia_hidden_link_text'>Condividi su LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Condividi attraverso Mail\" href='mailto:?subject=L%E2%80%99Internet%20degli%20oggetti%20medici%3A%20la%20protezione%20dei%20sistemi%20informatici%20sempre%20pi%C3%B9%20vulnerabili&#038;body=https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi attraverso Mail'><span class='avia_hidden_link_text'>Condividi attraverso Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3j5uloc-f0f67d8910825edf1e51e47e32f12df0\">\n#top .hr.hr-invisible.av-3j5uloc-f0f67d8910825edf1e51e47e32f12df0{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3j5uloc-f0f67d8910825edf1e51e47e32f12df0 hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-32av6fw-b32499dd639c2ba2e11a3a651731caaf\">\n#top .av-special-heading.av-32av6fw-b32499dd639c2ba2e11a3a651731caaf{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-32av6fw-b32499dd639c2ba2e11a3a651731caaf .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-32av6fw-b32499dd639c2ba2e11a3a651731caaf .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-32av6fw-b32499dd639c2ba2e11a3a651731caaf av-special-heading-h3 blockquote modern-quote  avia-builder-el-8  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenuti correlati<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2mxgrng-23e2695066c835d9f21e9a6f1bb9a62c\">\n#top .hr.hr-invisible.av-2mxgrng-23e2695066c835d9f21e9a6f1bb9a62c{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2mxgrng-23e2695066c835d9f21e9a6f1bb9a62c hr-invisible  avia-builder-el-9  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1p7ocnw-716405421892016b38935219f721a2e8\">\n#top .av-special-heading.av-1p7ocnw-716405421892016b38935219f721a2e8{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1p7ocnw-716405421892016b38935219f721a2e8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1p7ocnw-716405421892016b38935219f721a2e8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1p7ocnw-716405421892016b38935219f721a2e8 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Risorse correlate<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-15zwsvw-8fd397056db9e9ce1909a063cf32491c\">\n#top .hr.hr-invisible.av-15zwsvw-8fd397056db9e9ce1909a063cf32491c{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-15zwsvw-8fd397056db9e9ce1909a063cf32491c hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":24571,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1642,2439,1733],"tags":[],"class_list":["post-62819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-infrastrutture-intelligenti","category-settore-sanitario"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX<\/title>\n<meta name=\"description\" content=\"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-17T13:53:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T10:29:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1129\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"L&#8217;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili\",\"datePublished\":\"2024-09-17T13:53:40+00:00\",\"dateModified\":\"2025-02-13T10:29:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\"},\"wordCount\":2791,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"INFRASTRUTTURE INTELLIGENTI\",\"SETTORE SANITARIO\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\",\"url\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\",\"name\":\"L'Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg\",\"datePublished\":\"2024-09-17T13:53:40+00:00\",\"dateModified\":\"2025-02-13T10:29:23+00:00\",\"description\":\"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg\",\"width\":2560,\"height\":1129},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/it\/#website\",\"url\":\"https:\/\/www.wallix.com\/it\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/it\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.wallix.com\/it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\/\/www.wallix.com\/it\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX","description":"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/","og_locale":"it_IT","og_type":"article","og_title":"L'Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX","og_description":"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...","og_url":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/","og_site_name":"WALLIX","article_published_time":"2024-09-17T13:53:40+00:00","article_modified_time":"2025-02-13T10:29:23+00:00","og_image":[{"width":2560,"height":1129,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Scritto da":"WALLIX","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"L&#8217;Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili","datePublished":"2024-09-17T13:53:40+00:00","dateModified":"2025-02-13T10:29:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/"},"wordCount":2791,"publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg","articleSection":["BLOGPOST","INFRASTRUTTURE INTELLIGENTI","SETTORE SANITARIO"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/","url":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/","name":"L'Internet degli oggetti medici: la protezione dei sistemi informatici sempre pi\u00f9 vulnerabili - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg","datePublished":"2024-09-17T13:53:40+00:00","dateModified":"2025-02-13T10:29:23+00:00","description":"Healthcare organisations face a breadth of cyber challenges. Challenges include shrinking IT budgets, ensuring total data compliance...","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/blogpost\/the-internet-of-medical-things-iomt-safeguarding-increasingly-vulnerable-it-systems\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/11\/AdobeStock_298001238-scaled.jpeg","width":2560,"height":1129},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/it\/#website","url":"https:\/\/www.wallix.com\/it\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/it\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/it\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/comments?post=62819"}],"version-history":[{"count":8,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62819\/revisions"}],"predecessor-version":[{"id":68211,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62819\/revisions\/68211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media\/24571"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media?parent=62819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/categories?post=62819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/tags?post=62819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}