Home / Blog

Protection stories

It is not another job. It is a conscious commitment that has become our mission: Data Protection.

This is why we want to share our passion through posts, videos, white papers, and everything you need to discuss data protection.

Welcome to the Boole Blog.

The latest news from the Boolebox world

Dossiering: Implications and Prospects for Businesses

Dossiering: Implications and Prospects for Businesses

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

read more

Cybersecurity in the United States: New Threats and New Strategies

Cybersecurity in the United States: New Threats and New Strategies

The increasingly delicate geopolitical situation and technological innovations linked to the development of artificial intelligence have turned the spotlight back on the subject of cybersecurity in the United States too, and with urgency. Our company is based in Milan, but we have worked with customers all over the world for years. Among others, institutions of […]

read more

How do freelancers or small companies without an IT department manage cybersecurity?

How do freelancers or small companies without an IT department manage cybersecurity?

Large companies have recently begun to incorporate dedicated departments and staff specialised in the prevention and management of cyber risks. But micro-enterprises, freelancers and SMEs still ignore or neglect IT security all too often. Yet according to the latest findings, these are precisely the preferred targets of cyber criminals. Read the article and find out how to defend yourself!

read more

White paper – Secure cloud data backup

White paper – Secure cloud data backup

Backing up your data is not enough, even if you do it three times. Did you know that?
According to the 3-2-1 rule, by creating 3 different backups of your data, the likelihood of losing them is 1/1,000,000. However, with cloud storage, there is still a risk that your data may be stolen. Discover in the Whitepaper how to defend yourself.

read more

Work virtualisation and IT security. VDI solutions are becoming increasingly popular: what are the advantages for companies? And the threats?

Work virtualisation and IT security. VDI solutions are becoming increasingly popular: what are the advantages for companies? And the threats?

The pandemic years have significantly accelerated the work digitisation process and the use of remote working both in Italy and abroad. If most cutting-edge companies were already starting to move in this direction in 2019, today remote working is an everyday   occurrence even in smaller, less structured companies. To ensure security, efficiency and robustness even […]

read more

Corporate Cybersecurity Strategies: USA vs Europe Cybersecurity Comparison

Corporate Cybersecurity Strategies: USA vs Europe Cybersecurity Comparison

In an ever-evolving digital landscape, corporate cybersecurity strategies are crucial for the protection and competitiveness of businesses globally. With the increase in cyber threats and the growing complexity of international regulations, small, medium, and large companies must develop security strategies that are effective and compliant with various jurisdictions. However, the approach to cybersecurity varies significantly […]

read more

NIS 2: how to join the new European cybersecurity standard

NIS 2: how to join the new European cybersecurity standard

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

read more

Cybersecurity and Healthcare: Threats, Risks and Possible Solutions for an Industry Increasingly in Hackers’ Cross-hairs

Cybersecurity and Healthcare: Threats, Risks and Possible Solutions for an Industry Increasingly in Hackers’ Cross-hairs

Healthcare was the most affected industry by cybercrime in 2022. This is confirmed by the Clusit 2023 report (Clusit is the Italian Association for IT Security): worldwide, attacks on healthcare accounted for 17% of the total from January to March 2023, compared to 12% in 2022. In particular, attacks on medical-hospital facilities have tripled in […]

read more

Two-factor authentication: an indispensable tool for data security, also within the company

Two-factor authentication: an indispensable tool for data security, also within the company

Two-factor authentication is one of the most effective security systems for protecting our accounts, whether private or corporate. However complex it may be, relying on a single password is no longer sufficient today for guaranteeing exclusive, secure access to web accounts, especially if they contain confidential or sensitive data. Strong authentication, indeed better known as […]

read more

What are Virtual Data Rooms (VDRs) and how can they help companies to manage sensitive data?

What are Virtual Data Rooms (VDRs) and how can they help companies to manage sensitive data?

Virtual Data Rooms (VDRs) are secure and protected digital working environments, mainly used to exchange sensitive data and documents during due diligence activities, mergers and acquisitions, financing and other business transactions. They are also an excellent solution for any company that needs to exchange confidential documents with employees, collaborators or customers. In this article we will thoroughly […]

read more

Data Loss Prevention (DLP) for corporate data protection: tools and recommendations for an effective DLP strategy

Data Loss Prevention (DLP) for corporate data protection: tools and recommendations for an effective DLP strategy

Data Loss Prevention (DLP) refers to processes, techniques and tools companies can use  to prevent the loss and breach of sensitive or confidential data. In the US alone, there were over 2.4 million data security breach alerts in the first six months of 2022. Today security is more important than ever, data protection regulations are becoming stricter all the time, […]

read more

How to protect intellectual property, technical & commercial capital in business offers

How to protect intellectual property, technical & commercial capital in business offers

If you are a freelancer, run a business, or hold a commercial role, you know how crucial the formulation of offers, project presentations, and negotiation of agreements are to securing new clients. These are delicate phases that require precision and foresight: your company must be able to translate its know-how and project vision into a clear, competitive, and personalized offer. The formulation of a quotation often results from days, if not weeks, of technical work, design, strategic analysis, and the combination of multidisciplinary skills. It is a process that can involve various professionals and entails the creation of complex and valuable documents.

read more

What is ethical hacking and why is it a valid tool for preventing cyber attacks?

What is ethical hacking and why is it a valid tool for preventing cyber attacks?

Ethical hacking is aimed at discovering any vulnerabilities in a company’s computer system. It is a cyber attack for all intents and purposes. Nomen omen, after all: ethical hacking. A breach of the computer systems of the company in question is simulated from the hacker’s perspective, and all possible flaws, shortcomings and vulnerabilities that represent more or less serious IT security risks are brought to light.

read more