November 26, 2025
interview-U22873234654VcX-1440x752@IlSole24Ore-Web.JPG

«Today, various public actions are active and the resources allocated demonstrate the commitment that supports these actions digital transformation country. To accompany SMEs on this path, it is important to continue strengthening increasingly structural, targeted and flexible tools: measures with proportional requirements, item lists updated according to real needs – from AI to cyber security – and stable procedures, thereby providing continuity for investmentis now essential for competitiveness. A commitment that includes institutions and companies like us, who every day support companies in strengthening their digital protection.” According to the CEO of Tinexta Cyber, Andrea Montiwho in this interview discusses continuous improvement cyber attacks. «Every semester – he said – we record improvements».

Question: The problem is that cybersecurity infrastructure costs money, and it often does.

Answer: The word “cost” doesn’t convince me. I prefer to talk about investing in cybersecurity, because I compare it to insurance or burglar alarms. Provides a deterrent effect while providing guarantees necessary protection. And, I must say, we are still talking about minimal expenses in comparison with potential damage who can follow the attack. The real problem today is perception: we still think certain events are rare. The possible impact, not only on reputation, is also underestimated. Business continuity is at stake, with the real risk that, in the event of a production block due to an attack, customers will switch to competitors.

Q: Is this a complex attack?

A: There is one fact that gives an idea of ​​what we are talking about. About 70% of successful attacks exploit vulnerabilities that are so widely known that basic cybersecurity infrastructure alone is sufficient to block them. This is a fundamental weakness that is still open. And the risks are far from theoretical: according to some estimates, they circulate on the dark web more than 15 billion access credentials to enterprise systems, globally. This means that for many cybercriminals, they don’t even need to “hack” a system: they just buy a package username and password ready and try it in series, with minimal cost and potentially huge impact to the business.

sites3