{"id":1624,"date":"2023-09-12T10:38:33","date_gmt":"2023-09-12T10:38:33","guid":{"rendered":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?page_id=1624"},"modified":"2023-09-21T12:57:21","modified_gmt":"2023-09-21T12:57:21","slug":"expertise","status":"publish","type":"page","link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/expertise\/","title":{"rendered":"Expertise"},"content":{"rendered":"

[vc_row][vc_column][vc_raw_html]JTVCcmV2X3NsaWRlciUyMGFsaWFzJTNEJTIyaGVhZGVyLWV4cGVydGlzZS0xMSUyMiU1RCU1QiUyRnJldl9zbGlkZXIlNUQ=[\/vc_raw_html][vc_custom_heading text=”The security of an IT system is a fundamental requirement to guarantee reliable and efficient services are provided both in-house for the company and for the company\u2019s customers. The primary operational objective is to protect data and the IT systems used to process said data.” font_container=”tag:h3|font_size:22|text_align:left|color:%23212121″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:600%20bold%20regular%3A600%3Anormal”][vc_separator border_width=”2″ el_width=”50″][\/vc_column][\/vc_row][vc_row][vc_column width=”1\/2″][vc_custom_heading text=”Data protection” font_container=”tag:h3|text_align:left|color:%23003872″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:600%20bold%20regular%3A600%3Anormal”][vc_column_text]Data and the systems used to process data can only be considered protected<\/strong> if the following are guaranteed:<\/p>\n