{"id":12932,"date":"2021-02-24T15:23:57","date_gmt":"2021-02-24T14:23:57","guid":{"rendered":"https:\/\/www.cyberfero.com\/?page_id=12932"},"modified":"2021-03-05T12:54:59","modified_gmt":"2021-03-05T11:54:59","slug":"business-continuity-audit","status":"publish","type":"page","link":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/","title":{"rendered":"Business Continuity Audit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12932\" class=\"elementor elementor-12932\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-59a68c85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59a68c85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77c90250\" data-id=\"77c90250\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8902eb5 elementor-widget elementor-widget-text-editor\" data-id=\"8902eb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La <a href=\"https:\/\/www.cyberfero.com\/it\/contatti\/azienda-reggio-emilia\/\" target=\"_blank\" rel=\"noopener\">Secure Online Desktop S.r.l.<\/a> \u00e8 in grado di realizzare progetti di Audit di <a href=\"https:\/\/it.wikipedia.org\/wiki\/Business_continuity_plan\">Business Continuity Plan.<\/a>\u00a0Il\u00a0<strong>Business Continuity Plan<\/strong>\u00a0(<strong>BCP<\/strong>, o\u00a0<strong>Piano di Continuit\u00e0 Operativa &#8211; PCO<\/strong>) \u00e8 l&#8217;insieme di procedure documentate che guidano le organizzazioni nel rispondere, recuperare, riprendere e ripristinare a un livello pre-definito le attivit\u00e0 a seguito di un&#8217;interruzione. Il\u00a0<strong>disaster recovery<\/strong>\u00a0(brevemente DR, in italiano:\u00a0<em>Recupero dal Disastro<\/em>), in\u00a0<a title=\"&amp;aquot;Informatica&amp;aquot;\" href=\"https:\/\/it.wikipedia.org\/wiki\/Disaster_recovery\">informatica<\/a>\u00a0ed in particolare nell&#8217;ambito della\u00a0<a title=\"&amp;aquot;Sicurezza\" href=\"\/\/it.wikipedia.org\/wiki\/Sicurezza_informatica&amp;aquot;\">sicurezza informatica<\/a>, si intende l&#8217;insieme delle misure tecnologiche e\u00a0<a title=\"&amp;aquot;Logistica&amp;aquot;\" href=\"\/\/it.wikipedia.org\/wiki\/Logistica&amp;aquot;\">logistico<\/a>\/organizzative atte a ripristinare\u00a0<a class=\"&amp;aquot;mw-redirect&amp;aquot;\" title=\"&amp;aquot;Sistema\" href=\"\/\/it.wikipedia.org\/wiki\/Sistema_(informatica)&amp;aquot;\">sistemi<\/a>,\u00a0<a class=\"&amp;aquot;mw-redirect&amp;aquot;\" title=\"&amp;aquot;Dati&amp;aquot;\" href=\"\/\/it.wikipedia.org\/wiki\/Dati&amp;aquot;\">dati<\/a>\u00a0e infrastrutture necessarie all&#8217;erogazione di servizi di\u00a0<a title=\"&amp;aquot;Business&amp;aquot;\" href=\"\/\/it.wikipedia.org\/wiki\/Business&amp;aquot;\">business<\/a> per\u00a0<a title=\"&amp;aquot;Impresa&amp;aquot;\" href=\"\/\/it.wikipedia.org\/wiki\/Impresa&amp;aquot;\">imprese<\/a>, associazioni o enti, a fronte di gravi emergenze che ne intacchino la regolare attivit\u00e0 al fine di verificarne la corretta stesura ed attuazione. Tali Audit possono essere necessari sia per una verifica esterna dei processi IT interni sia per un controllo dei fornitori in caso di outsourcing dell&#8217;IT.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48d219be elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"48d219be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2a1503c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a1503c1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-13f01144\" data-id=\"13f01144\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cac8507 elementor-widget elementor-widget-text-editor\" data-id=\"3cac8507\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La <a href=\"\/?page_id=1093\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Online Desktop S.r.l.<\/a> \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan (<a href=\"https:\/\/it.wikipedia.org\/wiki\/Business_continuity_plan\" target=\"_blank\" rel=\"noopener noreferrer\">BCP<\/a>) e Disaster Recovery Plan (<a href=\"https:\/\/it.wikipedia.org\/wiki\/Disaster_recovery\" target=\"_blank\" rel=\"noopener noreferrer\">DRP<\/a>) al fine di verificarne la corretta stesura ed attuazione. Tali Audit possono essere necessari sia per una verifica esterna dei processi IT interni sia per un controllo dei fornitori in caso di outsourcing dell&#8217;IT.<\/p><h2>VERIFICA PROCEDURE BUSINESS CONTINUITY PLAN\/DISASTER RECOVERY PLAN<\/h2><p>Dopo avere analizzato la documentazione fornita dal cliente o suo fornitore ed avere appresso le reali esigenze , vengono elencate le azioni che \u00e8 consigliato svolgere per conformarsi alle corporate security policies ed i pre-requisiti minimi che tali attivit\u00e0 devono soddisfare. In tale fase si verificano anche gli <a href=\"https:\/\/it.wikipedia.org\/wiki\/Recovery_Point_Objective\" target=\"_blank\" rel=\"noopener noreferrer\">RPO<\/a>\u00a0e <a href=\"https:\/\/it.wikipedia.org\/wiki\/Recovery_Time_Objective\" target=\"_blank\" rel=\"noopener noreferrer\">RTO<\/a>\u00a0in modo che siano conformi a quanto specificato nelle policy o nel contratto di fornitura (in caso di outsourcer).<\/p><p>Vengono elencati e descritti i finding per poter esaminare le eventuali contromisure.<\/p><h2>CONTROMISURE E MIGLIORIE<\/h2><p>Per i finding individuati e contrassegnati si fornisce una o pi\u00f9 possibili contromisure. Queste informazioni consentono di intervenire sulla correzione dei BCP\/DRP e sui relativi processi aziendali, forniscono le linee guide che il personale IT dovr\u00e0 seguire per l&#8217;adeguamento.<\/p><h2>DESTINATARI<\/h2><p>Un Audit (verifica) dei piani di BCP e DRP \u00e8 necessario a tutte quella aziende che vogliono una verificare esterna da un soggetto terzo dei loro piani di Business Continuity al fine di identificare eventuali problemi e per migliorarne la qualit\u00e0. Il processo di Audit non si limita alla sola verifica documentale dei BCP e DRP ma verifica anche tecnicamente che le soluzioni tecnologiche dichiarate nelle documentazioni siano effettivamente in esercizio e che siano correttamente funzionanti. Non \u00e8 raro infatti, a fronte di un &#8220;disastro&#8221;, constatare che sebbene il piano di DRP preveda una procedura di DR (Disaster Recovery) questa non abbiamo funzionato come ci si aspettava e che la stessa non sia stata mai verificata con l&#8217;esecuzione regolare e programma di piani di verifica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31b1fc0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"31b1fc0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.cyberfero.com\/it\/contatti\/contatti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contattaci<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-799953ae\" data-id=\"799953ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f499482 elementor-widget elementor-widget-image\" data-id=\"3f499482\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg\" class=\"attachment-large size-large wp-image-13111\" alt=\"Business continuity\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-768x512.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La Secure Online Desktop S.r.l. \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan.&nbsp;Il&nbsp;Business Continuity Plan&nbsp;(BCP, o&nbsp;Piano di Continuit\u00e0 Operativa &#8211; PCO) \u00e8 l&#8217;insieme di procedure documentate che guidano le organizzazioni nel rispondere, recuperare, riprendere e ripristinare a un livello pre-definito le attivit\u00e0 a seguito di un&#8217;interruzione. Il&nbsp;disaster recovery&nbsp;(brevemente DR, in italiano:&nbsp;Recupero dal Disastro), in&nbsp;informatica&nbsp;ed in particolare&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":13060,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-12932","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Business Continuity Audit<\/title>\n<meta name=\"description\" content=\"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Continuity Audit\" \/>\n<meta property=\"og:description\" content=\"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyberfero\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-05T11:54:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/\",\"name\":\"Business Continuity Audit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/business-continuity-1024x683.jpg\",\"datePublished\":\"2021-02-24T14:23:57+00:00\",\"dateModified\":\"2021-03-05T11:54:59+00:00\",\"description\":\"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/business-continuity-1024x683.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/business-continuity-1024x683.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Progetti di Cyberfero\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Business Continuity Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/progetti-di-secure-online-desktop\\\/business-continuity-audit\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Business Continuity Audit","description":"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/","og_locale":"it_IT","og_type":"article","og_title":"Business Continuity Audit","og_description":"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel","og_url":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/","og_site_name":"Cyberfero","article_publisher":"https:\/\/www.facebook.com\/Cyberfero","article_modified_time":"2021-03-05T11:54:59+00:00","og_image":[{"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@secureod","twitter_misc":{"Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/","url":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/","name":"Business Continuity Audit","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg","datePublished":"2021-02-24T14:23:57+00:00","dateModified":"2021-03-05T11:54:59+00:00","description":"SOD \u00e8 in grado di realizzare progetti di Audit di Business Continuity Plan, cio\u00e8 l\u2019insieme di procedure che guidano le organizzazioni nel","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#primaryimage","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/business-continuity-1024x683.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Progetti di Cyberfero","item":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/"},{"@type":"ListItem","position":3,"name":"Business Continuity Audit"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/progetti-di-secure-online-desktop\/business-continuity-audit\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/comments?post=12932"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12932\/revisions"}],"predecessor-version":[{"id":13152,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12932\/revisions\/13152"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/13060"}],"wp:attachment":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/media?parent=12932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}