Corporate IT security: 7 steps to protect your business

lecs corporate security

Corporate IT security: 7 steps to protect your business In today’s environment, where cybercrime is evolving at an unprecedented pace, enterprise cybersecurity is a competitive prerequisite and not just a regulatory obligation. Companies of all sizes are continually exposed to sophisticated threats that can put data, business continuity, and reputation at risk. In this technical […]

Network detection and response (NDR): the new frontier of network security

lecs ed.

In today’s cybersecurity landscape, threats are moving faster and with greater sophistication. Traditional defense tools are no longer sufficient to provide complete visibility, especially when the attack leaves no obvious traces on endpoints or exploits fileless techniques. In this context, the concept of Network Detection and Response (NDR) is emerging: a technology designed to detect […]

Overfunding in underwriting: exceeded 1.5 mln in crowdfunding

lecs Overfunding

After launching a major round and reaching the maximum 1.5 million euro underwriting target, LECS technology now accelerates and tries to make the international climb. We are excited to announce that Cyber Evolution, our innovative cybersecurity SME based in Ascoli Piceno, has recently successfully completed a funding round with a maximum funding target of €1.5 […]

The new European NIS2 regulation: what changes for cybersecurity in Italy

lecs nis 2

As of Oct. 16, 2024, the Network and Information Security (NIS) decree, which aims to strengthen the cybersecurity of companies and public administrations throughout Europe, came into effect. Let’s find out together what the main changes are, who is involved, and what obligations arise for Italian companies. What is the NIS2 Directive and why it […]

GDPR: how to ensure your company’s regulatory compliance and information security

lecs informatics gdpr

International regulations, such as the GDPR (General Data Protection Regulation) and ISO (International Organization for Standardization) standards, have become an essential part of the cybersecurity landscape. Ensuring compliance with these regulations not only improves overall data security, but is also critical to avoiding heavy penalties and maintaining customer trust. But how can you ensure that […]

The 3 pillars of cybersecurity: the CIA triad

lecs outline on the three pillars of cybersecurity

In today’s cybersecurity landscape, there are fundamental pillars that are essential to understand in order to protect organizations’ and companies’ digital assets from cyber threats. To ensure proper management of cyber data security, in the context of Cyber Security, there are three principles, commonly known as the CIA triad, which are: confidentiality, integrity and availability. […]

Best Practice: 5 key activities for cybersecurity

lecs the five activities necessary for cybersecurity

In an era of evolving and increasingly sophisticated cyber threats, cybersecurity has become a top priority for companies of all sizes. Cyber attacks can cause devastating damage, compromising sensitive data, disrupting business operations and damaging an organization’s reputation. To effectively address these challenges, it is essential to take a proactive and systematic approach to cybersecurity. […]

Phishing alert: how to recognize the attack, is Meta not writing to you!

lecs phising alert

In recent weeks, we have seen an increasing number of targeted phishing attacks. One particular aspect of this threat is the deception of malicious attackers posing as the well-known Meta group, which includes platforms such as Facebook, WhatsApp, and Instagram. The Modus Operandi of the Strikers The scammers behind these phishing attacks are cleverly exploiting […]