FAQs

SharePoint

What is SharePoint and how does it differ from OneDrive?

SharePoint is Microsoft's collaboration platform designed for teams and organizations, ideal for creating intranet sites, managing shared document libraries, and automating workflows (“our files”). It differs from OneDrive, which is instead each user's personal cloud storage space geared toward individual files (“my files”). To transfer data into SharePoint from other sources, the official SharePoint Migration Tool (SPMT) is used.

What is the SharePoint Migration Tool (SPMT)?

It is the free tool offered by Microsoft to simplify and automate the transfer of content (files, sites, libraries) from local (on-premises) systems or other sources to SharePoint Online and Microsoft 365.

Desktop Telematics

What is the Telematic Desktop and how does it work?

It is a software suite provided by the Internal Revenue Service that is used to prepare, check, sign and telematically send tax returns and documents. Intended primarily for intermediaries (accountants, CAFs) and professionals, it functions as a “container” that you install on your computer and keep updated to ensure compliance with current regulations.

Who can use the Telematic Desktop?

It is intended for qualified intermediaries (accountants, labor consultants, CAFs), taxpayers who use telematic services, and professional firms that handle the transmission of files to the Internal Revenue Service.

How do you install the Telematics Desktop?

You download the executable from the Telematic Services portal of the Internal Revenue Service and follow the wizard. Next, you install the necessary application modules (e.g., Entratel) and configure the digital signature certificates and PEC

How do you update the Telematics Desktop?

Updating is done by downloading the latest version available from the Telematics Services portal or, if available, by using the update function built into the software.

VoIP

What is VoIP and what does it take to start using it?

VoIP (Voice over Internet Protocol) is the technology that allows people to make phone calls using an Internet connection. Three things are needed to get started: a VoIP service provider that provides a rate plan, a stable Internet connection, and a compatible device, which can be a physical IP phone, a software application (softphone) on a PC/smartphone, or an adapter for traditional phones.

What phone is needed for VoIP?

Several options can be used: hardware IP phones, softphones (apps on PCs/smartphones) or ATA adapters to connect a traditional analog phone.

How much does a VoIP line cost?

Costs vary: for a private user, the fee can be a few euros per month. For businesses, plans with virtual switchboard start at around €5-25 per month per user, depending on the features included.

Telematic Tax Process (PTT)

What is the Telematic Tax Trial (PTT) and how do you participate?

It is the fully digital way to manage tax justice disputes, from filing of documents to notifications. To participate, it is necessary to access the “Tax Justice Portal” (SIGIT) and have three essential tools: login credentials, a digital signature to sign documents and a Certified Electronic Mail (CEM) box for legal communications.

What is the required file format for PTT?

Generally, primary documents must be in PDF/A format, a specific standard for long-term preservation. Other attachments may be required in formats such as TIFF/TIF, according to the technical specifications of the SIGIT portal.

Since when is the Telematic Tax Process mandatory?

The requirement has been phased in through various pieces of legislation. Deadlines vary depending on the type of act, so it is essential to consult the updated provisions on the Tax Justice portal.

Computer Companies

What are IT companies and what are the major ones globally?

Information technology (IT) companies are those that offer information technology-related products and services, such as software, hardware, consulting, and cloud services. Globally, major multinationals in the industry include giants such as Microsoft, Apple, Amazon (AWS), Google (Alphabet), and IBM, but the market also includes countless system integrators and specialized entities operating locally.

What are the best IT companies?

The “best” company depends on the context (managed services, software, consulting). Globally, leaders such as Microsoft, IBM, Amazon Web Services and Google Cloud dominate their respective sectors. Locally, the choice leans toward system integrators and specialized entities based on specific needs.

Telematic Civil Process (PCT)

How does the Telematic Civil Process (PCT) work and what does it take to use it?

To operate in the Telematic Civil Process (PCT), it is necessary to use an Access Point (AOP), often integrated into management software such as the “Lawyer Console.” Operation requires indispensable tools such as a digital signature, a PEC box, and redactor software (such as the free SLpct) to create and file the “telematic envelope” containing court documents.

What is a free software for the Telematic Civil Process?

SLpct is a popular free deed redactor that allows you to create the telematic envelope and file it with Italian judicial offices.

Since when is the Telematic Civil Process mandatory?

Mandatory filing was introduced in phases from 2014-2015, gradually becoming the norm for most civil filings. Ministry of Justice decrees should be consulted for specific deadlines.

How does the filing of documents in the PCT work?

Filing is done by sending the “telematic envelope,” which contains the main document digitally signed in PDF/A format. Sending is done via PEC from your management system or Access Point, and the system returns receipts certifying successful transmission and acceptance.

Virtual Desktop

What is a virtual desktop for and how does it work?

A virtual desktop enables a full operating system (e.g., Windows) hosted on a remote server or in the cloud to be used and accessed from any device. This technology is useful for centralizing security, simplifying IT management, enabling remote work, and scaling resources. Access is through specific clients, and costs vary widely depending on the service (from VR apps to enterprise solutions such as Azure Virtual Desktop).

How much does a Virtual Desktop cost?

The cost depends on the type of service: it can be a one-time fee for a VR streaming app, or a monthly fee for DaaS (Desktop-as-a-Service) enterprise solutions such as Windows 365, with prices ranging from a few to tens of euros per month per user.

How do you download and connect a Virtual Desktop?

For enterprise solutions, a client application (e.g., Remote Desktop Client) is downloaded from the vendor's site (e.g., Microsoft). Connection is made by configuring the client with corporate credentials and the service address provided by the IT department.

Operational Hire

What is the difference between operating rental and financial rental (leasing)?

The main difference lies in the purpose. Operational rental is a lease focused on the use of the asset: the supplier retains ownership and often offers additional services (maintenance, service), while the customer pays a deductible fee. At the end, the asset is returned or the contract renewed. Financial rental (leasing), on the other hand, is a form of financing aimed at purchase: the customer assumes the risks and, at the end, usually has the option to redeem the asset by becoming its owner.

Lawyer Console

What is a “Lawyer Console?”

It is an all-in-one management software designed for lawyers that integrates all the tools needed for the Telematic Process in a single interface. It allows you to create and file documents, digitally sign, consult court records, manage PEC notifications, and monitor the status of your files.

Cloud Switchboard

What is a cloud-based PBX and what benefits does it offer?

A cloud-based PBX (or virtual PBX) is a business telephone system whose infrastructure is not physically located in the office, but is hosted on a provider's servers and managed via the Internet. This solution offers great flexibility, scalability, and low maintenance costs by managing all communications (extensions, detour, voicemail, IVR) virtually and accessible from anywhere.

What is the best cloud-based PBX?

There is no absolute “best,” as the choice depends on the specific needs of the company (number of users, integrations with CRM, budget). It is advisable to evaluate the demos and trial periods offered by the various providers to find the most suitable solution.

How much does a cloud-based PBX cost?

For small businesses, prices start at about €8-15 per month for a single user, or packages of about €30-70 per month for a small team. Costs increase with the addition of advanced features such as call recording, complex IVRs, or software integrations.

Information Technology Consulting and IT Services

What is IT consulting and why is it useful for a company?

IT consulting is a professional service that helps companies use technology efficiently and securely. A consultant analyzes needs, designs solutions, manages implementation projects, and ensures that IT systems are performing and protected. Using a consultancy provides access to specialized expertise, optimizes costs, reduces risks, and stays current with the latest technological innovations.

What does an IT consultant do for a living?

It analyzes business needs, proposes technology solutions, manages implementations and upgrades, and ensures the smooth operation and security of systems, networks, and applications, often coordinating entire projects.

How much does IT consulting cost?

Costs vary: a short consultancy can cost from a few hundred to a few thousand euros, while complex projects (migration, security) can reach tens of thousands. Rates can be hourly or project-based.

What is the difference between Management, Technology and IT Consulting?

Management Consulting focuses on business strategy and organization. Technology Consulting translates these strategies into practical technology solutions (e.g., cloud migrations, architectures). IT Consulting is often more operational and focuses on the implementation and management of day-to-day technology infrastructure.

What is meant by IT services?

These are all services related to the technological operation of a business, including hardware and software management, networks, security, backup, technical support, and application development.

Digital Identity Theft

What to do in case of digital identity theft and how to protect yourself?

Digital identity theft can cause serious financial, reputational, and legal damage. In case of theft, it is critical to immediately file a report with the Postal Police, contact service providers (banks, social media) to block compromised accounts, and collect all evidence. The best defense is prevention, using complex passwords, enabling two-factor authentication (2FA), and regularly monitoring one's accounts.

What is the penalty for digital identity theft?

Penalties vary depending on the specific crime committed (e.g., substitution of person, fraud, abusive access) and can include fines and prison sentences, depending on the severity of the harm caused.

How to report online identity theft in Italy?

A formal complaint must be filed with the Postal Police, gathering all possible evidence (screenshots, emails, logs) documenting the abuse.

Vertical Integration

What does it mean for an enterprise to be “vertically integrated”?

A company is vertically integrated when it internally controls multiple stages of its production or distribution chain, such as raw material sourcing, production, and direct sales to the end customer. This approach gives it greater control over cost, quality and delivery time. The “degree of integration” measures how many of these activities the company performs on its own instead of outsourcing them to third parties.

Cloud Backup

What is cloud backup and how to implement it properly?

Cloud backup involves saving copies of corporate data on remote servers managed by a provider to protect it from hardware failure, ransomware attacks, human error, or disaster. To implement it, it is necessary to choose a reliable provider, configure what data to save and how often, make sure the data is encrypted, and test recovery procedures periodically.

What is the best cloud for backup?

There is no absolute “best.” The choice depends on factors such as cost, provider reliability, data center location (for regulatory compliance), and recovery performance. AWS, Azure and Google Cloud are leaders for enterprises.

What is meant by backup in cybersecurity?

It is a fundamental security measure that ensures that data can be recovered in the event of an incident (attack, failure, error), minimizing losses and ensuring business continuity.

Digital Security

What is meant by digital security and how do you protect a business?

Digital security is the set of practices and technologies designed to protect data, systems, and networks from threats such as malware, phishing, and unauthorized access. It is based on three basic principles: Confidentiality (data is accessible only to those who are authorized), Integrity (data is not altered), and Availability (data and systems are accessible when needed). To protect itself, a company must take preventive measures such as firewalls, antivirus, backups, encryption, and staff training.

What can be protected?

Data, infrastructure, applications, digital identities, devices, intellectual property and business continuity of the company are protected.

How much does a cyber security expert get paid?

Salary varies greatly by role and experience. In Italy, a junior security analyst can earn between 30,000 and 45,000 euros per year, while senior or specialized figures (e.g., Security Architect) can far exceed this figure.

IT Support for Companies

What is IT assistance and how much does it cost?

IT support is the set of services dedicated to the management, maintenance and resolution of a company's IT problems. It includes technical support to users, optimization of infrastructure, and protection of systems. The cost varies: hourly rates for technical support average from 50 to 120 euros per hour, while more structured consulting can have project-based costs, starting from a few hundred up to several thousand euros.

Digital Signature and Notarial Deeds

Can a digital signature be used to enter into a notarial act?

Yes, it is possible to enter into a notarial deed entirely digitally. A digital signature, when affixed through certified and qualified platforms according to the procedures provided by the notary, has full legal force and is recognized as authentic, allowing remote deeds to be signed in a secure and legally valid manner.

IT Help Desk

What does an IT help desk do and how does it work?

The IT help desk is the first point of contact for users who need technical support. Its job is to handle requests (tickets), resolve problems related to hardware, software, and networks, and provide support to ensure the proper functioning of work tools. It works by taking charge of reports and providing solutions, either remotely or by direct intervention.

How much does an IT help desk technician make?

In Italy, the average salary for this figure generally varies between 22,000 and 32,000 euros gross per year, depending on experience and business environment.

Enterprise Networks and Networking

What are enterprise networks and why are they important?

Enterprise networks are the infrastructures that link together computers, servers and other devices within an organization, enabling the secure sharing of data and resources. They are critical because they enable collaboration, streamline workflows and protect information. The main types are local area networks (LANs) and wide area networks (WANs). “Networking,” on the other hand, refers to building a network of professional contacts to create business opportunities.

Artificial Intelligence for Law Firms

How is artificial intelligence used in law firms?

Artificial intelligence (AI) is used in law firms to automate and optimize various tasks. Common solutions include software for predictive case law analysis, automated contract management and drafting (document automation), and advanced legal research, enabling lawyers to increase the efficiency and accuracy of their work.

Email Security

What is email security (Email Security)?

It is the set of practices and technologies designed to protect e-mail inboxes from cyber threats. The main objective is to defend against phishing attacks (scams that aim to steal credentials), malware, spam, and unauthorized access, while ensuring the confidentiality and integrity of communications.

What is the most secure email address?

Generally, the most secure providers are those that offer end-to-end encryption by default, such as ProtonMail or Tutanota, because they prevent anyone, including the provider itself, from reading the content of messages.

Vulnerability Assessment and Penetration Testing

What is the difference between Vulnerability Assessment and Penetration Test?

Although both are security tests, they serve different purposes. Vulnerability Assessment is an automated process that scans systems to identify and classify known vulnerabilities. Penetration Testing, on the other hand, is a controlled, simulated attack conducted by an expert (ethical hacker) who attempts to actively exploit discovered vulnerabilities to see what the real impact of an attack is.