FAQs
SharePoint
SharePoint is Microsoft's collaboration platform designed for teams and organizations, ideal for creating intranet sites, managing shared document libraries, and automating workflows (“our files”). It differs from OneDrive, which is instead each user's personal cloud storage space geared toward individual files (“my files”). To transfer data into SharePoint from other sources, the official SharePoint Migration Tool (SPMT) is used.
It is the free tool offered by Microsoft to simplify and automate the transfer of content (files, sites, libraries) from local (on-premises) systems or other sources to SharePoint Online and Microsoft 365.
Desktop Telematics
It is a software suite provided by the Internal Revenue Service that is used to prepare, check, sign and telematically send tax returns and documents. Intended primarily for intermediaries (accountants, CAFs) and professionals, it functions as a “container” that you install on your computer and keep updated to ensure compliance with current regulations.
It is intended for qualified intermediaries (accountants, labor consultants, CAFs), taxpayers who use telematic services, and professional firms that handle the transmission of files to the Internal Revenue Service.
You download the executable from the Telematic Services portal of the Internal Revenue Service and follow the wizard. Next, you install the necessary application modules (e.g., Entratel) and configure the digital signature certificates and PEC
Updating is done by downloading the latest version available from the Telematics Services portal or, if available, by using the update function built into the software.
VoIP
VoIP (Voice over Internet Protocol) is the technology that allows people to make phone calls using an Internet connection. Three things are needed to get started: a VoIP service provider that provides a rate plan, a stable Internet connection, and a compatible device, which can be a physical IP phone, a software application (softphone) on a PC/smartphone, or an adapter for traditional phones.
Several options can be used: hardware IP phones, softphones (apps on PCs/smartphones) or ATA adapters to connect a traditional analog phone.
Costs vary: for a private user, the fee can be a few euros per month. For businesses, plans with virtual switchboard start at around €5-25 per month per user, depending on the features included.
Telematic Tax Process (PTT)
It is the fully digital way to manage tax justice disputes, from filing of documents to notifications. To participate, it is necessary to access the “Tax Justice Portal” (SIGIT) and have three essential tools: login credentials, a digital signature to sign documents and a Certified Electronic Mail (CEM) box for legal communications.
Generally, primary documents must be in PDF/A format, a specific standard for long-term preservation. Other attachments may be required in formats such as TIFF/TIF, according to the technical specifications of the SIGIT portal.
The requirement has been phased in through various pieces of legislation. Deadlines vary depending on the type of act, so it is essential to consult the updated provisions on the Tax Justice portal.
Computer Companies
Information technology (IT) companies are those that offer information technology-related products and services, such as software, hardware, consulting, and cloud services. Globally, major multinationals in the industry include giants such as Microsoft, Apple, Amazon (AWS), Google (Alphabet), and IBM, but the market also includes countless system integrators and specialized entities operating locally.
The “best” company depends on the context (managed services, software, consulting). Globally, leaders such as Microsoft, IBM, Amazon Web Services and Google Cloud dominate their respective sectors. Locally, the choice leans toward system integrators and specialized entities based on specific needs.
Telematic Civil Process (PCT)
To operate in the Telematic Civil Process (PCT), it is necessary to use an Access Point (AOP), often integrated into management software such as the “Lawyer Console.” Operation requires indispensable tools such as a digital signature, a PEC box, and redactor software (such as the free SLpct) to create and file the “telematic envelope” containing court documents.
SLpct is a popular free deed redactor that allows you to create the telematic envelope and file it with Italian judicial offices.
Mandatory filing was introduced in phases from 2014-2015, gradually becoming the norm for most civil filings. Ministry of Justice decrees should be consulted for specific deadlines.
Filing is done by sending the “telematic envelope,” which contains the main document digitally signed in PDF/A format. Sending is done via PEC from your management system or Access Point, and the system returns receipts certifying successful transmission and acceptance.
Virtual Desktop
A virtual desktop enables a full operating system (e.g., Windows) hosted on a remote server or in the cloud to be used and accessed from any device. This technology is useful for centralizing security, simplifying IT management, enabling remote work, and scaling resources. Access is through specific clients, and costs vary widely depending on the service (from VR apps to enterprise solutions such as Azure Virtual Desktop).
The cost depends on the type of service: it can be a one-time fee for a VR streaming app, or a monthly fee for DaaS (Desktop-as-a-Service) enterprise solutions such as Windows 365, with prices ranging from a few to tens of euros per month per user.
For enterprise solutions, a client application (e.g., Remote Desktop Client) is downloaded from the vendor's site (e.g., Microsoft). Connection is made by configuring the client with corporate credentials and the service address provided by the IT department.
Operational Hire
The main difference lies in the purpose. Operational rental is a lease focused on the use of the asset: the supplier retains ownership and often offers additional services (maintenance, service), while the customer pays a deductible fee. At the end, the asset is returned or the contract renewed. Financial rental (leasing), on the other hand, is a form of financing aimed at purchase: the customer assumes the risks and, at the end, usually has the option to redeem the asset by becoming its owner.
Lawyer Console
It is an all-in-one management software designed for lawyers that integrates all the tools needed for the Telematic Process in a single interface. It allows you to create and file documents, digitally sign, consult court records, manage PEC notifications, and monitor the status of your files.
Cloud Switchboard
A cloud-based PBX (or virtual PBX) is a business telephone system whose infrastructure is not physically located in the office, but is hosted on a provider's servers and managed via the Internet. This solution offers great flexibility, scalability, and low maintenance costs by managing all communications (extensions, detour, voicemail, IVR) virtually and accessible from anywhere.
There is no absolute “best,” as the choice depends on the specific needs of the company (number of users, integrations with CRM, budget). It is advisable to evaluate the demos and trial periods offered by the various providers to find the most suitable solution.
For small businesses, prices start at about €8-15 per month for a single user, or packages of about €30-70 per month for a small team. Costs increase with the addition of advanced features such as call recording, complex IVRs, or software integrations.
Information Technology Consulting and IT Services
IT consulting is a professional service that helps companies use technology efficiently and securely. A consultant analyzes needs, designs solutions, manages implementation projects, and ensures that IT systems are performing and protected. Using a consultancy provides access to specialized expertise, optimizes costs, reduces risks, and stays current with the latest technological innovations.
It analyzes business needs, proposes technology solutions, manages implementations and upgrades, and ensures the smooth operation and security of systems, networks, and applications, often coordinating entire projects.
Costs vary: a short consultancy can cost from a few hundred to a few thousand euros, while complex projects (migration, security) can reach tens of thousands. Rates can be hourly or project-based.
Management Consulting focuses on business strategy and organization. Technology Consulting translates these strategies into practical technology solutions (e.g., cloud migrations, architectures). IT Consulting is often more operational and focuses on the implementation and management of day-to-day technology infrastructure.
These are all services related to the technological operation of a business, including hardware and software management, networks, security, backup, technical support, and application development.
Digital Identity Theft
Digital identity theft can cause serious financial, reputational, and legal damage. In case of theft, it is critical to immediately file a report with the Postal Police, contact service providers (banks, social media) to block compromised accounts, and collect all evidence. The best defense is prevention, using complex passwords, enabling two-factor authentication (2FA), and regularly monitoring one's accounts.
Penalties vary depending on the specific crime committed (e.g., substitution of person, fraud, abusive access) and can include fines and prison sentences, depending on the severity of the harm caused.
A formal complaint must be filed with the Postal Police, gathering all possible evidence (screenshots, emails, logs) documenting the abuse.
Vertical Integration
A company is vertically integrated when it internally controls multiple stages of its production or distribution chain, such as raw material sourcing, production, and direct sales to the end customer. This approach gives it greater control over cost, quality and delivery time. The “degree of integration” measures how many of these activities the company performs on its own instead of outsourcing them to third parties.
Cloud Backup
Cloud backup involves saving copies of corporate data on remote servers managed by a provider to protect it from hardware failure, ransomware attacks, human error, or disaster. To implement it, it is necessary to choose a reliable provider, configure what data to save and how often, make sure the data is encrypted, and test recovery procedures periodically.
There is no absolute “best.” The choice depends on factors such as cost, provider reliability, data center location (for regulatory compliance), and recovery performance. AWS, Azure and Google Cloud are leaders for enterprises.
It is a fundamental security measure that ensures that data can be recovered in the event of an incident (attack, failure, error), minimizing losses and ensuring business continuity.
Digital Security
Digital security is the set of practices and technologies designed to protect data, systems, and networks from threats such as malware, phishing, and unauthorized access. It is based on three basic principles: Confidentiality (data is accessible only to those who are authorized), Integrity (data is not altered), and Availability (data and systems are accessible when needed). To protect itself, a company must take preventive measures such as firewalls, antivirus, backups, encryption, and staff training.
Data, infrastructure, applications, digital identities, devices, intellectual property and business continuity of the company are protected.
Salary varies greatly by role and experience. In Italy, a junior security analyst can earn between 30,000 and 45,000 euros per year, while senior or specialized figures (e.g., Security Architect) can far exceed this figure.
IT Support for Companies
IT support is the set of services dedicated to the management, maintenance and resolution of a company's IT problems. It includes technical support to users, optimization of infrastructure, and protection of systems. The cost varies: hourly rates for technical support average from 50 to 120 euros per hour, while more structured consulting can have project-based costs, starting from a few hundred up to several thousand euros.
Digital Signature and Notarial Deeds
Yes, it is possible to enter into a notarial deed entirely digitally. A digital signature, when affixed through certified and qualified platforms according to the procedures provided by the notary, has full legal force and is recognized as authentic, allowing remote deeds to be signed in a secure and legally valid manner.
IT Help Desk
The IT help desk is the first point of contact for users who need technical support. Its job is to handle requests (tickets), resolve problems related to hardware, software, and networks, and provide support to ensure the proper functioning of work tools. It works by taking charge of reports and providing solutions, either remotely or by direct intervention.
In Italy, the average salary for this figure generally varies between 22,000 and 32,000 euros gross per year, depending on experience and business environment.
Enterprise Networks and Networking
Enterprise networks are the infrastructures that link together computers, servers and other devices within an organization, enabling the secure sharing of data and resources. They are critical because they enable collaboration, streamline workflows and protect information. The main types are local area networks (LANs) and wide area networks (WANs). “Networking,” on the other hand, refers to building a network of professional contacts to create business opportunities.
Artificial Intelligence for Law Firms
Artificial intelligence (AI) is used in law firms to automate and optimize various tasks. Common solutions include software for predictive case law analysis, automated contract management and drafting (document automation), and advanced legal research, enabling lawyers to increase the efficiency and accuracy of their work.
Email Security
It is the set of practices and technologies designed to protect e-mail inboxes from cyber threats. The main objective is to defend against phishing attacks (scams that aim to steal credentials), malware, spam, and unauthorized access, while ensuring the confidentiality and integrity of communications.
Generally, the most secure providers are those that offer end-to-end encryption by default, such as ProtonMail or Tutanota, because they prevent anyone, including the provider itself, from reading the content of messages.
Vulnerability Assessment and Penetration Testing
Although both are security tests, they serve different purposes. Vulnerability Assessment is an automated process that scans systems to identify and classify known vulnerabilities. Penetration Testing, on the other hand, is a controlled, simulated attack conducted by an expert (ethical hacker) who attempts to actively exploit discovered vulnerabilities to see what the real impact of an attack is.