{"id":8326,"date":"2023-10-25T14:17:36","date_gmt":"2023-10-25T12:17:36","guid":{"rendered":"https:\/\/flowbergit.pl\/cybersecurity\/"},"modified":"2024-04-17T10:37:09","modified_gmt":"2024-04-17T08:37:09","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/flowbergit.pl\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-c1f824fb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-9a1be534 alignwide uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-823e275e\">\n<div class=\"wp-block-uagb-info-box uagb-block-c6e9366c uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">Cybersecurity<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2bc0dbf3\"><p class=\"uagb-heading-text\">Effective data protection requires appropriate technical and organizational solutions.<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__large-btn uagb-block-130adb74\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-a444ab93 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#umow-sie\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Contact<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-5e8f91fe wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#soc\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">SOC<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5297765a alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-283e4530\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6a3c31dd\"><p class=\"uagb-heading-text\">Key Security Factors<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-d636caac\"><h2 class=\"uagb-heading-text\">IT security<br>within the company<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-32413436\">\n<div class=\"wp-block-uagb-info-box uagb-block-6bba3fc8 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">Modern technologies bring benefits but also risks. Although these solutions reduce risk, it is worth paying attention to potential damage, even those that seem mundane, that may negatively affect the company. It is worth emphasizing that the human factor can ruin even the best IT security solutions.<\/p><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-20d0418d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-45398009\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-457d7a2b alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-044f1e2a\"><h3 class=\"uagb-heading-text\">Examples of threats<\/h3><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7b2fe103 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-6d09e3bd\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7d880235 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"accordion-carousel\">\n    <div id=\"accordion-carousel-two\" class=\"carousel slide carousel-fade\" data-ride=\"carousel\">\n    <div class=\"carousel-inner\">\n    <div class=\"carousel-item active\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/zbyt-slabe-hasla.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Weak passwords<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">People often use passwords that are too weak, relying on full words or combining them with numbers, which creates risk Creating strong passwords should be the responsibility of higher-level employees, and the passwords themselves can be written down in a physical form, accessible to both the employee and his or her supervisor.<br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">The solution is password managers such as LastPass or 1Password, which allow you to generate complex passwords, different for each account. Thanks to this, the user only needs to remember one strong password, which provides access to the rest.<br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"carousel-item\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/strony-wyludzajace-dane.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Phishing websites<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Phishing websites pose a potential threat when employees use the Internet for entertainment purposes in the workplace. While a break from work is necessary, in the context of cybersecurity, it can lead to problems. There are phishing sites which conduct impersonation attacks by mimicking well-known webpages in order to extort data, which poses a threat to private individuals.<br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">In the case of corporate data, this can be disastrous. The same applies to mailboxes, which are susceptible to SPAM and phishing attempts. Therefore, training employees in IT security is a key solution.<br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"carousel-item\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/przypadkowa-utrata-danych.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Accidental loss of data<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">From the perspective of the work performed, it is essential to ensure that the results are properly recorded. While most programs currently offer an automatic saving function, some of them still require this operation to be performed manually. It is worth sensitizing employees to this, as it may result in the loss of progress on a given task, which translates directly into losses for the company.<br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">An extension of this responsibility should be periodic archiving of files from the computer, i.e. creating the so-called backup, which allows you to restore accidentally lost files.<br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <ol class=\"carousel-indicators black\">\n    <li class=\"active\" data-target=\"#accordion-carousel-two\" data-slide-to=\"0\">01<\/li>\n    <li data-target=\"#accordion-carousel-two\" data-slide-to=\"1\">02<\/li>\n    <li data-target=\"#accordion-carousel-two\" data-slide-to=\"2\">03<\/li>\n    <\/ol>\n\n    <button class=\"carousel-control-prev\" type=\"button\" data-target=\"#accordion-carousel-two\" data-slide=\"prev\">\n        <span class=\"carousel-control-prev-icon\" aria-hidden=\"true\"><svg width=\"20\" height=\"20\" viewbox=\"0 0 256 512\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><\/span>\n        <span class=\"sr-only\">Poprzedni<\/span>\n    <\/button>\n    <button class=\"carousel-control-next\" type=\"button\" data-target=\"#accordion-carousel-two\" data-slide=\"next\">\n        <span class=\"carousel-control-next-icon\" aria-hidden=\"true\"><svg width=\"20\" height=\"20\" viewbox=\"0 0 256 512\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n        <span class=\"sr-only\">Nast\u0119pny<\/span>\n    <\/button>\n\n    <\/div>\n    <\/div>\n    <\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"soc\" class=\"wp-block-uagb-container uagb-block-b1b65be8 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-cd1cf785\"><p class=\"uagb-heading-text\">Our Services<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-fe2e32d4\"><h3 class=\"uagb-heading-text\">Flowberg IT provides SOC<br>(Security Operation Center) services<\/h3><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b8c5cf99 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-503c028a\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e83f6c55 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-cc5ab32c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-deaf73fc\"><p class=\"uagb-heading-text\">The service monitors the security of business processes taking place in the client&#8217;s IT infrastructure. Thanks to it, it is possible to respond quickly to emerging events that threaten the continuity of business processes.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-16864d2d\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-304cf7cb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-b2779b5f\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e72a1eb1 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-c982965f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-7ed983d4\"><p class=\"uagb-heading-text\">The service reduces the possibility of compromising systems critical to the functioning of the enterprise and minimizes the possibility of leakage or publication of data that is of key importance to the customer. The SOC&#8217;s work also results in reports showing the condition of the ICT environment in which business processes take place.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9b71e10f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3173e9da\"><p class=\"uagb-heading-text\">The reports provide information on the frequency, threat level and degree of resilience of the IT infrastructure to emerging events. At the same time, they contain recommendations regarding the steps necessary to minimize emerging threats.<\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bcc2cfd1 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-15dd1514\"><p class=\"uagb-heading-text\">SOC Implemented Tasks<\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-343586ad alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-67efc3bf\">\n<div class=\"wp-block-uagb-info-box uagb-block-a5bfc598 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/rozproszone-srodowiska-1.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">An audit of the company&#8217;s IT security policy<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-647e77c1\">\n<div class=\"wp-block-uagb-info-box uagb-block-e0f9e49f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-zdarzen.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Monitoring of events related to IT security<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a3e7ea81\">\n<div class=\"wp-block-uagb-info-box uagb-block-c496e423 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/audyt-i-zalecenia.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Cyclical audit and recommendations related to security policy based on event monitoring<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ec1ebf3c alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-a83564dd\">\n<div class=\"wp-block-uagb-info-box uagb-block-33fef5e2 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/implementacja-systemow.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Recommendations regarding the shape and method of implementation of solutions for systems processing critical data<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d5dd06e5\">\n<div class=\"wp-block-uagb-info-box uagb-block-004763c5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-dostepu-danych.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Monitoring access to business-critical data<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0666d322\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-48b36a96 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f386cd37\"><p class=\"uagb-heading-text\">Benefits of SOC<\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6cceb6fc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ab211844\">\n<div class=\"wp-block-uagb-info-box uagb-block-60b1eb2f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-zdarzen-24.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">24\/7 monitoring of IT security events<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6b96e058\">\n<div class=\"wp-block-uagb-info-box uagb-block-a4fccedb uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/cykliczny-audyt.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Cyclical audit and modification of enterprise security policy procedures<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-634830da\">\n<div class=\"wp-block-uagb-info-box uagb-block-6b22bcfa uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/audyt-i-zalecenia-bezpieczenstwa.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Cyclical audit and recommendations related to security policy based on event monitoring<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-135b18db alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-59b9bfff\">\n<div class=\"wp-block-uagb-info-box uagb-block-1f34530a uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/procedury-zachowan.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Introducing and detailing procedures for behavior in crisis situations.<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-10cb61a9\">\n<div class=\"wp-block-uagb-info-box uagb-block-b3e59a31 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/kompleksowa-informacja.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Comprehensive information on the state of the IT security infrastructure<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6153833a\">\n<div class=\"wp-block-uagb-info-box uagb-block-4f6f056b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/minimalizacja-kosztow.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Minimizing costs incurred for ICT security related to post-active activities<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2c4fc1dd alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-409e7fef\">\n<div class=\"wp-block-uagb-info-box uagb-block-a935dbdf uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/cyberbezpieczenstwo.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Proper analysis of the initial state and needs of the institution or enterprise in the field of information security<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dfe8daf1\">\n<div class=\"wp-block-uagb-info-box uagb-block-c847f18b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/wdrozenie-systemu.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Risk management system implementation<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dd85bf34\">\n<div class=\"wp-block-uagb-info-box uagb-block-0a6a1c10 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/wdrozenie-polityki.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Implementation of the Information Security Policy, in accordance with the guidelines and legal regulations<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"umow-sie\" class=\"wp-block-uagb-container uagb-block-f1ad4d9f alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-21913c9e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-7267e014\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-c81f7d90\"><p class=\"uagb-heading-text\">Talk to me about the SOC offer for your organization<\/p><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-745b194f\"><p class=\"uagb-heading-text\"><strong>Tomasz Or\u0142owski<\/strong> | Director of the Cybersecurity Solutions Division<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7f040da5\"><div data-uniq='69dedf1545d5c' class='uniq-69dedf1545d5c formcraft-css form-live align-left'><script> window.formcraftLogic = window.formcraftLogic || {}; window.formcraftLogic[22] = []; <\/script><div class=\"fc-pagination-cover fc-pagination-1\">\n\t\t\t\t<div class=\"fc-pagination width-100\">\n\t\t\t\t\t<!-- ngRepeat: page in Builder.FormElements track by $index --><div class=\"pagination-trigger \" data-index=\"0\">\n\t\t\t\t\t\t<span class=\"page-number\"><span >1<\/span><\/span>\n\t\t\t\t\t\t<span class=\"page-name \">Step 1<\/span>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div><!-- end ngRepeat: page in Builder.FormElements track by $index -->\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<style scoped=\"scoped\" >\n\t\t\t@media (max-width : 480px) {\n\t\t\t\t.fc_modal-dialog-22 .fc-pagination-cover .fc-pagination\n\t\t\t\t{\n\t\t\t\t\tbackground-color: none !important;\n\t\t\t\t}\n\t\t\t}\n\t\t\t\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .submit-cover .submit-button,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .fileupload-cover .button-file,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover .button,\n\t\t\t.formcraft-datepicker .ui-datepicker-header,\n\t\t\t.formcraft-datepicker .ui-datepicker-title\n\t\t\t{\n\t\t\t\tbackground: #000000;\n\t\t\t\tcolor: #ffffff;\n\t\t\t}\n\t\t\t.formcraft-datepicker td .ui-state-active,\n\t\t\t.formcraft-datepicker td .ui-state-hover,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .slider-cover .ui-slider-range\n\t\t\t{\n\t\t\t\tbackground: #000000;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-header,\n\t\t\t.formcraft-css .fc-form .field-cover>div.full hr\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-prev:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-next:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker select.ui-datepicker-month:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker select.ui-datepicker-year:hover\n\t\t\t{\n\t\t\t\tbackground-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-pagination>div.active .page-number,\n\t\t\t.formcraft-css .form-cover-builder .fc-pagination>div:first-child .page-number\n\t\t\t{\n\t\t\t\tbackground-color: #4488ee;\n\t\t\t\tcolor: #ffffff;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker table.ui-datepicker-calendar th,\n\t\t\t#ui-datepicker-div.formcraft-datepicker table.ui-datepicker-calendar td.ui-datepicker-today a,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .star-cover label,\n\t\t\thtml .formcraft-css .fc-form.label-floating .form-element .field-cover.has-focus>span,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .customText-cover a,\n\t\t\t.formcraft-css .prev-next>div span:hover\n\t\t\t{\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .customText-cover a:hover\n\t\t\t{\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\thtml .formcraft-css .fc-form.fc-form-22.label-floating .form-element .field-cover > span\n\t\t\t{\n\t\t\t\tcolor: #0a0a0a;\n\t\t\t}\n\t\t\thtml .formcraft-css .fc-form .final-success .final-success-check {\n\t\t\t\tborder: 2px solid #0a0a0a;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"text\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"email\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"password\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"tel\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover textarea,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover select,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover .time-fields-cover,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover .awesomplete ul\n\t\t\t{\n\t\t\t\tcolor: #0a0a0a;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"text\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"password\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"email\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"radio\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"checkbox\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"tel\"],\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover select,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover textarea\n\t\t\t{\n\t\t\t\tbackground-color: #fafafa;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"radio\"]:checked,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .field-cover input[type=\"checkbox\"]:checked {\n\t\t\t\tborder-color: #000000;\n\t\t\t\tbackground: #000000;\t\t\t\t\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .star-cover label .star\n\t\t\t{\n\t\t\t\ttext-shadow: 0px 1px 0px #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .slider-cover .ui-slider-range\n\t\t\t{\n\t\t\t\tbox-shadow: 0px 1px 1px #000000 inset;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .fileupload-cover .button-file\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html input[type=\"password\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html input[type=\"email\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html input[type=\"tel\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html input[type=\"text\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html textarea:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html select:focus\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22 .form-element .form-element-html .field-cover .is-read-only:focus {\n\t\t\t\tborder-color: #ccc;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-22\t\t\t{\n\t\t\t\tfont-family: inherit;\n\t\t\t}\n\t\t\t@media (max-width : 480px) {\n\t\t\t\thtml .dedicated-page,\n\t\t\t\thtml .dedicated-page .formcraft-css .fc-pagination > div.active\n\t\t\t\t{\n\t\t\t\t\tbackground: none;\n\t\t\t\t}\n\t\t\t}\n\t\t<\/style>\n\t\t<div class=\"form-cover\">\n\t\t\t<form data-auto-scroll=\"\" data-no-message-redirect=\"\" data-thousand=\"\" data-decimal=\".\" data-delay=\"\" data-id=\"22\" class=\"fc-form fc-form-22 align- fc-temp-class save-form- dont-submit-hidden- disable-enter- label-floating field-border-visible frame-hidden remove-asterisk-true icons-hide-true field-alignment-left\" style=\"width: 100%; color: #0a0a0a; font-size: 100%; background: none\">\n\t\t\t\t<!-- ngRepeat: page in Builder.FormElements track by $index --><div class=\"form-page form-page-0\" data-index=\"0\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"form-page-content      ng-not-empty\">\n\t\t\t\t\t\t<div data-identifier=\"field1\" data-index=\"0\" style=\"width: 100%\" class=\" form-element form-element-field1 options-false form-element-0 default-false form-element-type-oneLineText is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"oneLineText-cover field-cover \"><span class=\"sub-label-false\"><span class=\"main-label\"><span >First and Last Name<\/span><\/span><span class=\"sub-label\"><\/span><\/span><div><span class=\"error\"><\/span><input type=\"text\" placeholder=\"\" make-read-only=\"false\" data-field-id=\"field1\" name=\"field1[]\" data-min-char=\"\" data-max-char=\"\" data-val-type=\"\" data-regexp=\"\" data-is-required=\"false\" data-allow-spaces=\"\" class=\"validation-lenient\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-input-mask=\"\" data-mask-placeholder=\"\" data-original-title=\"\"><i class=\"formcraft-icon formcraft-icon-type-\"><\/i><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field2\" data-index=\"1\" style=\"width: 100%\" class=\" even form-element form-element-field2 options-false form-element-1 default-false form-element-type-email is-required-true -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"email-cover field-cover \"><span class=\"sub-label-true\"><span class=\"main-label\"><span >Email<\/span><\/span><span class=\"sub-label\"><span >a valid email<\/span><\/span><\/span><div><span class=\"error\"><\/span><input placeholder=\"\" data-field-id=\"field2\" type=\"text\" data-val-type=\"email\" make-read-only=\"\" data-is-required=\"true\" name=\"field2\" class=\"validation-lenient\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-original-title=\"\"><i class=\"formcraft-icon\">email<\/i><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field4\" data-index=\"2\" style=\"width: 100%\" class=\" form-element form-element-field4 options-false form-element-2 default-false form-element-type-textarea is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"textarea-cover field-cover \"><span class=\"sub-label-false\"><span class=\"main-label\"><span >How can we help you?<\/span><\/span><span class=\"sub-label\"><\/span><\/span><div><span class=\"error\"><\/span><textarea data-field-id=\"field4\" placeholder=\"\" class=\"validation-lenient\" name=\"field4\" value=\"\" rows=\"5\" data-min-char=\"\" data-max-char=\"\" data-is-required=\"false\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-original-title=\"\" style=\"min-height: 107.938px\"><\/textarea><div class=\"count-\"><span class=\"current-count\">0<\/span> \/ <span class=\"max-count \"><\/span><\/div><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field7\" data-index=\"3\" style=\"width: 100%\" class=\" even form-element form-element-field7 options- form-element-3 default-false form-element-type-reCaptcha is-required-false -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div data-site-key=\"6LcW3aspAAAAAPv3ksNlDD3LWtOZTXNJZ5eJzXsL\" class=\"captcha-placeholder \">reCaptcha v3<\/div><input type=\"hidden\" class=\"recaptcha-token \" name=\"recaptcha-token\"><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field5\" data-index=\"4\" style=\"width: 100%\" class=\" form-element form-element-field5 options-false form-element-4 default-false form-element-type-checkbox is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div class=\"images- checkbox-cover field-cover\"><span class=\"sub-label-false\"><span class=\"main-label\"><\/span><span class=\"sub-label\"><\/span><\/span><div data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"hover\" data-html=\"true\" data-original-title=\"\"><span class=\"error\"><\/span><label style=\"width:\" ><img alt=\"\"><input data-field-id=\"field5\" type=\"checkbox\" data-is-required=\"false\" name=\"field5[]\" value=\"<p><span style=&quot;font-size: 13px;&quot;>I hereby agree to the processing of my personal data. FLOWBERGIT Sp. z o. o. processes personal and sensitive data in accordance with legal regulations. More information in our <a href=&quot;\/polityka-prywatnosci\/&quot;>Privacy Policy<\/a>.<\/span><\/p>\" class=\"validation-lenient\"><span><p ><span>I hereby agree to the processing of my personal data. FLOWBERGIT Sp. z o. o. processes personal and sensitive data in accordance with legal regulations. More information in our <a href=\"\/polityka-prywatnosci\/\">Privacy Policy<\/a>.<\/span><\/p><\/span><\/label><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field6\" data-index=\"5\" style=\"width: 100%\" class=\" even form-element form-element-field6 options-false form-element-5 default-false form-element-type-submit is-required-false -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div class=\"align-right wide-false submit-cover field-cover\"><button type=\"submit\" class=\"button submit-button\"><span class=\"text \">Submit<\/span><span class=\"spin-cover\"><i style=\"color:\" class=\"loading-icon icon-cog animate-spin\"><\/i><\/span><\/button><\/div><div class=\"submit-response \"><\/div><label ><input type=\"text\" class=\"required_field\" name=\"website\" autocomplete=\"maple-syrup-pot\"><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><!-- end ngRepeat: page in Builder.FormElements track by $index -->\n\t\t\t<\/form>\n\t\t\t<div class=\"prev-next prev-next-1\" style=\"width: 100%; color: #0a0a0a; font-size: 100%; background: none\">\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<span class=\"inactive page-prev \"><i class=\"formcraft-icon\">keyboard_arrow_left<\/i>Previous<\/span><\/div>\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<span class=\"page-next \">Next<i class=\"formcraft-icon\">keyboard_arrow_right<\/i><\/span><\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Effective data protection requires appropriate technical and organizational solutions. Key Security Factors IT securitywithin the company Examples of threats Weak passwords People often use passwords that are too weak, relying on full words or combining them with numbers, which creates risk Creating strong passwords should be the responsibility of higher-level employees, and the passwords themselves &hellip;<\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"woocommerce_thumbnail":false,"woocommerce_single":false,"woocommerce_gallery_thumbnail":false},"uagb_author_info":{"display_name":"Mateusz Knopczy\u0144ski","author_link":"#"},"uagb_comment_info":0,"uagb_excerpt":"Effective data protection requires appropriate technical and organizational solutions. Key Security Factors IT securitywithin the company Examples of threats Weak passwords People often use passwords that are too weak, relying on full words or combining them with numbers, which creates risk Creating strong passwords should be the responsibility of higher-level employees, and the passwords themselves&hellip;","_links":{"self":[{"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/pages\/8326"}],"collection":[{"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/comments?post=8326"}],"version-history":[{"count":9,"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/pages\/8326\/revisions"}],"predecessor-version":[{"id":9480,"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/pages\/8326\/revisions\/9480"}],"wp:attachment":[{"href":"https:\/\/flowbergit.pl\/en\/wp-json\/wp\/v2\/media?parent=8326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}