Kontakty / Contacts

Cyber Security

A functional cybersecurity solution is an ongoing process given the ever-changing ICT environment. Sufficient attention must be paid not only to configuration and monitoring, but also to the education of all users.
We have experience in corporate and individual security of devices, communications and overall infrastructure. We can analyze your current state, identify vulnerabilities, propose the implementation of effective and affordable measures, and train and test users.

Compliance with Legislation and Standards

We will analyse your current state of compliance, provedeme audit the system, propose the necessary measures and implement our solutions. We will prepare accompanying documentation and evaluate the effectiveness of the implemented measures.
Data Protection - GDPR
SO/IEC 27000 Series Standards
Czech Cybersecurity Act

Penetration and (D)DoS Tests

We will test your security mechanisms by simulating attacks on the network infrastructure, part of it, or a specific web or mobile application.

Risk Analysis

The aim of risk analysis is to identify all HW, SW and information (usually the most valuable!)  assets, calculate their vulnerabilities, possible threats and estimate the probability of their occurrence.

Risk Analysis

The aim of risk analysis is to identify all HW, SW and information (usually the most valuable!)  assets, calculate their vulnerabilities, possible threats and estimate the probability of their occurrence.

Protection Against Threats

We will protect your system from viruses, malware and other malicious software.

User Education and Testing

Users can always be considered the weakest link in any ICT system!
We will educate your system users to ensure they know the fundamentals of secure information handling to minimize the likelihood of sensitive information leak. Prior to the actual training it is possible to examine existing practices using social engineering methods.

Contact us.



    TOP