Kontakty / Contacts


„ Users can always be considered the weakest link in any ICT system! 

We will educate your system users to ensure they know the fundamentals of secure information handling to minimize the likelihood that their error will result in the leakage of sensitive information (e.g., login credentials, personal information or trade secrets). Prior to the actual training, it is possible, if desired, to examine existing practices using social engineering methods (e.g. e-mail and voice phishing).