{"id":19833,"date":"2025-04-03T00:03:54","date_gmt":"2025-04-02T22:03:54","guid":{"rendered":"https:\/\/teneg.pl\/its\/?p=19833"},"modified":"2025-04-03T00:26:07","modified_gmt":"2025-04-02T22:26:07","slug":"cyberbezpieczenstwo-w-firmie","status":"publish","type":"post","link":"https:\/\/teneg.pl\/its\/cyberbezpieczenstwo-w-firmie\/","title":{"rendered":"Dlaczego ka\u017cda firma powinna zwr\u00f3ci\u0107 uwag\u0119 na cyberbezpiecze\u0144stwo?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">&#8222;Mnie to nie dotyczy&#8221; \u2013 naprawd\u0119?<\/h3><\/div><div class=\"fusion-text fusion-text-1 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-margin-bottom:20px;\"><p>Czy my\u015blisz, \u017ce cyberbezpiecze\u0144stwo dotyczy tylko du\u017cych korporacji? <a style=\"font-weight: 600;\" href=\"https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/\">Statystyki <\/a>pokazuj\u0105 co\u015b zupe\u0142nie innego. A\u017c 60% ma\u0142ych firm, kt\u00f3re pad\u0142y ofiar\u0105 cyberataku, zbankrutowa\u0142o w ci\u0105gu sze\u015bciu miesi\u0119cy. Dlaczego? Bo cyberprzest\u0119pcy cz\u0119\u015bciej atakuj\u0105 tam, gdzie zabezpieczenia s\u0105 s\u0142abe.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:5px;width:100%;max-width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Dlaczego warto zadba\u0107 o bezpiecze\u0144stwo online?<\/h3><\/div><div class=\"fusion-text fusion-text-2 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-line-height:1.4;--awb-margin-bottom:20px;\"><p>Bezpiecze\u0144stwo danych i informacji jest fundamentem ka\u017cdej firmy, niezale\u017cnie od bran\u017cy czy rozmiaru. Cyberataki mog\u0105 przynie\u015b\u0107 powa\u017cne konsekwencje finansowe, operacyjne i reputacyjne. Utrata danych, przestoje w dzia\u0142alno\u015bci czy nawet wyciek informacji o klientach mog\u0105 mie\u0107 daleko id\u0105ce skutki.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:0px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Najcz\u0119stsze konsekwencje cyberatak\u00f3w:<\/h3><\/div><div class=\"fusion-text fusion-text-3 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-line-height:1.4;--awb-margin-bottom:10px;\"><ul>\n<li style=\"margin-bottom: 10px;\"><strong>Straty finansowe<\/strong> \u2013 ataki ransomware mog\u0105 zmusi\u0107 firm\u0119 do zap\u0142acenia okupu, a inne formy atak\u00f3w mog\u0105 prowadzi\u0107 do strat na skutek przerw w dzia\u0142alno\u015bci.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Utrata danych<\/strong> \u2013 brak odpowiednich kopii zapasowych mo\u017ce skutkowa\u0107 nieodwracalnym usuni\u0119ciem wra\u017cliwych informacji.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Kary finansowe<\/strong> \u2013 nieprzestrzeganie przepis\u00f3w o ochronie danych (np. RODO) mo\u017ce skutkowa\u0107 surowymi sankcjami.<\/li>\n<li><strong>Szkody reputacyjne<\/strong> \u2013 utrata zaufania klient\u00f3w i partner\u00f3w biznesowych mo\u017ce prowadzi\u0107 do spadku przychod\u00f3w.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Jakie zagro\u017cenia s\u0105 najcz\u0119stsze?<\/h3><\/div><div class=\"fusion-text fusion-text-4 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-line-height:1.4;--awb-margin-bottom:10px;\"><p>Przedsi\u0119biorcy cz\u0119sto nie zdaj\u0105 sobie sprawy z tego, jak wiele metod stosuj\u0105 cyberprzest\u0119pcy. Oto kilka najpopularniejszych:<\/p>\n<ul>\n<li style=\"margin-bottom: 10px;\"><strong>Phishing<\/strong> \u2013 ataki polegaj\u0105ce na podszywaniu si\u0119 pod zaufane instytucje, by wy\u0142udzi\u0107 dane logowania lub informacje finansowe.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Ransomware<\/strong> \u2013 z\u0142o\u015bliwe oprogramowanie szyfruj\u0105ce pliki firmowe i \u017c\u0105daj\u0105ce okupu za ich odzyskanie.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Ataki na luki w oprogramowaniu<\/strong> \u2013 nieaktualne systemy operacyjne i aplikacje to furtka dla haker\u00f3w.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Kradzie\u017c to\u017csamo\u015bci cyfrowej<\/strong> \u2013 przej\u0119cie konta pracownika mo\u017ce skutkowa\u0107 wyciekiem wra\u017cliwych danych.<\/li>\n<li><strong>Ataki DDoS<\/strong> \u2013 maj\u0105 na celu uniemo\u017cliwienie u\u017cytkownikom dost\u0119pu do zasob\u00f3w sieciowych, co mo\u017ce prowadzi\u0107 do powa\u017cnych przerw w dzia\u0142alno\u015bci firmy.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Najcz\u0119stsze b\u0142\u0119dy, kt\u00f3re otwieraj\u0105 drzwi hakerom<\/h3><\/div><div class=\"fusion-text fusion-text-5 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-line-height:1.4;--awb-margin-bottom:10px;\"><p>Poza zagro\u017ceniami zewn\u0119trznymi, wiele firm pada ofiar\u0105 cyberatak\u00f3w z powodu w\u0142asnych zaniedba\u0144. Oto najcz\u0119stsze b\u0142\u0119dy, kt\u00f3re u\u0142atwiaj\u0105 hakerom dost\u0119p do danych:<\/p>\n<ol>\n<li style=\"margin-bottom: 10px;\"><strong>U\u017cywanie s\u0142abych lub powtarzaj\u0105cych si\u0119 hase\u0142<\/strong> \u2013 proste has\u0142a typu &#8222;123456&#8221; czy &#8222;password&#8221; s\u0105 \u0142atwe do z\u0142amania.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Brak aktualizacji oprogramowania<\/strong> \u2013 nieaktualne systemy operacyjne i aplikacje mog\u0105 zawiera\u0107 znane luki, kt\u00f3re hakerzy wykorzystuj\u0105.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Brak uwierzytelniania dwusk\u0142adnikowego (2FA)<\/strong> \u2013 brak dodatkowej warstwy ochrony u\u0142atwia przej\u0119cie konta.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Nie\u015bwiadomo\u015b\u0107 pracownik\u00f3w<\/strong> \u2013 nieprzeszkoleni pracownicy mog\u0105 klika\u0107 w podejrzane linki lub pobiera\u0107 z\u0142o\u015bliwe pliki.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Brak kopii zapasowych<\/strong> \u2013 bez backupu firma mo\u017ce straci\u0107 dane na skutek ataku ransomware.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Korzystanie z publicznych sieci Wi-Fi bez zabezpiecze\u0144<\/strong> \u2013 brak VPN podczas pracy zdalnej nara\u017ca dane na przechwycenie.<\/li>\n<li style=\"margin-bottom: 10px;\"><strong>Brak segmentacji sieci<\/strong> \u2013 po\u0142\u0105czenie wszystkich system\u00f3w w jednej sieci u\u0142atwia hakerom dost\u0119p do ca\u0142ej infrastruktury.<\/li>\n<li><strong>Klikanie w phishingowe e-maile <\/strong> \u2013 otwieranie podejrzanych wiadomo\u015bci i za\u0142\u0105cznik\u00f3w mo\u017ce prowadzi\u0107 do infekcji system\u00f3w.<\/li>\n<\/ol>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Jak mo\u017cesz si\u0119 zabezpieczy\u0107?<\/h3><\/div><div class=\"fusion-text fusion-text-6 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-line-height:1.4;--awb-margin-bottom:20px;\"><p>Na szcz\u0119\u015bcie nie musisz by\u0107 ekspertem od <a style=\"font-weight: 600;\" href=\"https:\/\/teneg.pl\/its\/cyberbezpieczenstwo\/\">cyberbezpiecze\u0144stwa<\/a>, by znacznie poprawi\u0107 poziom ochrony swojej firmy. Oto kilka podstawowych krok\u00f3w:<\/p>\n<p style=\"padding-left: 25px; font-weight: 600; margin-bottom: 0px;\">1. Regularne aktualizacje oprogramowania<\/p>\n<p style=\"margin-top: 0px;\">Nieaktualne systemy operacyjne i aplikacje stanowi\u0105 \u0142atwy cel dla cyberprzest\u0119pc\u00f3w. Warto upewni\u0107 si\u0119, \u017ce wszystkie urz\u0105dzenia i programy s\u0105 na bie\u017c\u0105co aktualizowane, co zmniejsza ryzyko atak\u00f3w na znane luki w zabezpieczeniach.<\/p>\n<p style=\"padding-left: 25px; font-weight: 600; margin-bottom: 0px;\">2. Szkolenia dla pracownik\u00f3w<\/p>\n<p style=\"margin-top: 0px;\">Najwi\u0119kszym zagro\u017ceniem dla cyberbezpiecze\u0144stwa cz\u0119sto s\u0105 b\u0142\u0119dy ludzkie. Regularne szkolenia dotycz\u0105ce cyberhigieny, rozpoznawania phishingu i bezpiecznego korzystania z internetu mog\u0105 znacz\u0105co zmniejszy\u0107 ryzyko incydent\u00f3w.<\/p>\n<p style=\"padding-left: 25px; font-weight: 600; margin-bottom: 0px;\">3. Uwierzytelnianie dwusk\u0142adnikowe (2FA)<\/p>\n<p style=\"margin-top: 0px;\">Dodatkowa warstwa zabezpiecze\u0144, taka jak kod SMS lub aplikacja uwierzytelniaj\u0105ca, mo\u017ce znacznie utrudni\u0107 przej\u0119cie konta przez haker\u00f3w.<\/p>\n<p style=\"padding-left: 25px; font-weight: 600; margin-bottom: 0px;\">4. Regularne kopie zapasowe<\/p>\n<p style=\"margin-top: 0px;\">Najlepiej przechowywane offline lub w odizolowanych systemach. Kopie zapasowe pozwalaj\u0105 szybko przywr\u00f3ci\u0107 dane po ataku ransomware lub awarii.<\/p>\n<p style=\"padding-left: 25px; font-weight: 600; margin-bottom: 0px;\">5. Bezpieczne sieci i has\u0142a<\/p>\n<p style=\"margin-top: 0px;\"><a style=\"font-weight: 600;\" href=\"https:\/\/teneg.pl\/its\/cyberbezpieczenstwo\/pam\/\">Zarz\u0105dzanie dost\u0119pem uprzywilejowanym<\/a> to podstawa. Dodatkowo warto stosowa\u0107 VPN do zabezpieczenia po\u0142\u0105cze\u0144, zw\u0142aszcza w przypadku pracy zdalnej.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:30px;width:100%;max-width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:15px;--awb-font-size:22px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.4;\">Czy Twoja firma jest gotowa na cyberzagro\u017cenia?<\/h3><\/div><div class=\"fusion-text fusion-text-7 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-margin-bottom:20px;\"><p>Cyberbezpiecze\u0144stwo to nie luksus, ale konieczno\u015b\u0107 \u2013 bez wzgl\u0119du na wielko\u015b\u0107 firmy. Wdro\u017cenie podstawowych zasad mo\u017ce ochroni\u0107 Tw\u00f3j biznes przed powa\u017cnymi stratami. Dlatego warto inwestowa\u0107 w \u015brodki ochronne, szkolenia pracownik\u00f3w oraz regularne testy bezpiecze\u0144stwa, aby zminimalizowa\u0107 ryzyko cyberatak\u00f3w i utrzyma\u0107 bezpiecze\u0144stwo danych.<\/p>\n<p>Zadbaj o cyberbezpiecze\u0144stwo swojej firmy ju\u017c dzi\u015b!<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8 przycisk_zielony przycisk_zielony_wpis przycisk_zielony2\"><p style=\"margin-bottom: 0px; margin-top: 16px;\">_____________________________________<\/p>\n<h1 style=\"margin-bottom: 0px; margin-top: 16px;\"><strong>Zaobserwuj nas po wi\u0119cej<\/strong><\/h1>\n<p style=\"margin-bottom: 0px; margin-top: 16px;\"><a style=\"font-size: 20px; color: #008d36 !important; font-weight: 600; padding: 0px;\" title=\"https:\/\/www.facebook.com\/teneg.it\" href=\"https:\/\/www.facebook.com\/teneg.IT\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Facebook\">Facebook<\/a><\/p>\n<p style=\"margin-bottom: 0px; margin-top: 10px;\"><a style=\"font-size: 20px; color: #008d36 !important; font-weight: 600; padding: 0px;\" title=\"https:\/\/www.linkedin.com\/company\/teneg-it\/\" href=\"https:\/\/www.linkedin.com\/company\/teneg-it\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Linkedin\">Linkedin<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":19834,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[88,6],"tags":[93],"class_list":["post-19833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberbezpieczenstwo","category-wszystkie","tag-nis2"],"_links":{"self":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/posts\/19833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/comments?post=19833"}],"version-history":[{"count":16,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/posts\/19833\/revisions"}],"predecessor-version":[{"id":19850,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/posts\/19833\/revisions\/19850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/media\/19834"}],"wp:attachment":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/media?parent=19833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/categories?post=19833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/tags?post=19833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}