Security

BEZPEČNOSŤ

How can we provide security of your company?

Security Audit

Out team of trained technicians can create a complex security audit for your company according to the state norms ISO 27001 and ISO 27002. We can create detailed report containing all the identified shortfalls of your systems and if you would be interested, we can implement technological changes and repairs, based on our security audit.

Ethical hacking

The aim of our security experts team (white hat hackers) is to get as close as possible to the hackers (black hat hackers). This is because just like them, they are using the same techniques, tools, and opportunities. However, what sets them apart is that they in no way damage your system.

GDPR

General Data Protection Regulation – Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data.

6 Principles of personal data protection:

  1. Purpose Limitations (profiling) – Data is to be used just for the purpose that said data was obtained
  2. Proportionality – to use just the necessary personal data and use an alias or an anonymous – access only to the persons who need that data, deletion of data that is no longer needed.
  3. Sensitive Data – especially sensitive data about the health conditions, birth registration number, race etc.
  4. Transparency and the rights of individuals – To inform how is the personal data going to b used
  5. Right to amend, forget, and provide a statement – Duty of Notification
  6. Security – adequate organisational and technical arrangements preventing non-authorised use and access to personal data
  7. Third party Access – to ensure adequate arrangements for access and transfer of data

Services that we provide

  1. Analysis of the actual state of the processes and directives in relation to the GDPR
  2. Analysis of the actual level of protection of the kept personal data
  3. Processing of necessary documents and plan of recovery
  4. Proposal and adjustment of processes within the organisation
  5. Proposal of actual technical, personal, and processing changes in order to meet the GDPR conditions

Do you need to create reliable IT solution , but you have no BRAIN for it?
We will create it for you!

Do not hesitate to contact us, our specialists are ready to answer your questions.

Contact us

We are offering modern solutions to all types and sizes of organisations.