Blog

GAP analýza vám pomůže zjistit, jak na tom jste s kybernetickou bezpečností – kde splňujete požadavky, kde vám něco chybí a co s tím dál.
If you provide a regulated service, you need to identify which security tier applies to you — basic or stricter. But how do you determine your tier, and what does it actually mean in practice?
What are regulated services and why does it matter? Identifying them is key to determining whether you will be affected by the new cyber law and under what regime.
SOC 2 or ISO 27001? Both certifications address information security, but each in a slightly different way. In this article, we explain the differences, advantages, and limitations – and when each investment really pays off.
What is self-identification? In short, it means that every company must determine on its own whether the new Cybersecurity Act applies to it. If it does, the company is required to notify the state. But how exactly do you go about the self-identification process?
Do you allow employees to work from their own phones and laptops? Without clear BYOD rules, you risk data leaks and GDPR violations. Read what you need to keep under control.
The consultation on the implementing regulations for the new Cybersecurity Act has started. We’ve summarized the changes that show where the regulation is headed.
How to do a IT cleanup? Review access rights, update passwords, software, and data. Here’s a quick reminder of what to include in your regular IT hygiene routine.
How do Czech companies approach cybersecurity? And how to make it a competitive advantage? Read the interview with Katka Hůtová for Ekonomický magazín.

Newsletter

Do you want to be sure that your company is protected from cyber threats and at the same time comply with the applicable legislation? Sign up for the newsletter and get practical advice from our legal consultants.

By clicking subscribe you consent to the processing of your personal data for marketing purposes.