Blog

What are regulated services and why does it matter? Identifying them is key to determining whether you will be affected by the new cyber law and under what regime.
SOC 2 or ISO 27001? Both certifications address information security, but each in a slightly different way. In this article, we explain the differences, advantages, and limitations – and when each investment really pays off.
What is self-identification? In short, it means that every company must determine on its own whether the new Cybersecurity Act applies to it. If it does, the company is required to notify the state. But how exactly do you go about the self-identification process?
Do you allow employees to work from their own phones and laptops? Without clear BYOD rules, you risk data leaks and GDPR violations. Read what you need to keep under control.
The consultation on the implementing regulations for the new Cybersecurity Act has started. We’ve summarized the changes that show where the regulation is headed.
How to do a IT cleanup? Review access rights, update passwords, software, and data. Here’s a quick reminder of what to include in your regular IT hygiene routine.
How do Czech companies approach cybersecurity? And how to make it a competitive advantage? Read the interview with Katka Hůtová for Ekonomický magazín.
The new Cyber Security Act that implements the NIS2 Directive is heading towards the final stage. Find out what it means for your business and how to prepare.
Cybersecurity and AI. How do attackers leverage AI when planning attacks, and how can you work with AI to protect against these threats?

Newsletter

Do you want to be sure that your company is protected from cyber threats and at the same time comply with the applicable legislation? Sign up for the newsletter and get practical advice from our legal consultants.

By clicking subscribe you consent to the processing of your personal data for marketing purposes.