{"id":4954,"date":"2024-07-23T13:01:21","date_gmt":"2024-07-23T11:01:21","guid":{"rendered":"https:\/\/cybrela.com\/?p=4954"},"modified":"2025-04-15T07:54:44","modified_gmt":"2025-04-15T06:54:44","slug":"money-or-data-what-is-ransomware","status":"publish","type":"post","link":"https:\/\/cybrela.com\/en\/penize-nebo-data-aneb-co-je-to-ransomware\/","title":{"rendered":"Money or data! What is ransomware?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4954\" class=\"elementor elementor-4954\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13244f8 e-flex e-con-boxed e-con e-parent\" data-id=\"13244f8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fee62e9 elementor-widget elementor-widget-post-info\" data-id=\"fee62e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-068321f elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tDavid Pol\u00e1ch\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a310f0b elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>23. 07. 2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d302fe0 e-con-full e-flex e-con e-parent\" data-id=\"7d302fe0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-d5420dd e-con-full e-flex e-con e-child\" data-id=\"d5420dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad615e1 elementor-widget elementor-widget-text-editor\" data-id=\"ad615e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 class=\"translation-block\">Ransomware is a type of cyber-attack with one goal \u2013 to encrypt your data. The hacker will demand a ransom to make your data available again. How do hackers use this attack? Why is it becoming more and more common lately? And how can companies defend themselves from this cyber-attack?<\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cf00c6 elementor-widget elementor-widget-text-editor\" data-id=\"9cf00c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">You can imagine ransomware as a roadside robber that will cross your path and try to swindle you out of your money. If you pay, he leaves you alone. But you never know how exactly the incident will turn out.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa43710 elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"aa43710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t<i>The goal of cyber security in a company is to ensure the functionality of the company's IT systems and to protect data. Above and beyond all of this is the ability of the company to operate, provide services and do business \"normally\", even in the event of a cyber-attack.<\/i>\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb00bf7 elementor-widget elementor-widget-text-editor\" data-id=\"fb00bf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">For various reasons, attackers seek to disrupt these corporate goals. That\u2019s why they often hold the company to ransom. With money being the number one concern, ransomware has become one of the most used types of attacks affecting companies.<\/p><p class=\"translation-block\">The aim of ransomware is to do harm. Hackers want to infiltrate a company's network, spread ransomware and then encrypt files. The victim is then asked to pay a ransom or no longer have access to the data. A payment is therefore made for allowing access to the ransomware's own data again.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-700d251 elementor-blockquote--skin-boxed elementor-blockquote--align-center elementor-widget elementor-widget-blockquote\" data-id=\"700d251\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tIt's good to remember that ransomware attacks can also simply aim to threaten to disclose customer information. Especially when the information is of a sensitive nature.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eda90ef e-con-full e-flex e-con e-child\" data-id=\"eda90ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c1704 elementor-widget elementor-widget-text-editor\" data-id=\"f0c1704\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #41ce95;\"><strong><span class=\"TrackedChange SCXW264816388 BCX0\"><span class=\"TextRun Highlight SCXW264816388 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW264816388 BCX0\">How can you protect yourself from ransomware?<\/span><\/span><\/span><span class=\"EOP TrackedChange SCXW264816388 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/span><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c38f241 elementor-widget elementor-widget-text-editor\" data-id=\"c38f241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">T<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">o know how to defend against ransomware, it's<\/span><\/span><\/span><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\"> important to kno<\/span><span class=\"NormalTextRun SCXW58738819 BCX0\">w<\/span><span class=\"NormalTextRun SCXW58738819 BCX0\">, where it can\u00a0<\/span><span class=\"NormalTextRun SCXW58738819 BCX0\">get to us. <\/span><span class=\"NormalTextRun SCXW58738819 BCX0\">Typic<\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">al<\/span><\/span><\/span> <span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">ransomw<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">are hides in <\/span><\/span><\/span><a href=\"https:\/\/cybrela.com\/en\/glossary\/phishing-2\/\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">phishin<\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">g<\/span><\/span><\/span><\/a> <span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">\u2013<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\"> a fraudulent<\/span><\/span><\/span><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\"> email<\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">p<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\"> or SMS where the attacker wants<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">the victim to click on<\/span><\/span><\/span> <span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">a link in the message\u00a0<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">and enter their sensitive details into a site that <\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">pretends<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\"> to be <\/span><span class=\"NormalTextRun SCXW58738819 BCX0\">rea<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">l and familiar<\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">. Or <\/span><\/span><\/span><span class=\"TrackedChange SCXW58738819 BCX0\"><span class=\"TextRun SCXW58738819 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW58738819 BCX0\">download something from it, which can happen just by loading it. How can I defend against ransomware attacks? We have some tips\u00a0<\/span><\/span><\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing ); text-align: var(--text-align);\">for you.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bc31aa elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2bc31aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Because the attack is directed at your data, it is important to protect it first and foremost. <b>Backup and archiving<\/b> are your best companions. Different location, different media, ideally 3 copies of the data. If someone threatens not to restore your data, you can already restore it from backups.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">When phishing is sent, the first line of defense is an <b>antispam filter and a<\/b> <b>firewall <\/b>on your internal network. Setting them up properly will cut off most unwanted communications. If an email still makes it through to a user, you need to make sure that the specific employee knows how to respond.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>By segmenting (splitting) the network<\/b> you narrow the potential impact. If you segment your network, typically by importance or by the type of user or device it contains, the ransomware will not spread further. If the attack is successful, you will lose less data and less money.  <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Timely updates also <b>protect you<\/b>. The release of patches by the manufacturer makes it clear that there is a weakness in the system or application. Once the patch is released, the attacker knows about the vulnerability. If you delay its installation, you give the attacker time to exploit it. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">This is where the big challenge comes in \u2013 <b>employee education<\/b>. New legislation requires companies to train employees regularly, plan and keep records of training. The reality, however, can be that employees hear all the possible training they need to complete in a year in one day. Occupational health and safety, fire training, employer-specific training... and finally, cybersecurity. How much of that will stick in their heads in the end?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdd4629 elementor-blockquote--skin-boxed elementor-blockquote--align-center elementor-widget elementor-widget-blockquote\" data-id=\"bdd4629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t<b>If companies want to truly defend themselves from cyber-attacks, they must educate employees and take the time to educate them properly. &nbsp;<\/b>\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60a4293 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"60a4293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cybrela.com\/en\/obligations-under-the-requirements-of-the-nis2-directive\/\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-lightbulb\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>New obligations according the forthcoming Cybersecurity Act? Read more here.<\/b><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc864b elementor-widget-divider--separator-type-pattern elementor-widget-divider--no-spacing elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3dc864b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\" style=\"--divider-pattern-url: url(&quot;data:image\/svg+xml,%3Csvg xmlns=&#039;http:\/\/www.w3.org\/2000\/svg&#039; preserveAspectRatio=&#039;xMidYMid meet&#039; overflow=&#039;visible&#039; height=&#039;100%&#039; viewBox=&#039;0 0 126 26&#039; fill=&#039;black&#039; stroke=&#039;none&#039;%3E%3Cpath d=&#039;M3,10.2c2.6,0,2.6,2,2.6,3.2S4.4,16.5,3,16.5s-3-1.4-3-3.2S0.4,10.2,3,10.2z M18.8,10.2c1.7,0,3.2,1.4,3.2,3.2s-1.4,3.2-3.2,3.2c-1.7,0-3.2-1.4-3.2-3.2S17,10.2,18.8,10.2z M34.6,10.2c1.5,0,2.6,1.4,2.6,3.2s-0.5,3.2-1.9,3.2c-1.5,0-3.4-1.4-3.4-3.2S33.1,10.2,34.6,10.2z M50.5,10.2c1.7,0,3.2,1.4,3.2,3.2s-1.4,3.2-3.2,3.2c-1.7,0-3.3-0.9-3.3-2.6S48.7,10.2,50.5,10.2z M66.2,10.2c1.5,0,3.4,1.4,3.4,3.2s-1.9,3.2-3.4,3.2c-1.5,0-2.6-0.4-2.6-2.1S64.8,10.2,66.2,10.2z M82.2,10.2c1.7,0.8,2.6,1.4,2.6,3.2s-0.1,3.2-1.6,3.2c-1.5,0-3.7-1.4-3.7-3.2S80.5,9.4,82.2,10.2zM98.6,10.2c1.5,0,2.6,0.4,2.6,2.1s-1.2,4.2-2.6,4.2c-1.5,0-3.7-0.4-3.7-2.1S97.1,10.2,98.6,10.2z M113.4,10.2c1.2,0,2.2,0.9,2.2,3.2s-0.1,3.2-1.3,3.2s-3.1-1.4-3.1-3.2S112.2,10.2,113.4,10.2z&#039;\/%3E%3C\/svg%3E&quot;);\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cba237c elementor-widget elementor-widget-text-editor\" data-id=\"cba237c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #41ce95;\"><strong><span class=\"TrackedChange SCXW16764121 BCX0\"><span class=\"TextRun SCXW16764121 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeClickedV2 CommentHighlightClicked SCXW16764121 BCX0\">International anti-ransomware initiative<\/span><\/span><\/span><\/strong><\/span><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdc0ae5 elementor-widget elementor-widget-text-editor\" data-id=\"cdc0ae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Statement against ransom payments for ransomware. Under this name is a joint declaration by states and international organizations that they will not pay ransom for ransomware. Why did something like this come about? Who is affected by the commitment not to pay? And who is behind it?<\/p><p class=\"translation-block\">The declaration is the result of a meeting of the \"International Counter Ransomware Initiative\" (CRI). This is a global initiative with more than 50 members. It has a presence on every continent and members include the USA, UK, Germany, Australia, India, Cameroon, the United Arab Emirates and the Dominican Republic. And of course, the Czech Republic. Conspicuously absent from the large states are China and Russia. Of the countries notorious for using ransomware to improve their state budgets, North Korea.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbd661e elementor-widget elementor-widget-text-editor\" data-id=\"cbd661e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #41ce95;\"><strong><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">What are the CRI goals?<\/span><\/strong><\/span><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99e6c3a e-grid e-con-full e-con e-child\" data-id=\"99e6c3a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec794c5 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ec794c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTo build common resilience against ransomware attacks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e098b30 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e098b30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-clock\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tLimit the lifetime business model of ransomware attacks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd2813 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ffd2813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-globe\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tInternational collaboration of members in the face of a ransomware attack.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7063cf9 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"7063cf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-briefcase\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCollaborate with the private sector to combat ransomware.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-929ec7f elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"929ec7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-money-bill-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCombat the funding of ransomware attacks and the subsequent ability to use the ransom collected.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe01aa elementor-widget elementor-widget-text-editor\" data-id=\"cfe01aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Following a CRI initiative, the International Anti-Ransomware Group was established to coordinate CRI's joint action against ransomware gangs. Its goal is to target gangs at the operational level - i.e. the real groups that use ransomware to attack.<\/p><p class=\"translation-block\">Another activity has been the effort to combat the business model of ransomware gangs. Through analysis in the areas of cyber insurance, victim behaviors, seizure and confiscation of virtual assets, ransom payments and best practice in incident reporting and information sharing.<\/p><p class=\"translation-block\">Further plans emerged from the current CRI meeting:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2184cef elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2184cef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Cybersecurity development for the members of the initiative<\/b><br><span data-contrast=\"auto\">Capability development&nbsp;<\/span><span data-contrast=\"auto\">involves<\/span><span data-contrast=\"auto\">&nbsp;help&nbsp;<\/span><span data-contrast=\"auto\">countries with&nbsp;<\/span><span data-contrast=\"auto\">less advanc<\/span><span data-contrast=\"auto\">ed cyber security.&nbsp;<\/span><span data-contrast=\"auto\">B<\/span><span data-contrast=\"auto\">ybersecurity<\/span><span>&nbsp;<\/span><span data-contrast=\"auto\">capacity building<\/span><span data-contrast=\"auto\">&nbsp;(training people)<\/span><span data-contrast=\"auto\">,<\/span><span>&nbsp;<\/span><span data-contrast=\"auto\">mentoring<\/span><span data-contrast=\"auto\">&nbsp;(sharing know-how and&nbsp;<\/span><span data-contrast=\"auto\">best<\/span><span>&nbsp;<\/span><span data-contrast=\"auto\">practices<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">,&nbsp;<\/span><span data-contrast=\"auto\">launching a program using artificial intelligence to fight ransomware<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">&nbsp;All with the help of more experienced members.<\/span><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>New practices in information sharing<\/b><br>Information <span data-contrast=\"auto\">sharing&nbsp;<\/span><span data-contrast=\"auto\">includes the launch&nbsp;<\/span><span data-contrast=\"auto\">of ransomware information sharing&nbsp;<\/span><span data-contrast=\"auto\">platforms<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-contrast=\"auto\">These will be built on the Lithuanian MISP platform, and an Israeli and UAE platform&nbsp;<\/span><span data-contrast=\"auto\">called&nbsp;<\/span><span data-contrast=\"auto\">Crystal<\/span><span>&nbsp;<\/span><span data-contrast=\"auto\">bowl<\/span><span data-contrast=\"auto\">.<\/span><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>New methods for \"striking back\"<\/b><br><span><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">The declaration of non-payment of ransom was part&nbsp;<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">of the last part<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">&nbsp;As well as a c<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">ommitment&nbsp;<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">As well as a commitment to help CRI members in the event that government and\/or key sectors&nbsp;<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">(water,&nbsp;<\/span><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: var( --e-global-typography-text-font-size );font-weight: var( --e-global-typography-text-font-weight );letter-spacing: var( --e-global-typography-text-letter-spacing );text-align: var(--text-align)\"><span lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\">energy, transportation and communications) websites are hit by a ransomware attack.<\/span><\/span><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f931595 elementor-widget-divider--separator-type-pattern elementor-widget-divider--no-spacing elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f931595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\" style=\"--divider-pattern-url: url(&quot;data:image\/svg+xml,%3Csvg xmlns=&#039;http:\/\/www.w3.org\/2000\/svg&#039; preserveAspectRatio=&#039;xMidYMid meet&#039; overflow=&#039;visible&#039; height=&#039;100%&#039; viewBox=&#039;0 0 126 26&#039; fill=&#039;black&#039; stroke=&#039;none&#039;%3E%3Cpath d=&#039;M3,10.2c2.6,0,2.6,2,2.6,3.2S4.4,16.5,3,16.5s-3-1.4-3-3.2S0.4,10.2,3,10.2z M18.8,10.2c1.7,0,3.2,1.4,3.2,3.2s-1.4,3.2-3.2,3.2c-1.7,0-3.2-1.4-3.2-3.2S17,10.2,18.8,10.2z M34.6,10.2c1.5,0,2.6,1.4,2.6,3.2s-0.5,3.2-1.9,3.2c-1.5,0-3.4-1.4-3.4-3.2S33.1,10.2,34.6,10.2z M50.5,10.2c1.7,0,3.2,1.4,3.2,3.2s-1.4,3.2-3.2,3.2c-1.7,0-3.3-0.9-3.3-2.6S48.7,10.2,50.5,10.2z M66.2,10.2c1.5,0,3.4,1.4,3.4,3.2s-1.9,3.2-3.4,3.2c-1.5,0-2.6-0.4-2.6-2.1S64.8,10.2,66.2,10.2z M82.2,10.2c1.7,0.8,2.6,1.4,2.6,3.2s-0.1,3.2-1.6,3.2c-1.5,0-3.7-1.4-3.7-3.2S80.5,9.4,82.2,10.2zM98.6,10.2c1.5,0,2.6,0.4,2.6,2.1s-1.2,4.2-2.6,4.2c-1.5,0-3.7-0.4-3.7-2.1S97.1,10.2,98.6,10.2z M113.4,10.2c1.2,0,2.2,0.9,2.2,3.2s-0.1,3.2-1.3,3.2s-3.1-1.4-3.1-3.2S112.2,10.2,113.4,10.2z&#039;\/%3E%3C\/svg%3E&quot;);\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51899cf elementor-widget elementor-widget-text-editor\" data-id=\"51899cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><strong><span class=\"TextRun SCXW71675178 BCX0\" lang=\"CS-CZ\" xml:lang=\"CS-CZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW71675178 BCX0\" data-ccp-parastyle=\"Block Text\">What is ransomware?<\/span><\/span><\/strong><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f15ee73 e-flex e-con-boxed e-con e-parent\" data-id=\"f15ee73\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3abc449 elementor-cta--skin-cover elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"3abc449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url();\" role=\"img\" aria-label=\"\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tGet ready\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tDo you need to train your employees in cyber security and improve the security of your business?\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/cybrela.com\/en\/contact\/\" target=\"_blank\">\n\t\t\t\t\t\tContact us\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ransomware je typ \u0161kodliv\u00e9ho software s\u202fjedin\u00fdm c\u00edlem \u2013 za\u0161ifrovat va\u0161e firemn\u00ed data. Jak se proti n\u011bmu mohou spole\u010dnosti nejl\u00e9pe br\u00e1nit?<\/p>","protected":false},"author":8,"featured_media":8047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55],"tags":[45,46,58],"class_list":["post-4954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kyberbezpecnost","tag-informacni-bezpecnost","tag-kyberbezpecnost","tag-kyberneticke-utoky"],"_links":{"self":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/4954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/comments?post=4954"}],"version-history":[{"count":71,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/4954\/revisions"}],"predecessor-version":[{"id":8123,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/posts\/4954\/revisions\/8123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/media\/8047"}],"wp:attachment":[{"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/media?parent=4954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/categories?post=4954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybrela.com\/en\/wp-json\/wp\/v2\/tags?post=4954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}