March 7, 2021
Business continuity (BCP) and Crisis management


A reliable risk analysis, a good security strategy and appropriate security solutions built on their basis are one thing.
But for a company to survive a difficult time, whether as a result of a threat or especially, one that could not be predicted, it is necessary to have plans that will indicate specific steps and responsibilities to maintain or quickly restore business continuity.
We build and evaluate scenarios for critical processes and assets in the company in the event of failure or unavailability of IT services, devices and processes. We implement appropriate solutions that reduce the risk of business continuity.
We help companies in which there has been a challenging crisis related to, for example, a cyber attack, data leakage or business continuity disruption. We help you quickly get your business back into operation and reduce potential losses.
Read more:
May 30, 2023
Asked why he’d robbed banks, a notorious American gangster from the Great Depression era famously replied: ‘If they kept money in candy stores, I would rob candy stores.’ Is there any connection between old-style robbers and the plight of modern l law firms? On the surface, not really. After all, what can you steal from […]
April 25, 2023
Phishing Awareness Training – Simulating Phishing Attacks
Phishing training for employees is one of the most effective ways to strengthen your company’s defences against malware, ransomware, data loss and Business E-mail Compromise (BEC) attacks. Experience shows that awareness campaigns result in a significantly reduced click-through rate after each subsequent campaign. An employee who has made a mistake becomes more vigilant and more resistant […]
April 25, 2023
Phishing – how to deal with it?
Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries […]