March 7, 2021
Strategy for informatisation and automation of processes and services


Incompetent use of IT systems, chaotic, unplanned, spontaneous investments and ignoring security issues lead instead of business development to its collapse.
The added value of our services is the analysis of IT maturity. It reveals the quality of the company’s IT processes and the extent to which it demonstrates the flexibility of change/development in this area.
We do not finish with the assessment itself. We also build short and long-term strategies that improve IT services’ operation, organise and automate processes through the use of the latest but proven technologies. Our activities aim to raise IT and other departments’ level of organisation and improve communication between IT and business.
Read more:
May 30, 2023
Asked why he’d robbed banks, a notorious American gangster from the Great Depression era famously replied: ‘If they kept money in candy stores, I would rob candy stores.’ Is there any connection between old-style robbers and the plight of modern l law firms? On the surface, not really. After all, what can you steal from […]
April 25, 2023
Phishing Awareness Training – Simulating Phishing Attacks
Phishing training for employees is one of the most effective ways to strengthen your company’s defences against malware, ransomware, data loss and Business E-mail Compromise (BEC) attacks. Experience shows that awareness campaigns result in a significantly reduced click-through rate after each subsequent campaign. An employee who has made a mistake becomes more vigilant and more resistant […]
April 25, 2023
Phishing – how to deal with it?
Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries […]