{"id":1082,"date":"2021-01-07T17:35:44","date_gmt":"2021-01-07T16:35:44","guid":{"rendered":"https:\/\/www4.mlejnekconsulting.com\/?page_id=1082"},"modified":"2022-08-17T16:26:39","modified_gmt":"2022-08-17T14:26:39","slug":"bezpecnostni-audit-it","status":"publish","type":"page","link":"https:\/\/web4.mlejnekconsulting.com\/en\/bezpecnostni-audit-it\/","title":{"rendered":"I want to have my IT infrastructure under control"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1082\" class=\"elementor elementor-1082\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e68d07c elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e68d07c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-71673ce\" data-id=\"71673ce\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80b8342 elementor-widget elementor-widget-text-editor\" data-id=\"80b8342\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong>I want to have my IT infrastructure under control<\/strong><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-905101f elementor-widget elementor-widget-text-editor\" data-id=\"905101f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Don\u2019t risk losing business data and their misusage and let our experts make an IT security audit for you. We\u2019ll check your security policy, external accesses, internal security, backup syst\u00e9m and other according to your situation and needs. Our field of expertise are also security audits and checks for suppliers of Disney, SONY, Marvel and security audits TPN, MPAA and ISO 27001.<\/p>\n\n<p>Part of the audit is always not only problem identification but also a solution suggestion of identificated deficiencies, complex preparation for certification or direct certification.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df05a7e advantages elementor-widget elementor-widget-mfn_list\" data-id=\"df05a7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"mfn_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"list_item lists_1 clearfix\"><div class=\"list_left list_icon\"><i class=\"fas fa-check\" aria-hidden=\"true\"><\/i><\/div><div class=\"list_right\"><h4 class=\"title\">Why does the security audit pay off:<\/h4><div class=\"desc\"><p><span style=\"font-weight: 400;\"><strong>+<\/strong> You will find out the current security of your data<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> You will identificate weak spots and risk factors in security<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> You will receive an expert deficiency solution proposal<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> You will increase your credibility in front of business partners and customers<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> We'll be sure that you comply with legal obligations and standards<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong>\u00a0We'll ensure redress and together we will implement processes for the proper operation of the company and IT<\/span><\/p><\/div><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e638a68 advantages elementor-widget elementor-widget-mfn_list\" data-id=\"e638a68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"mfn_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"list_item lists_1 clearfix\"><div class=\"list_left list_icon\"><i class=\"fas fa-search\" aria-hidden=\"true\"><\/i><\/div><div class=\"list_right\"><h4 class=\"title\">Security audit focuses on:<\/h4><div class=\"desc\"><p><span style=\"font-weight: 400;\"><strong>+<\/strong>\u00a0\u00a0<\/span>Requirements and further TPN, MPAA or ISO 27001 certification<\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Overall hardware and software state<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Firewall, server, station and wifi configuration<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Mobile phone security<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> E-mail security<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Implementation of current GDPR state<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Remote access control<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Hardware station and network monitoring<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Data backup<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Possibility of data restoration when lost<\/span><\/p><p><span style=\"font-weight: 400;\"><strong>+<\/strong> Security policies<\/span><\/p><\/div><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0cbb27 elementor-widget elementor-widget-text-editor\" data-id=\"b0cbb27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span style=\"font-weight: 400;\">Have your company data secure. Let us know and we'll take care of it.<\/span><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad3fc60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad3fc60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ebd1ced\" data-id=\"ebd1ced\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d7bee86 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"d7bee86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/web4.mlejnekconsulting.com\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I want to have my data secured<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Bezpe\u010dnostn\u00ed audit IT Neriskujte ztr\u00e1tu firemn\u00edch dat a jejich zneu\u017eit\u00ed a nechte si od na\u0161ich odborn\u00edk\u016f vypracovat bezpe\u010dnostn\u00ed audit informa\u010dn\u00edch technologi\u00ed. Prov\u011b\u0159\u00edme bezpe\u010dnostn\u00ed politiky, vn\u011bj\u0161\u00ed p\u0159\u00edstupy,<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1082","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/pages\/1082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=1082"}],"version-history":[{"count":34,"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/pages\/1082\/revisions"}],"predecessor-version":[{"id":3592,"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/pages\/1082\/revisions\/3592"}],"wp:attachment":[{"href":"https:\/\/web4.mlejnekconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=1082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}