{"id":6739,"date":"2019-07-16T00:00:00","date_gmt":"2019-07-16T00:00:00","guid":{"rendered":"https:\/\/new-www.sii.pl\/cybersecurity-is-a-crucial-element-to-every-business-entrust-our-experts-to-provide-a-safe-environment-for-your-company\/"},"modified":"2020-03-26T14:04:50","modified_gmt":"2020-03-26T14:04:50","slug":"cybersecurity-is-a-crucial-element-to-every-business-entrust-our-experts-to-provide-a-safe-environment-for-your-company","status":"publish","type":"post","link":"https:\/\/sii.pl\/en\/news-feed\/cybersecurity-is-a-crucial-element-to-every-business-entrust-our-experts-to-provide-a-safe-environment-for-your-company\/","title":{"rendered":"Cybersecurity is a crucial element to every business. Entrust our experts to provide a safe environment for your company"},"content":{"rendered":"<p><strong>Nowadays, cybersecurity is one of the biggest challenges that both owners of small and large enterprises from various industries face. Although comprehensive services in this area were officially included in Sii offer in the middle of the year, the company already had competences and experience in consulting in this field. Currently, in Sii, there are over 50 specialists implementing projects focused on ensuring safety of the organization\u2019s resources.<\/strong><\/p>\n<p><strong>Fighting global threat<\/strong><\/p>\n<p>The ongoing digitization of almost all areas of company\u2019s operations is an increasing challenge for security departments. Any additional device or application can be a potential gateway for cybercriminals. A proper resource security is a critical challenge for every organization. It is estimated that within next 5 years activity of cybercriminals will increase and global losses related to their operations will reach 6 trillion dollars annually.<\/p>\n<p>What is the biggest threat? \u2013 Nowadays, the spectrum of attacks is not only limited to actions carried out by individual hackers \u2013 says <strong>Dawid Jankowski, Cybersecurity Lead in Sii<\/strong>. \u2013 Increasingly often we are dealing with attacks carried out by organized criminal groups destabilizing entire corporate systems or even states. A spectacular example, and at the same time one of the major ones, was a cyberattack on Estonia in 2007. Hackers paralyzed most government sites and then attacked private sector. Banks were forced to suspend online services and cease all foreign transactions \u2013 he adds.<\/p>\n<p>The consequences of a successful attack are not limited to financial losses. Loss of data, breach of confidential information and disruption of business continuity constitute a measurable cost for companies \u2013 in the US in 2018 it amounted to almost USD 8 million on average.<\/p>\n<p>\u2013 The growing scale of the threat causes organizations to wonder not whether they will become a victim of an attack, but when it is attempted, how to prevent it and what to do when it turns out to be effective \u2013 says <strong>Jaros\u0142aw Lakutowicz, Director of the IT Operations Competence Center in Sii<\/strong>.<\/p>\n<p><strong>Experience and competences<\/strong><\/p>\n<p>Since July 2019, Sii\u2019s offer has expanded and introduced cybersecurity services, as the company already has the competence and experience in implementing projects in this area.<\/p>\n<p>One of the major projects implemented in recent years is Security Operations Center for a large international financial company. As part of the service, Sii offers support to quickly respond to a potential attack or its attempt. Experts working in the project engage in tasks including monitoring of network traffic and e-mail correspondence, analyzing potential security incidents and their consequences, or launching and analyzing malware in a separate environment.<\/p>\n<p>The demand for comprehensive consultancy in the area of \u200b\u200bsecurity is visible in many different industries. One example is a project implemented for a global company in food industry. Sii architects supported the client in the field of verification and assessment of new security technologies and activities related to risk management, such as supplier risk assessment or project risk analysis. They also took part in incident management processes as well as in developing rules, procedures and guidelines to support IT security strategies.<\/p>\n<p>Sii currently employs over 50 specialists in the field of cybersecurity, including consultants with certificates recognized on the market: CISSP, GIAC GCIH, GIAC GCFE and CompTIA Security +.<\/p>\n<p>The scope of new Sii offer is going to include: consultations allowing risk assessment and designing solutions to increase safety; test services, including penetration tests; integration of IT security; access management and Security Operations Center \u2013 a comprehensive service that allows on-going threat monitoring, incident handling and prevention of data leaks.<\/p>\n<p>\u2013 New elements of Sii offer address our clients\u2019 needs who are interested in ensuring data security in their companies \u2013 says Dawid Jankowski. \u2013 Thanks to experience and competences we have, we are able to offer services tailored to their current needs, regardless of the industry in which they operate and systems they use \u2013 he adds.<\/p>\n<p>If you want to learn more about Sii cybersecurity services, <a href=\"https:\/\/sii.pl\/kontakt\/\">contact us<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, cybersecurity is one of the biggest challenges that both owners of small and large enterprises from various industries face. &hellip; <a class=\"continued-btn\" href=\"https:\/\/sii.pl\/en\/news-feed\/cybersecurity-is-a-crucial-element-to-every-business-entrust-our-experts-to-provide-a-safe-environment-for-your-company\/\">Continued<\/a><\/p>\n","protected":false},"author":66,"featured_media":26514,"comment_status":"closed","ping_status":"open","sticky":false,"template":"views\/single-old-pressroom.blade.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"tags":[4051],"class_list":["post-6739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cybersecurity"],"acf":[],"aioseo_notices":[],"featured_media_url":"https:\/\/sii.pl\/wp-content\/uploads\/2019\/07\/DAWID.jpg","category_names":["Offering"],"_links":{"self":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/posts\/6739"}],"collection":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/comments?post=6739"}],"version-history":[{"count":0,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/posts\/6739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/media\/26514"}],"wp:attachment":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/media?parent=6739"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/tags?post=6739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}