we create implement and control the strategy

Cyber-attacks against companies are widespread. A survey conducted in 2017 by KPMG in Poland shows that 82% of organisations per year experienced at least one attack on their IT infrastructure. Furthermore, companies have seen an increase in attacks against their organisations in the last year.

Implementation of security systems

Protecting, managing, troubleshooting

Developing a strategy for information security

We create documents governing the methods and rules for protecting information

Checking that the configuration conforms with regulatory requirements

ISO certificates, recommendations of financial supervision authorities

Maintenance inspections of the environment

Verification, analysis and standardisation

Assessing the effects of an attack

Developing a plan for reacting during an attack

Increasing the competences of employees

Training for your employees and IT team

As part of cyber-security solution, we offer our customers:

Implementation of cyber-security solutions

We offer the following services and implementations:

Protection of network interconnections
Protection of terminal equipment
Management of your mobile devices
Identity management and multi-component authentication
Detection of anomalies and attacks on your infrastructure and communication systems
Ensuring the availability of your data (backup)
Controlling access to information in your organisation
Classification of information and flow control
Public Key Infrastructure (PKI)

Developing a strategy for information security

Each organisation should have a plan for information security, i.e. a set of documents governing the methods and policies for the protection of information. The plan should take into account the existing laws, industry regulations and internal rules regarding the information security. We offer our clients:

Mechanisms for ensuring confidentiality, integrity, and availability
Automatic classification of information
Information security risk reduction
Preparedness to act in a crisis

Control over compliance with regulations

Each organisation operating on the territory of Poland is obliged to comply with the laws of the European Union and Poland. Certain provisions require companies to comply with important requirements for IT systems and in particular for their security. Failing to comply with these requirements may be a vector for attacks, and consequently expose the company to legal consequences or damage to reputation. Some organisations are also required to comply with industry regulations, such as the recommendations of the Polish financial supervision authority, or with requirements set out in internal standards. Regular verification of the level of compliance with the regulation is included in the permanent course of action in the organisation. As part of our services we offer:

Implementation of requirements from certificates ISO/IEC 27000
Recommendations of a financial supervision authority
Protection of personal data (RODO)

Verification for compliance with regard to current risks

Each computer system should be verified for compliance with regard to current risks. It is natural that this task should be carried out by a team of external experts who are independent from the team that has provided the configuration of IT systems. The role of the auditor is to conduct activities similar, or even identical to a real attack. What is different is the action taken after a successful test attack in the test: the auditor does not take destructive actions that have not been agreed upon with the contracting party. Detected irregularities are logged as risks that may be the basis for a decision to deploy adequate security systems. We offer our customers:

Verification of whether the configuration complies with the accepted standard
Analysis of vulnerabilities in production systems
Standardisation of the environment

Impact assessment

An increasing number of security experts point out that cyber-attacks are equally probable in all organisations. An attack is a matter of time rather than of security level. Therefore, there are more and more discussions about reactions to attacks rather than about avoiding or predicting them.

Raising employees’ awareness of threats

Several studies on cyber-security report that the predominant risk is posed by actions taken by employees. What is meant here is social engineering used by attackers, but also informed actions taken by users. Each organisation should allocate budget resources to constantly raise their employees’ awareness of threats. Only through regular training can this situation be improved. We offer:

Training for IT teams
Training for business teams

Let’s combine your needs with our experience and passion for technology.

APN Promise logo
APN Promise

For over 25 years, we have been creating IT solutions for business based on the latest technologies. We help companies to go through the process of digital transformation, offering our consulting, implementation and support service as well as sharing knowledge by our educational programs.

Based on the experience gained and the daily work with companies from all sectors and industries, our team is committed to providing proven and useful IT solutions tailored to the needs of our clients.

In addition, we offer a number of services in the CSP model.

Meet our company

Questions about Cyber-security? Write to us!

    I want to receive marketing content from A.P.N. Promise S.A. electronically
    I want to receive marketing content from A.P.N. Promise S.A. by phone

    The controller of personal data collected using the form is A.P.N. Promise S.A. The data provided by you will we processed to the extent necessary to make or fulfil a specific request in accordance with art. 6(1)(b) of the GDPR or in the event of consent in accordance with art. 6(1)(a) of the GDPR to provide marketing content by electronic means or by telephone devices. All information regarding the processing of data provided by you in the data form and your rights can be found in the Privacy Policy or by contacting the person responsible for personal data protection at Click or write and find out more if the information provided above is not clear enough for you!