Cyberbezpieczeństwo - strategia, wdrożenie, kontrola

Implementation of security systems

Protecting, managing, troubleshooting

Developing a strategy for information security

We create documents governing the methods and rules for protecting information

Checking that the configuration conforms with regulatory requirements

ISO certificates, recommendations of financial supervision authorities

Maintenance inspections of the environment

Verification, analysis and standardisation

Assessing the effects of an attack

Developing a plan for reacting during an attack

Increasing the competences of employees

Training for your employees and IT team

As part of cyber-security solution, we offer our customers:

Implementation of cyber-security solutions

We offer the following services and implementations:

Protection of network interconnections
Protection of terminal equipment
Management of your mobile devices
Identity management and multi-component authentication
Detection of anomalies and attacks on your infrastructure and communication systems
Ensuring the availability of your data (backup)
Controlling access to information in your organisation
Classification of information and flow control
Public Key Infrastructure (PKI)

Developing a strategy for information security

Each organisation should have a plan for information security, i.e. a set of documents governing the methods and policies for the protection of information. The plan should take into account the existing laws, industry regulations and internal rules regarding the information security. We offer our clients:

Mechanisms for ensuring confidentiality, integrity, and availability
Automatic classification of information
Information security risk reduction
Preparedness to act in a crisis

Control over compliance with regulations

Each organisation operating on the territory of Poland is obliged to comply with the laws of the European Union and Poland. Certain provisions require companies to comply with important requirements for IT systems and in particular for their security. Failing to comply with these requirements may be a vector for attacks, and consequently expose the company to legal consequences or damage to reputation. Some organisations are also required to comply with industry regulations, such as the recommendations of the Polish financial supervision authority, or with requirements set out in internal standards. Regular verification of the level of compliance with the regulation is included in the permanent course of action in the organisation. As part of our services we offer:

Implementation of requirements from certificates ISO/IEC 27000
Recommendations of a financial supervision authority
Protection of personal data (RODO)

Verification for compliance with regard to current risks

Each computer system should be verified for compliance with regard to current risks. It is natural that this task should be carried out by a team of external experts who are independent from the team that has provided the configuration of IT systems. The role of the auditor is to conduct activities similar, or even identical to a real attack. What is different is the action taken after a successful test attack in the test: the auditor does not take destructive actions that have not been agreed upon with the contracting party. Detected irregularities are logged as risks that may be the basis for a decision to deploy adequate security systems. We offer our customers:

Verification of whether the configuration complies with the accepted standard
Analysis of vulnerabilities in production systems
Standardisation of the environment

Impact assessment

An increasing number of security experts point out that cyber-attacks are equally probable in all organisations. An attack is a matter of time rather than of security level. Therefore, there are more and more discussions about reactions to attacks rather than about avoiding or predicting them.

Raising employees’ awareness of threats

Several studies on cyber-security report that the predominant risk is posed by actions taken by employees. What is meant here is social engineering used by attackers, but also informed actions taken by users. Each organisation should allocate budget resources to constantly raise their employees’ awareness of threats. Only through regular training can this situation be improved. We offer:

Training for IT teams
Training for business teams

Why is it worth cooperating with us? We provide end-to-end reliable solutions

APN Promise logo

For more than 25 years, we have been creating unique IT solutions for businesses. We set ambitious objectives and pursue them step by step. We advise, design, implement, integrate and create IT systems that are tailored to the needs of our customers. In addition, we provide a range of services in the CSP model.

Questions about Cyber-security? Write to us!


The data controller for the information collected using this form is Promise. The data you provided will be processed to the extent necessary for a contract or to take steps at your request, in accordance with Article 6.1.b of RODO, for the period necessary to carry out your request. Our Privacy Policy has all the information about your rights and about processing the data provided in the data form. If the information provided above is not detailed enough, click to learn more!