{"id":4651,"date":"2021-07-01T10:23:43","date_gmt":"2021-07-01T08:23:43","guid":{"rendered":"https:\/\/exis.hu\/our-expertise\/system-security\/"},"modified":"2022-08-30T20:47:34","modified_gmt":"2022-08-30T18:47:34","slug":"system-security","status":"publish","type":"page","link":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/","title":{"rendered":"System security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4651\" class=\"elementor elementor-4651 elementor-897\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02767ca elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"02767ca\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1126ef7\" data-id=\"1126ef7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2f49f4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"b2f49f4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-159c2b8\" data-id=\"159c2b8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9aa2133 elementor-widget elementor-widget-reeko_service_details_v1\" data-id=\"9aa2133\" data-element_type=\"widget\" data-widget_type=\"reeko_service_details_v1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        \n        <!-- Sidebar Page Container -->\n\t\t<div class=\"sidebar-page-container\">\n\t\t\t<div class=\"auto-container\">\n\t\t\t\t<div class=\"row clearfix\">\n\n\t\t\t\t\t<!-- Sidebar Side \/ Left Sidebar -->\n\t\t\t\t\t<div class=\"sidebar-side left-sidebar col-xl-4 col-lg-4 col-md-12 col-sm-12\">\n\t\t\t\t\t\t<aside class=\"sidebar sticky-top\">\n\t\t\t\t\t\t\t<div id=\"nav_menu-8\" class=\"service-widget sidebar-widget widget-1 widget_nav_menu\"><div class=\"menu-services-menu-angol-container\"><ul id=\"menu-services-menu-angol\" class=\"menu\"><li id=\"menu-item-5087\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5087\"><a href=\"https:\/\/exis.hu\/en\/our-expertise\/infrastructure-building\/\">Infrastructure building<\/a><\/li>\n<li id=\"menu-item-5088\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5088\"><a href=\"https:\/\/exis.hu\/en\/our-expertise\/system-operation\/\">System operation<\/a><\/li>\n<li id=\"menu-item-5089\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5089\"><a href=\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\">System security<\/a><\/li>\n<li id=\"menu-item-5090\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5090\"><a href=\"https:\/\/exis.hu\/en\/our-expertise\/project-tasks\/\">Project tasks<\/a><\/li>\n<li id=\"menu-item-5091\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5091\"><a href=\"https:\/\/exis.hu\/en\/our-expertise\/convenience-services\/\">Convenience services<\/a><\/li>\n<\/ul><\/div><\/div><div id=\"reeko_download_brouchers-2\" class=\"service-widget sidebar-widget widget-1 widget_reeko_download_brouchers\">\t\t\n\t\t<!-- Pdf Widget -->\n\t\t<div class=\"pdf-widget\">\n\t\t\t<div class=\"widget-content\">\n\t\t\t\t<h3>Downloadable documents<\/h3>\n\t\t\t\t<div class=\"pdf-file-list\">\n\t\t\t\t\t<a href=\"https:\/\/exis.hu\/wp-content\/uploads\/2022\/06\/Exis.hu_-1.pdf\">Exis.hu Information sheet<\/a>\n\t\t\t\t\t<a href=\"\"><\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n        <\/div><div id=\"reeko_emergency_call-2\" class=\"service-widget sidebar-widget widget-1 widget_reeko_emergency_call\">        \n\t\t<!-- Phone Widget -->\n\t\t<div class=\"phone-widget\">\n\t\t\t<div class=\"widget-content\">\n\t\t\t\t<h3>If you choose <br>to be contacted immediately<\/h3>\n\t\t\t\t<!-- Phone Box -->\n\t\t\t\t<div class=\"phone-box\">\n\t\t\t\t\t<div class=\"box-inner\">\n\t\t\t\t\t\t<span class=\"icon flaticon-call-1\"><\/span>\n\t\t\t\t\t\tHotline\t\t\t\t\t\t<strong><a href=\"tel:3614477055\">+36 1 44 77 055<\/a><\/strong>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n        <\/div>\t\t\t\t\t\t<\/aside>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<!-- Content Side \/ Right Sidebar -->\n\t\t\t\t\t<div class=\"content-side right-sidebar col-xl-8 col-lg-8 col-md-12 col-sm-12\">\n\t\t\t\t\t\t<div class=\"service-detail\">\n\t\t\t\t\t\t\t<div class=\"inner-box\">\n\t\t\t\t\t\t\t\t<h2>System security<\/h2>\n\t\t\t\t\t\t\t\t<p>Are you sure that no incident can happen in your company that could disrupt the conditions under which it operates? Will you stay calm if a colleague accidentally loses a company laptop or records are damaged in a sudden spill? These are just two of the possibilities that, if unprepared, could not only cause huge chaos and loss of revenue, but also irreparable damage. But beyond this, there are a number of potential threats to be considered, the timely prevention or proper recovery of which will guarantee business continuity. You're in the right place if you haven't already thought of all this.<\/p>\n\t\t\t\t\t\t\t\t<div class=\"image\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg\" alt=\"Awesome Image\" \/>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<p>But you are also in the right place if you want to review or update your IT security measures. We are the ones who, thanks to our knowledge, our professional experience, know what we are talking about and we know that the worst always happens when we least expect it. But with our help, you can get prepared for these unexpected situations and keep your business safe. <\/p>\n\t\t\t\t\t\t\t\t<div class=\"gallery-box\">\n\t\t\t\t\t\t\t\t\t<div class=\"row clearfix\">\n\n\t\t\t\t\t\t\t\t\t\t<!-- Image Column -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"image-column col-lg-4 col-md-4 col-sm-6\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-2.jpg\" alt=\"Awesome Image\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- Image Column -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"image-column col-lg-4 col-md-4 col-sm-6\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-3.jpg\" alt=\"Awesome Image\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- Image Column -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"image-column col-lg-4 col-md-4 col-sm-6\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-4.jpg\" alt=\"Awesome Image\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<!-- Two Column -->\n\t\t\t\t\t\t\t\t<div class=\"two-column\">\n\t\t\t\t\t\t\t\t\t<div class=\"row clearfix\">\n\t\t\t\t\t\t\t\t\t\t<!-- Content Column -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"content-column col-lg-6 col-md-6 col-sm-12\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"list-style-one\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>creating the conditions for secure operations<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>cloud-based solutions (backups, system mirroring)<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>software and physical data protection<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>disaster management and business continuity plan<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<!-- Image Column -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"image-column col-lg-6 col-md-6 col-sm-12\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/exis.hu\/wp-content\/uploads\/2022\/05\/karbantartas-exis.hu_.jpg\" alt=\"Awesome Image\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- End Two Column -->\n\t\t\t\t\t\t\t\t<p>System deployment tasks are usually subject to strict deadlines, so it is common for system security to be introduced without a fully developed concept, just before the go-live, in a careless and ill-considered way. In even worse cases, its implementation is postponed, without considering the risks involved.<\/p>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- Accordian Box -->\n\t\t\t\t\t\t\t\t<ul class=\"accordion-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- Block -->\n\t\t\t\t\t\t\t\t\t<li class=\"accordion block active-block\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-btn active\"><div class=\"icon-outer\"><span class=\"icon icon-plus fa fa-plus\"><\/span> <span class=\"icon icon-minus fa fa-minus\"><\/span><\/div>Who is the CIO?<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-content current\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordian-text\">The Chief Information Officer is a leader who is seen as an equal partner by business decision-makers because he or she can consider and approach IT issues not only from an IT perspective, but also from a business perspective. A manager who constantly monitors and analyses new and various technologies from the point of view of the business benefits that their possible introduction would bring to the company. <\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- Block -->\n\t\t\t\t\t\t\t\t\t<li class=\"accordion block \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-btn \"><div class=\"icon-outer\"><span class=\"icon icon-plus fa fa-plus\"><\/span> <span class=\"icon icon-minus fa fa-minus\"><\/span><\/div>What is a system security audit?<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-content \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordian-text\">Our experts can help you identify problem areas, conduct detailed investigations, and resolve identified security weaknesses.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- Block -->\n\t\t\t\t\t\t\t\t\t<li class=\"accordion block \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-btn \"><div class=\"icon-outer\"><span class=\"icon icon-plus fa fa-plus\"><\/span> <span class=\"icon icon-minus fa fa-minus\"><\/span><\/div>What areas does a system security audit cover?<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-content \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordian-text\">It includes an overview of the procedures that define safety standards and guidelines. It also includes a review of the access rights concept, access controls and critical access rights, and their design if necessary. <\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- Block -->\n\t\t\t\t\t\t\t\t\t<li class=\"accordion block \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-btn \"><div class=\"icon-outer\"><span class=\"icon icon-plus fa fa-plus\"><\/span> <span class=\"icon icon-minus fa fa-minus\"><\/span><\/div>Is the security audit customisable?<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"acc-content \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordian-text\">Yes, of course. However, there are some cornerstones of system security that are absolutely justified to be covered, while at the same time the tests can be extended as required according to the individual company profile.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Szolg\u00e1ltat\u00e1sok Infrastrukt\u00fara ki\u00e9p\u00edt\u00e9s Rendszer\u00fczemeltet\u00e9s Rendszerbiztons\u00e1g Projectfeladatok K\u00e9nyelmi szolg\u00e1ltat\u00e1sok Downloadable documents Exis.hu Information sheet If you choose to be contacted immediately Hotline +36 1 44 77 055 System security Are you sure that no incident can happen in your company that could disrupt the conditions under which it operates? Will you stay calm if a colleague [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4602,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-default-elementor.php","meta":{"footnotes":""},"class_list":["post-4651","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>System security - Exis.hu \u2013 We solve IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System security - Exis.hu \u2013 We solve IT\" \/>\n<meta property=\"og:description\" content=\"Szolg\u00e1ltat\u00e1sok Infrastrukt\u00fara ki\u00e9p\u00edt\u00e9s Rendszer\u00fczemeltet\u00e9s Rendszerbiztons\u00e1g Projectfeladatok K\u00e9nyelmi szolg\u00e1ltat\u00e1sok Downloadable documents Exis.hu Information sheet If you choose to be contacted immediately Hotline +36 1 44 77 055 System security Are you sure that no incident can happen in your company that could disrupt the conditions under which it operates? Will you stay calm if a colleague [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Exis.hu \u2013 We solve IT\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-30T18:47:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\",\"url\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\",\"name\":\"System security - Exis.hu \u2013 We solve IT\",\"isPartOf\":{\"@id\":\"https:\/\/exis.hu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg\",\"datePublished\":\"2021-07-01T08:23:43+00:00\",\"dateModified\":\"2022-08-30T18:47:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage\",\"url\":\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg\",\"contentUrl\":\"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Our expertise\",\"item\":\"https:\/\/exis.hu\/en\/our-expertise\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"System security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/exis.hu\/#website\",\"url\":\"https:\/\/exis.hu\/\",\"name\":\"Exis.hu \u2013 We solve IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/exis.hu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/exis.hu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/exis.hu\/#organization\",\"name\":\"Exis.hu - We solve IT\",\"url\":\"https:\/\/exis.hu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/exis.hu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/exis.hu\/wp-content\/uploads\/2022\/04\/logo_1000x1000.png\",\"contentUrl\":\"https:\/\/exis.hu\/wp-content\/uploads\/2022\/04\/logo_1000x1000.png\",\"width\":4168,\"height\":4167,\"caption\":\"Exis.hu - We solve IT\"},\"image\":{\"@id\":\"https:\/\/exis.hu\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"System security - Exis.hu \u2013 We solve IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/","og_locale":"en_US","og_type":"article","og_title":"System security - Exis.hu \u2013 We solve IT","og_description":"Szolg\u00e1ltat\u00e1sok Infrastrukt\u00fara ki\u00e9p\u00edt\u00e9s Rendszer\u00fczemeltet\u00e9s Rendszerbiztons\u00e1g Projectfeladatok K\u00e9nyelmi szolg\u00e1ltat\u00e1sok Downloadable documents Exis.hu Information sheet If you choose to be contacted immediately Hotline +36 1 44 77 055 System security Are you sure that no incident can happen in your company that could disrupt the conditions under which it operates? Will you stay calm if a colleague [&hellip;]","og_url":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/","og_site_name":"Exis.hu \u2013 We solve IT","article_modified_time":"2022-08-30T18:47:34+00:00","og_image":[{"url":"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/","url":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/","name":"System security - Exis.hu \u2013 We solve IT","isPartOf":{"@id":"https:\/\/exis.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage"},"image":{"@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage"},"thumbnailUrl":"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg","datePublished":"2021-07-01T08:23:43+00:00","dateModified":"2022-08-30T18:47:34+00:00","breadcrumb":{"@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exis.hu\/en\/our-expertise\/system-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#primaryimage","url":"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg","contentUrl":"https:\/\/exis.hu\/wp-content\/uploads\/2021\/06\/service-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/exis.hu\/en\/our-expertise\/system-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Our expertise","item":"https:\/\/exis.hu\/en\/our-expertise\/"},{"@type":"ListItem","position":2,"name":"System security"}]},{"@type":"WebSite","@id":"https:\/\/exis.hu\/#website","url":"https:\/\/exis.hu\/","name":"Exis.hu \u2013 We solve IT","description":"","publisher":{"@id":"https:\/\/exis.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exis.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/exis.hu\/#organization","name":"Exis.hu - We solve IT","url":"https:\/\/exis.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exis.hu\/#\/schema\/logo\/image\/","url":"https:\/\/exis.hu\/wp-content\/uploads\/2022\/04\/logo_1000x1000.png","contentUrl":"https:\/\/exis.hu\/wp-content\/uploads\/2022\/04\/logo_1000x1000.png","width":4168,"height":4167,"caption":"Exis.hu - We solve IT"},"image":{"@id":"https:\/\/exis.hu\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/pages\/4651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/comments?post=4651"}],"version-history":[{"count":7,"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/pages\/4651\/revisions"}],"predecessor-version":[{"id":4690,"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/pages\/4651\/revisions\/4690"}],"up":[{"embeddable":true,"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/pages\/4602"}],"wp:attachment":[{"href":"https:\/\/exis.hu\/en\/wp-json\/wp\/v2\/media?parent=4651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}