{"id":684,"date":"2015-11-03T10:58:39","date_gmt":"2015-11-03T09:58:39","guid":{"rendered":"http:\/\/www.upgreat.com.pl\/blog\/?p=129"},"modified":"2015-11-03T10:58:39","modified_gmt":"2015-11-03T09:58:39","slug":"cyberprzestepca-puka-do-twoich-drzwi","status":"publish","type":"post","link":"https:\/\/www.upgreat.pl\/en\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/","title":{"rendered":"Cyber criminal is knocking on your door?"},"content":{"rendered":"<p>\t\t\t\tTelevisions, portals and experts warn all of us against various types of cyber threats. The topic is media attractive and often discussed. However, in the sheer volume of information, these warnings are relegated to the background as relating to other people and not ourselves. We assume that, because we are careful, no one will steal our access data and empty our bank account. Anyway, in order to make their offer more attractive, banks offer various types of insurance that provide reimbursement of lost money in the event of unauthorized withdrawals from the account.<\/p>\n<p>However, there are threats not only to individuals but also to larger communities. In recent months, we have dealt with our clients several times with attacks consisting in encrypting data belonging to the enterprise. The criminal undertook to decrypt the data after paying the ransom. In this case, the threat concerned the entire company \/ organization.<\/p>\n<p><!--more--><\/p>\n<p>Attacks that will affect entire communities, cities or entire countries are also possible. Will we be able to function without electricity, without telephone services, without tap water? A case of the virus <a href=\"https:\/\/pl.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a> showed that even installations completely separated from the Internet can be attacked. In the case of Stuxnet, there was physical damage to the nuclear material equipment. Could certain devices, for example in a power plant, also be destroyed?<\/p>\n<p>Why would anyone attack power plants, water networks, telecommunications companies, transport companies? There can be many reasons: for ransom, as an act of aggression by another state, as an act of terror. I invite you to read the\u00a0<a href=\"http:\/\/energetyka.defence24.pl\/266794,czy-ataki-cybernetyczne-zagroza-polskiemu-atomowi\" target=\"_blank\" rel=\"noopener\">an interesting article on cyber threats in the Polish energy sector<\/a> on the portal <a href=\"http:\/\/www.defence24.pl\/\" target=\"_blank\" rel=\"noopener\">defence24.pl<\/a>.<\/p>\n<p>Reading assures us that the Polish State has institutions responsible for our security (including cybersecurity). It is worth mentioning here the Internal Security Agency to which <a href=\"https:\/\/www.abw.gov.pl\/pl\/zadania\/zwalczanie-terroryzmu\/cyberterroryzm\/306,Cyberterroryzm.html\" target=\"_blank\" rel=\"noopener\">tasks include the fight against cyberterrorism<\/a>. As part of the ABW structures, the Governmental Computer Incident Response Team was established - <a href=\"http:\/\/www.cert.gov.pl\/\" target=\"_blank\" rel=\"noopener\">CERT.GOV.PL<\/a>\u00a0monitoring and correlating on an ongoing basis (system <a href=\"http:\/\/arakis.cert.pl\/pl\/index.html\" target=\"_blank\" rel=\"noopener\">ARAKIS-GOV<\/a>) cyber threats in the area of public administration and civil space.<\/p>\n<p>Despite the security we have and the activities of institutions established for our protection, we should not feel completely safe. Firstly, the attack protection systems are to a certain extent reactive, secondly, the process of implementing modern security measures is costly and lengthy, and therefore does not keep up with known threats, and thirdly, new threats appear every day, with more and more qualified development teams ( e.g. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Regin_(malware)\" target=\"_blank\" rel=\"noopener\">REGIN<\/a>).<\/p>\n<p>The conclusion of our considerations is to start from your own backyard: o) because many known attacks are long-term multi-stage actions that start not in the attacked institution but with taking control over the computers of subcontractors, cooperators or employees.<\/p>\n<p>Therefore, let&#039;s choose good anti-virus and anti-spam solutions, firewalls, IPS \/ IDS systems or SIEM class systems that are appropriate for our budgets. Let&#039;s perform periodic <a href=\"https:\/\/www.upgreat.pl\/en\/oferta\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\">security audits<\/a> and <a href=\"https:\/\/www.upgreat.pl\/en\/oferta\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\">penetration testing<\/a> in our IT systems and, above all, let&#039;s implement <a href=\"https:\/\/www.upgreat.pl\/en\/oferta\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\">security policy<\/a>. And we train our employees because they (as always) are the weakest link in our security systems.\t\t<\/p>","protected":false},"excerpt":{"rendered":"<p>Television stations, portals and experts warn us all about various types of cyber threats. The topic is attractive in the media and frequently discussed. However, in the abundance of information, these warnings are pushed into the background as they concern other people and not ourselves. We assume that because we are careful, no one will steal our access data and empty our bank account. Anyway, in order to [\u2026]<\/p>","protected":false},"author":1,"featured_media":133,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[42],"class_list":["post-684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktualnosci","tag-cert-arakis-regin-stuxnet-elektrownia-atomowa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat\" \/>\n<meta property=\"og:description\" content=\"Telewizje, portale oraz eksperci ostrzegaj\u0105 nas wszystkich przed r\u00f3\u017cnego rodzaju cyberzagro\u017ceniami. Temat jest atrakcyjny medialnie i cz\u0119sto poruszany. Jednak w nat\u0142oku informacji ostrze\u017cenia te odsuwane s\u0105 na dalszy plan jako dotycz\u0105ce innych os\u00f3b a nie nas samych. Zak\u0142adamy, \u017ce poniewa\u017c jeste\u015bmy ostro\u017cni, nikt ukradnie nam danych dost\u0119powych i nie opr\u00f3\u017cni naszego konta bankowego. Zreszt\u0105, aby [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-03T09:58:39+00:00\" \/>\n<meta name=\"author\" content=\"ridos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ridos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\"},\"author\":{\"name\":\"ridos\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\"},\"headline\":\"Cyberprzest\u0119pca puka do Twoich drzwi?\",\"datePublished\":\"2015-11-03T09:58:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\"},\"wordCount\":559,\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"CERT ARAKIS REGIN STUXNET ELEKTROWNIA ATOMOWA\"],\"articleSection\":[\"Aktualno\u015bci\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\",\"url\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\",\"name\":\"Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2015-11-03T09:58:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberprzest\u0119pca puka do Twoich drzwi?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\",\"name\":\"ridos\",\"sameAs\":[\"https:\/\/www.upgreat.pl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/","og_locale":"en_US","og_type":"article","og_title":"Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat","og_description":"Telewizje, portale oraz eksperci ostrzegaj\u0105 nas wszystkich przed r\u00f3\u017cnego rodzaju cyberzagro\u017ceniami. Temat jest atrakcyjny medialnie i cz\u0119sto poruszany. Jednak w nat\u0142oku informacji ostrze\u017cenia te odsuwane s\u0105 na dalszy plan jako dotycz\u0105ce innych os\u00f3b a nie nas samych. Zak\u0142adamy, \u017ce poniewa\u017c jeste\u015bmy ostro\u017cni, nikt ukradnie nam danych dost\u0119powych i nie opr\u00f3\u017cni naszego konta bankowego. Zreszt\u0105, aby [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/","og_site_name":"Upgreat","article_published_time":"2015-11-03T09:58:39+00:00","author":"ridos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ridos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#article","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/"},"author":{"name":"ridos","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101"},"headline":"Cyberprzest\u0119pca puka do Twoich drzwi?","datePublished":"2015-11-03T09:58:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/"},"wordCount":559,"publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"image":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage"},"thumbnailUrl":"","keywords":["CERT ARAKIS REGIN STUXNET ELEKTROWNIA ATOMOWA"],"articleSection":["Aktualno\u015bci"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/","url":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/","name":"Cyberprzest\u0119pca puka do Twoich drzwi? | Upgreat","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage"},"image":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage"},"thumbnailUrl":"","datePublished":"2015-11-03T09:58:39+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/blog\/cyberprzestepca-puka-do-twoich-drzwi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Cyberprzest\u0119pca puka do Twoich drzwi?"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101","name":"ridos","sameAs":["https:\/\/www.upgreat.pl"]}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=684"}],"version-history":[{"count":0,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/categories?post=684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/tags?post=684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}