{"id":15802,"date":"2025-11-10T11:06:03","date_gmt":"2025-11-10T11:06:03","guid":{"rendered":"http:\/\/in-sist.si\/information-security-2\/"},"modified":"2025-11-26T09:10:11","modified_gmt":"2025-11-26T09:10:11","slug":"information-security-2","status":"publish","type":"page","link":"https:\/\/in-sist.si\/en\/information-security-2\/","title":{"rendered":"Information security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15802\" class=\"elementor elementor-15802 elementor-15043\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b11dc1f e-con-full e-flex e-con e-child\" data-id=\"6b11dc1f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-183e3eb1 navigation-breadcrumbs-custom split-breadcrumbs-y elementor-widget elementor-widget-global elementor-global-15262 elementor-global-13719 elementor-widget-the7-breadcrumb\" data-id=\"183e3eb1\" data-element_type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/in-sist.si\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17f889df elementor-widget elementor-widget-slider_revolution\" data-id=\"17f889df\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"information-security\" data-id=\"54\" id=\"SR7_54_1\" class=\"rs-ov-hidden\" data-version=\"6.7.37\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_54_1-179\" data-key=\"179\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_54_1-179-2\" class=\"sr7-layer\">Information security<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_54_1-145\" data-key=\"145\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Slider-3.jpg\" data-libid=\"13566\" data-lib=\"medialibrary\" title=\"Slider 3\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9pbi1zaXN0LnNpL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDI1LzA5L1NsaWRlci0zLmpwZw==\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_54_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_54_1\",el:[400,400,410,960,193],type:'hero',shdw:'0',gh:[400,400,410,313,193],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_54_1\"].state=true;} else if(SR7.PMH[\"SR7_54_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_54_1\"].fn,19);}};SR7.PMH[\"SR7_54_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-151b3b34 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"151b3b34\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7187b758 e-con-full div-bellow-hero e-flex e-con e-child\" data-id=\"7187b758\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-75ce9917 e-con-full text-bellow-hero e-flex e-con e-child\" data-id=\"75ce9917\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a33ea4 elementor-widget elementor-widget-heading\" data-id=\"4a33ea4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52b0a2f6 elementor-widget elementor-widget-text-editor\" data-id=\"52b0a2f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"281\" data-end=\"703\">In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption.<br data-start=\"582\" data-end=\"585\">Information security is therefore no longer an option, but a necessary cornerstone of a stable, reliable and compliant business environment.   <\/p><p data-start=\"705\" data-end=\"896\">By implementing proven security practices, policies and technologies, we help companies reduce risk, protect sensitive data and ensure the secure operation of business-critical systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73ca7faa e-con-full e-flex e-con e-child\" data-id=\"73ca7faa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-142e5ba0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"142e5ba0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\" class=\"attachment-medium_large size-medium_large wp-image-15422\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-300x200.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-1024x683.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-900x600.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-1200x800.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1.png 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fd031c6 e-con-full e-flex e-con e-child\" data-id=\"3fd031c6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4b4eec elementor-widget elementor-widget-heading\" data-id=\"2d4b4eec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our services include<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fdaadf2 e-con-full e-flex e-con e-child\" data-id=\"3fdaadf2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5ab3183d custom-card e-con-full e-flex e-con e-child\" data-id=\"5ab3183d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7afa9d6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7afa9d6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/ikona-svetovanje.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76a4b7b elementor-widget elementor-widget-heading\" data-id=\"76a4b7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Safety assessment<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a251076 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7a251076\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Review existing IT infrastructure, systems, user rights and potential vulnerabilities and make recommendations for improvements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-551767d9 elementor-align-center elementor-widget__width-initial custom-marker elementor-widget elementor-widget-button\" data-id=\"551767d9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/in-sist.si\/en\/pantheon-erp\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43bd7d0e custom-card e-con-full e-flex e-con e-child\" data-id=\"43bd7d0e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c58de6c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6c58de6c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/ikona-implementacija-1.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5175f32e elementor-widget elementor-widget-heading\" data-id=\"5175f32e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Establishing security policies<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1441b2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1a1441b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defining access rules, data handling, security procedures, encryption, passwords and other mechanisms to protect information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dbc1919 elementor-align-center elementor-widget__width-initial custom-marker elementor-widget elementor-widget-button\" data-id=\"4dbc1919\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/in-sist.si\/en\/pantheon-erp\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-559a798a custom-card e-con-full e-flex e-con e-child\" data-id=\"559a798a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55cc6ff7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"55cc6ff7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/migracija.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57c03157 elementor-widget elementor-widget-heading\" data-id=\"57c03157\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Protecting your network and servers<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5db0cb elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4a5db0cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementation of firewalls, protection systems (IDS\/IPS), network segmentation, access control and security monitoring.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2946a7d5 elementor-align-right elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"2946a7d5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f63e2f5 custom-card e-con-full e-flex e-con e-child\" data-id=\"7f63e2f5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc61f82 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4bc61f82\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/izobrazevanje.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-310c13fd elementor-widget elementor-widget-heading\" data-id=\"310c13fd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Business information systems security<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c819ab8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3c819ab8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Overview of settings, user rights, logging, integrations and other elements that affect the protection of sensitive data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20c8e94e elementor-align-right elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"20c8e94e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1486fbd9 e-con-full e-flex e-con e-child\" data-id=\"1486fbd9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1cdc650 e-con-full e-flex e-con e-child\" data-id=\"1cdc650\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14f80ece elementor-widget elementor-widget-heading\" data-id=\"14f80ece\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key components and functionalities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fd16560 elementor-widget elementor-widget-text-editor\" data-id=\"5fd16560\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2207\" data-end=\"2483\">With a well-designed information security system, a company reduces the chance of incidents, improves response times, maintains customer trust and achieves greater regulatory compliance.<br data-start=\"2380\" data-end=\"2383\">Security measures become part of the company&#8217;s culture, leading to a more stable and reliable business.<\/p><p data-start=\"2485\" data-end=\"2745\">As experts in digital solutions and business systems, we ensure that information security is closely linked to other key processes &#8211; from ERP solutions and warehousing systems to mobile applications, networks and administrative processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56209f1f e-con-full e-flex e-con e-child\" data-id=\"56209f1f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1c4015b2 e-con-full component-card e-flex e-con e-child\" data-id=\"1c4015b2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63f0c949 elementor-widget elementor-widget-image\" data-id=\"63f0c949\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59c4afcd elementor-widget elementor-widget-text-editor\" data-id=\"59c4afcd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reducing cyber risks<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48727bce elementor-widget elementor-widget-text-editor\" data-id=\"48727bce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2842\" data-end=\"2904\">Prevent attacks, vulnerabilities and unauthorised access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c6fde e-con-full component-card e-flex e-con e-child\" data-id=\"8c6fde\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44973995 elementor-widget elementor-widget-image\" data-id=\"44973995\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1a42a4 elementor-widget elementor-widget-text-editor\" data-id=\"4e1a42a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Protecting business data<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8668c0 elementor-widget elementor-widget-text-editor\" data-id=\"a8668c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2943\" data-end=\"3024\">Encryption, secure data transfers and control over access to critical information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f3149c8 e-con-full component-card e-flex e-con e-child\" data-id=\"3f3149c8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1067f5ee elementor-widget elementor-widget-image\" data-id=\"1067f5ee\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33d2dfd2 elementor-widget elementor-widget-text-editor\" data-id=\"33d2dfd2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Compliance with legislation  <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78a3c28b elementor-widget elementor-widget-text-editor\" data-id=\"78a3c28b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3094\" data-end=\"3157\">Effective data management and appropriate safeguards.<\/p><h3 data-start=\"3159\" data-end=\"3196\"> <\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-732a7814 e-con-full component-card e-flex e-con e-child\" data-id=\"732a7814\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb0e9d8 elementor-widget elementor-widget-image\" data-id=\"7eb0e9d8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9e66c0 elementor-widget elementor-widget-text-editor\" data-id=\"c9e66c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>A stable and secure IT environment<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71d98dfc elementor-widget elementor-widget-text-editor\" data-id=\"71d98dfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3197\" data-end=\"3270\">Reduced downtime, increased reliability and faster incident detection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4459df43 e-con-full e-flex e-con e-parent\" data-id=\"4459df43\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-47d36810 e-con-full e-flex e-con e-child\" data-id=\"47d36810\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4670366a e-con-full e-flex e-con e-child\" data-id=\"4670366a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d860a4a elementor-widget elementor-widget-heading\" data-id=\"4d860a4a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why with us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ed2d36 elementor-widget elementor-widget-text-editor\" data-id=\"73ed2d36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a certified partner with extensive experience in ERP implementations and business digitalization. We understand the technological and human challenges of implementing such a system, ensuring a professionally managed project that focuses on the end user and long-term value.   <\/p><p>Whether you&#8217;re a micro-business or a manufacturing company with complex processes &#8211; with Pantheon ERP, you get a tool that grows with you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0cb0d0 elementor-widget elementor-widget-button\" data-id=\"c0cb0d0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More about us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46cfeb54 e-con-full e-flex e-con e-child\" data-id=\"46cfeb54\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-69804d9a e-con-full e-flex e-con e-child\" data-id=\"69804d9a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76c74bf3 elementor-widget elementor-widget-heading\" data-id=\"76c74bf3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to know more or schedule a consultation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55606c8f elementor-widget elementor-widget-text-editor\" data-id=\"55606c8f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us and we will be happy to make you a presentation or a concrete offer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20938f1a e-con-full e-flex e-con e-child\" data-id=\"20938f1a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-779699e4 e-con-full e-flex e-con e-child\" data-id=\"779699e4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73e7bd11 elementor-widget elementor-widget-heading\" data-id=\"73e7bd11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">They trust us<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f66deab e-con-full e-flex e-con e-child\" data-id=\"6f66deab\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1bf9787d e-grid e-con-full e-con e-child\" data-id=\"1bf9787d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34bf43a5 elementor-widget elementor-widget-image\" data-id=\"34bf43a5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f748d83 elementor-widget elementor-widget-image\" data-id=\"1f748d83\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a160cc elementor-widget elementor-widget-image\" data-id=\"8a160cc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15197\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bab860d elementor-widget elementor-widget-image\" data-id=\"2bab860d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec8301c elementor-widget elementor-widget-image\" data-id=\"ec8301c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption.Information security is therefore no longer an option, but a necessary cornerstone of a stable,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"give_campaign_id":0,"footnotes":""},"class_list":["post-15802","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information security - In.Sist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/in-sist.si\/en\/information-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security - In.Sist\" \/>\n<meta property=\"og:description\" content=\"Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption.Information security is therefore no longer an option, but a necessary cornerstone of a stable,&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/in-sist.si\/en\/information-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"In.Sist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T09:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/\",\"url\":\"https:\/\/in-sist.si\/en\/information-security-2\/\",\"name\":\"Information security - In.Sist\",\"isPartOf\":{\"@id\":\"https:\/\/in-sist.si\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\",\"datePublished\":\"2025-11-10T11:06:03+00:00\",\"dateModified\":\"2025-11-26T09:10:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/in-sist.si\/en\/information-security-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage\",\"url\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\",\"contentUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/in-sist.si\/en\/information-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/in-sist.si\/en\/main-page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/in-sist.si\/en\/#website\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"name\":\"In.Sist\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/in-sist.si\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/in-sist.si\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/in-sist.si\/en\/#organization\",\"name\":\"In.Sist\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"contentUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"width\":350,\"height\":100,\"caption\":\"In.Sist\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security - In.Sist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/in-sist.si\/en\/information-security-2\/","og_locale":"en_US","og_type":"article","og_title":"Information security - In.Sist","og_description":"Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption.Information security is therefore no longer an option, but a necessary cornerstone of a stable,&hellip;","og_url":"https:\/\/in-sist.si\/en\/information-security-2\/","og_site_name":"In.Sist","article_modified_time":"2025-11-26T09:10:11+00:00","og_image":[{"url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/in-sist.si\/en\/information-security-2\/","url":"https:\/\/in-sist.si\/en\/information-security-2\/","name":"Information security - In.Sist","isPartOf":{"@id":"https:\/\/in-sist.si\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage"},"image":{"@id":"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage"},"thumbnailUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","datePublished":"2025-11-10T11:06:03+00:00","dateModified":"2025-11-26T09:10:11+00:00","breadcrumb":{"@id":"https:\/\/in-sist.si\/en\/information-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/in-sist.si\/en\/information-security-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/information-security-2\/#primaryimage","url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","contentUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png"},{"@type":"BreadcrumbList","@id":"https:\/\/in-sist.si\/en\/information-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/in-sist.si\/en\/main-page\/"},{"@type":"ListItem","position":2,"name":"Information security"}]},{"@type":"WebSite","@id":"https:\/\/in-sist.si\/en\/#website","url":"https:\/\/in-sist.si\/en\/","name":"In.Sist","description":"","publisher":{"@id":"https:\/\/in-sist.si\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/in-sist.si\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/in-sist.si\/en\/#organization","name":"In.Sist","url":"https:\/\/in-sist.si\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/","url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","contentUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","width":350,"height":100,"caption":"In.Sist"},"image":{"@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/"}}]}},"campaignId":"","_links":{"self":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/comments?post=15802"}],"version-history":[{"count":1,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15802\/revisions"}],"predecessor-version":[{"id":15804,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15802\/revisions\/15804"}],"wp:attachment":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/media?parent=15802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}