{"id":15810,"date":"2025-11-10T11:10:13","date_gmt":"2025-11-10T11:10:13","guid":{"rendered":"http:\/\/in-sist.si\/security-policies-and-audits-2\/"},"modified":"2025-11-26T09:10:31","modified_gmt":"2025-11-26T09:10:31","slug":"security-policies-and-audits-2","status":"publish","type":"page","link":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/","title":{"rendered":"Security policies and audits"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15810\" class=\"elementor elementor-15810 elementor-15029\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25728477 e-con-full e-flex e-con e-child\" data-id=\"25728477\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12808d34 navigation-breadcrumbs-custom split-breadcrumbs-y elementor-widget elementor-widget-global elementor-global-15262 elementor-global-13719 elementor-widget-the7-breadcrumb\" data-id=\"12808d34\" data-element_type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/in-sist.si\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4335fb7e elementor-widget elementor-widget-slider_revolution\" data-id=\"4335fb7e\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"revisions\" data-id=\"57\" id=\"SR7_57_1\" class=\"rs-ov-hidden\" data-version=\"6.7.37\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_57_1-182\" data-key=\"182\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_57_1-182-2\" class=\"sr7-layer\">Security policies and revisions<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_57_1-148\" data-key=\"148\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Slider-3.jpg\" data-libid=\"13566\" data-lib=\"medialibrary\" title=\"Slider 3\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9pbi1zaXN0LnNpL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDI1LzA5L1NsaWRlci0zLmpwZw==\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_57_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_57_1\",el:[400,400,410,960,193],type:'hero',shdw:'0',gh:[400,400,410,313,193],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_57_1\"].state=true;} else if(SR7.PMH[\"SR7_57_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_57_1\"].fn,19);}};SR7.PMH[\"SR7_57_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-114d4ac1 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"114d4ac1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-123ebc49 e-con-full div-bellow-hero e-flex e-con e-child\" data-id=\"123ebc49\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-35cdc3a0 e-con-full text-bellow-hero e-flex e-con e-child\" data-id=\"35cdc3a0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69d42a99 elementor-widget elementor-widget-heading\" data-id=\"69d42a99\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security policies and audits<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f802456 elementor-widget elementor-widget-text-editor\" data-id=\"5f802456\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"255\" data-end=\"524\">Information security is not just about technology &#8211; clearly defined rules, procedures and control mechanisms are also a key part of it. Without proper security policies, inconsistencies, errors, opacity and increased risk exposure can quickly occur.   <\/p><p data-start=\"526\" data-end=\"865\">Security policies and regular audits ensure that a company has a well-organised, compliant and controlled environment, where responsibilities are clearly allocated, risks are controlled, and procedures are documented and verifiable.<br data-start=\"727\" data-end=\"730\">Our approach helps companies establish a comprehensive information security management system tailored to their actual business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7cbb1a e-con-full e-flex e-con e-child\" data-id=\"f7cbb1a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-674752c9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"674752c9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\" class=\"attachment-medium_large size-medium_large wp-image-15422\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-300x200.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-1024x683.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-900x600.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-1200x800.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1.png 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-442a5a29 e-con-full e-flex e-con e-child\" data-id=\"442a5a29\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b6ff8f elementor-widget elementor-widget-heading\" data-id=\"52b6ff8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our services include<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a8f2bdc e-con-full e-flex e-con e-child\" data-id=\"4a8f2bdc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1bbb42e5 custom-card e-con-full e-flex e-con e-child\" data-id=\"1bbb42e5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71ed718d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"71ed718d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/ikona-svetovanje.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-160a808b elementor-widget elementor-widget-heading\" data-id=\"160a808b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Analysis of the current situation and overview of risks<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5060ca0a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5060ca0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A comprehensive review of existing practices, documentation, access, configurations, procedures and exposures, with a report and clear recommendations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76d4df10 elementor-align-center elementor-widget__width-initial custom-marker elementor-widget elementor-widget-button\" data-id=\"76d4df10\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/in-sist.si\/en\/pantheon-erp\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38620bf1 custom-card e-con-full e-flex e-con e-child\" data-id=\"38620bf1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ddc0567 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5ddc0567\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/ikona-implementacija-1.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b64a434 elementor-widget elementor-widget-heading\" data-id=\"1b64a434\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Establishing security policies and protocols<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c71a859 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3c71a859\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information security policy, password and access policy, GDPR, secure workstation policy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-499aba3d elementor-align-center elementor-widget__width-initial custom-marker elementor-widget elementor-widget-button\" data-id=\"499aba3d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/in-sist.si\/en\/pantheon-erp\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-381df40f custom-card e-con-full e-flex e-con e-child\" data-id=\"381df40f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d09ec44 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7d09ec44\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/migracija.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79f0916f elementor-widget elementor-widget-heading\" data-id=\"79f0916f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Audit of user rights and access<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-307b93ab elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"307b93ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Review and optimise access to ERP, WMS, databases, servers and applications; check compliance with the principle of least privilege.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e90b462 elementor-align-right elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"4e90b462\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a4ea8e9 custom-card e-con-full e-flex e-con e-child\" data-id=\"6a4ea8e9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8758f9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f8758f9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/izobrazevanje.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4879e68f elementor-widget elementor-widget-heading\" data-id=\"4879e68f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Revision of system configurations and settings<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21a7e88f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"21a7e88f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Verification of the correctness and security of network settings, servers, applications and integrations, including a vulnerability report.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5672e546 elementor-align-right elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"5672e546\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ce81f1d e-con-full e-flex e-con e-child\" data-id=\"6ce81f1d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2af8c64c e-con-full e-flex e-con e-child\" data-id=\"2af8c64c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f6eff41 elementor-widget elementor-widget-heading\" data-id=\"1f6eff41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key components and functionalities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-291e528 elementor-widget elementor-widget-text-editor\" data-id=\"291e528\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2416\" data-end=\"2706\">Security policies and audits are not a one-off project, but a continuous process of improvement.<br data-start=\"2505\" data-end=\"2508\">They enable a company to better manage risks, have visibility over responsibilities, increase compliance with standards and respond more quickly to incidents.<br data-start=\"2644\" data-end=\"2647\">The result is a stable, verifiable and secure business environment.<\/p><p data-start=\"2708\" data-end=\"2913\">As experts in business information systems, security and process optimisation, we ensure that policies are practical, understandable and tailored to your business model &#8211; not just a theoretical document.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-472d6dd4 e-con-full e-flex e-con e-child\" data-id=\"472d6dd4\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-45e5bdb9 e-con-full component-card e-flex e-con e-child\" data-id=\"45e5bdb9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5604edff elementor-widget elementor-widget-image\" data-id=\"5604edff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2abd7ffe elementor-widget elementor-widget-text-editor\" data-id=\"2abd7ffe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong data-start=\"2980\" data-end=\"3012\">Increased coherence and orderliness<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-548756f elementor-widget elementor-widget-text-editor\" data-id=\"548756f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3015\" data-end=\"3084\">Clearly defined procedures, responsibilities and rules for the use of IT systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-350f0c07 e-con-full component-card e-flex e-con e-child\" data-id=\"350f0c07\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-674bba48 elementor-widget elementor-widget-image\" data-id=\"674bba48\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-322b5f11 elementor-widget elementor-widget-text-editor\" data-id=\"322b5f11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reducing security risks<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c983ce2 elementor-widget elementor-widget-text-editor\" data-id=\"6c983ce2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3126\" data-end=\"3190\">Vulnerability identification and incident prevention measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-247c5aa8 e-con-full component-card e-flex e-con e-child\" data-id=\"247c5aa8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc44a93 elementor-widget elementor-widget-image\" data-id=\"2dc44a93\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77082d4b elementor-widget elementor-widget-text-editor\" data-id=\"77082d4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Better control over access and data<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38b455d3 elementor-widget elementor-widget-text-editor\" data-id=\"38b455d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3239\" data-end=\"3293\">An overview of who has access to what information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dc3ad9f e-con-full component-card e-flex e-con e-child\" data-id=\"6dc3ad9f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb2a5de elementor-widget elementor-widget-image\" data-id=\"3cb2a5de\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg\" class=\"attachment-full size-full wp-image-15228\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-150x150.jpg 150w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/thumb-2-200x200.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bd607de elementor-widget elementor-widget-text-editor\" data-id=\"3bd607de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reduction of operational errors<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0b210f elementor-widget elementor-widget-text-editor\" data-id=\"c0b210f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3334\" data-end=\"3403\">Fewer inconsistencies, misconfigurations and inefficient processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f03df2 e-con-full e-flex e-con e-parent\" data-id=\"9f03df2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-64626f5f e-con-full e-flex e-con e-child\" data-id=\"64626f5f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5a18da2a e-con-full e-flex e-con e-child\" data-id=\"5a18da2a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c010956 elementor-widget elementor-widget-heading\" data-id=\"3c010956\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why with us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ccb3d3c elementor-widget elementor-widget-text-editor\" data-id=\"5ccb3d3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a certified partner with extensive experience in ERP implementations and business digitalization. We understand the technological and human challenges of implementing such a system, ensuring a professionally managed project that focuses on the end user and long-term value.   <\/p><p>Whether you&#8217;re a micro-business or a manufacturing company with complex processes &#8211; with Pantheon ERP, you get a tool that grows with you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f3774c elementor-widget elementor-widget-button\" data-id=\"63f3774c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More about us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd03cf3 e-con-full e-flex e-con e-child\" data-id=\"4cd03cf3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-571cea3 e-con-full e-flex e-con e-child\" data-id=\"571cea3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bde424 elementor-widget elementor-widget-heading\" data-id=\"7bde424\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to know more or schedule a consultation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8679014 elementor-widget elementor-widget-text-editor\" data-id=\"8679014\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us and we will be happy to make you a presentation or a concrete offer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64c8790b e-con-full e-flex e-con e-child\" data-id=\"64c8790b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-156d9c59 e-con-full e-flex e-con e-child\" data-id=\"156d9c59\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21a1d6d6 elementor-widget elementor-widget-heading\" data-id=\"21a1d6d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">They trust us<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ac17e7a e-con-full e-flex e-con e-child\" data-id=\"5ac17e7a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-111ceae1 e-grid e-con-full e-con e-child\" data-id=\"111ceae1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10307568 elementor-widget elementor-widget-image\" data-id=\"10307568\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f88915f elementor-widget elementor-widget-image\" data-id=\"6f88915f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-299d4948 elementor-widget elementor-widget-image\" data-id=\"299d4948\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15197\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a1923ce elementor-widget elementor-widget-image\" data-id=\"5a1923ce\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38e91174 elementor-widget elementor-widget-image\" data-id=\"38e91174\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tukaj ste: Domov Security policies and audits Information security is not just about technology &#8211; clearly defined rules, procedures and control mechanisms are also a key part of it. Without proper security policies, inconsistencies, errors, opacity and increased risk exposure can quickly occur. Security policies and regular audits ensure that a company has a well-organised,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"give_campaign_id":0,"footnotes":""},"class_list":["post-15810","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security policies and audits - In.Sist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security policies and audits - In.Sist\" \/>\n<meta property=\"og:description\" content=\"Tukaj ste: Domov Security policies and audits Information security is not just about technology &#8211; clearly defined rules, procedures and control mechanisms are also a key part of it. Without proper security policies, inconsistencies, errors, opacity and increased risk exposure can quickly occur. Security policies and regular audits ensure that a company has a well-organised,&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/\" \/>\n<meta property=\"og:site_name\" content=\"In.Sist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T09:10:31+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/\",\"url\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/\",\"name\":\"Security policies and audits - In.Sist\",\"isPartOf\":{\"@id\":\"https:\/\/in-sist.si\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\",\"datePublished\":\"2025-11-10T11:10:13+00:00\",\"dateModified\":\"2025-11-26T09:10:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage\",\"url\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\",\"contentUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/in-sist.si\/en\/main-page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security policies and audits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/in-sist.si\/en\/#website\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"name\":\"In.Sist\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/in-sist.si\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/in-sist.si\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/in-sist.si\/en\/#organization\",\"name\":\"In.Sist\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"contentUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"width\":350,\"height\":100,\"caption\":\"In.Sist\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security policies and audits - In.Sist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/","og_locale":"en_US","og_type":"article","og_title":"Security policies and audits - In.Sist","og_description":"Tukaj ste: Domov Security policies and audits Information security is not just about technology &#8211; clearly defined rules, procedures and control mechanisms are also a key part of it. Without proper security policies, inconsistencies, errors, opacity and increased risk exposure can quickly occur. Security policies and regular audits ensure that a company has a well-organised,&hellip;","og_url":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/","og_site_name":"In.Sist","article_modified_time":"2025-11-26T09:10:31+00:00","og_image":[{"url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/","url":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/","name":"Security policies and audits - In.Sist","isPartOf":{"@id":"https:\/\/in-sist.si\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage"},"image":{"@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage"},"thumbnailUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","datePublished":"2025-11-10T11:10:13+00:00","dateModified":"2025-11-26T09:10:31+00:00","breadcrumb":{"@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#primaryimage","url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png","contentUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/cover1-768x512.png"},{"@type":"BreadcrumbList","@id":"https:\/\/in-sist.si\/en\/security-policies-and-audits-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/in-sist.si\/en\/main-page\/"},{"@type":"ListItem","position":2,"name":"Security policies and audits"}]},{"@type":"WebSite","@id":"https:\/\/in-sist.si\/en\/#website","url":"https:\/\/in-sist.si\/en\/","name":"In.Sist","description":"","publisher":{"@id":"https:\/\/in-sist.si\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/in-sist.si\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/in-sist.si\/en\/#organization","name":"In.Sist","url":"https:\/\/in-sist.si\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/","url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","contentUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","width":350,"height":100,"caption":"In.Sist"},"image":{"@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/"}}]}},"campaignId":"","_links":{"self":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/comments?post=15810"}],"version-history":[{"count":1,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15810\/revisions"}],"predecessor-version":[{"id":15813,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15810\/revisions\/15813"}],"wp:attachment":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/media?parent=15810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}