{"id":589,"date":"2024-05-14T13:48:00","date_gmt":"2024-05-14T13:48:00","guid":{"rendered":"https:\/\/ivsr.si\/?page_id=589"},"modified":"2024-07-03T06:52:18","modified_gmt":"2024-07-03T06:52:18","slug":"kibernetska-varnost","status":"publish","type":"page","link":"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/","title":{"rendered":"Cyber security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"589\" class=\"elementor elementor-589\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d99a480 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"1d99a480\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d101075\" data-id=\"2d101075\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6c648e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e6c648e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Turnkey security<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a90f9ec elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4a90f9ec\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Cyber security\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1432cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c1432cf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6aee0f27\" data-id=\"6aee0f27\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-774cfc36 elementor-widget elementor-widget-text-editor\" data-id=\"774cfc36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>With the continuous development of information systems and the digitization of business processes, threats in cyberspace are constantly evolving. Our cybersecurity services are designed to protect data, devices and processes against the full spectrum of cyber threats. Using the most advanced tools, methods and techniques, we ensure that you are protected from unauthorized access, data theft and other risks in cyberspace.<\/p><p>We offer a comprehensive approach to ensuring cyber security, which we tailor to the unique requirements and needs of each organization. The range of our services ranges from initial assessments and planning of cyber security systems to the implementation and maintenance of measures.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40ef7573 elementor-widget elementor-widget-heading\" data-id=\"40ef7573\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber security services include:<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-097ca6c elementor-widget elementor-widget-text-editor\" data-id=\"097ca6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>Assessments and audits of cyber security systems<\/b>. Using various tools, techniques and methods, we perform a thorough assessment of the current state of cyber security to uncover potential vulnerabilities in your IT infrastructure, software or business processes.<\/p><p><b>Designing cyber security systems<\/b>. We design flexible and comprehensive cyber security systems that incorporate the latest tools, techniques and processes.<\/p><p><b>Education and awareness of employees<\/b>. Because we are aware that the human factor is the most common cause of information incidents, we provide comprehensive training programs for your staff. From classic training to the use of social engineering techniques, all forms of training are aimed at effective identification and timely prevention of cyber threats.<\/p><p><b>Incident Response and Digital Forensics<\/b>. In the event of a cyber incident, our team offers you a quick response to prevent further damage and ensure that the information system returns to normal as soon as possible. After the incident, we review the information system and eliminate the vulnerabilities that made the incident possible.<\/p><p><b>Counsulting<\/b>. The cyber security system must be regularly monitored and adapted to current threats. We provide continuous monitoring and management of cyber security systems, ensuring readiness and resilience to the ever-changing threat environment.<\/p><p><b>Custom solutions<\/b>. Are you facing complex security threats and don't know where to start? Contact us and we will find the optimal solution together!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f32dc1 elementor-widget elementor-widget-heading\" data-id=\"0f32dc1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Benefits of a comprehensive approach to cyber security management: <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00f1848 elementor-widget elementor-widget-text-editor\" data-id=\"00f1848\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b>Holistic protection<\/b>. Protect your digital assets from common and advanced cyber threats.<\/p><p><b>Compliance<\/b>. Ensure compliance with regulatory requirements and industry standards.<\/p><p><b>Business continuity<\/b>. Minimize the risk of cyber threats and ensure the uninterrupted performance of the organization&#039;s core activities.<\/p><p><b>Maintaining reputation and trust<\/b>. Maintain a high reputation and ensure that customers and business partners recognize you as a trustworthy organization.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57c7d1d4 elementor-widget elementor-widget-text-editor\" data-id=\"57c7d1d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Our team of experts ensures a simple and smooth integration of all cyber security solutions into the existing information system of any organization. By establishing a comprehensive cyber security system, you obtain a preventive approach to cyber security management that is tailored to your business goals and grows with you.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4d1479ad\" data-id=\"4d1479ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ed92e69 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed92e69\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;sticky_offset&quot;:32,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_effects_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0328c47\" data-id=\"0328c47\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb3ee0a elementor-widget elementor-widget-heading\" data-id=\"bb3ee0a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Custom solutions<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01c3117 elementor-widget elementor-widget-text-editor\" data-id=\"01c3117\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Are you facing complex security threats and don't know where to start? Contact us and we will find the optimal solution together!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7457bb9 elementor-view-framed elementor-shape-square elementor-position-left elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"7457bb9\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivsr.si\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-box.min.css\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"mailto:info@ivsr.si\" class=\"elementor-icon elementor-animation-\" tabindex=\"-1\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-envelope2\"><\/i>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"mailto:info@ivsr.si\" >\n\t\t\t\t\t\t\tWrite to us!\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tinfo@ivsr.si\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e881cd elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e881cd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f7a3b77 elementor-invisible\" data-id=\"6f7a3b77\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1b2c1793 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b2c1793\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1582fa36\" data-id=\"1582fa36\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5aacb91e elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-elementskit-header-info\" data-id=\"5aacb91e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                                                How to start?                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3210ab77 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"3210ab77\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title text_fill\"><span><span>Are you ready to upgrade your organization&#039;s security?<\/h2><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f0d33ff elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3f0d33ff\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Contact us and learn how our turnkey solutions can help ensure a secure and resilient business environment.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10b5eb2c elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-button\" data-id=\"10b5eb2c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/send-inquiry\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Turnkey security Cybersecurity With the continuous development of information systems and the digitization of business processes, threats in cyberspace are also developing. Our cybersecurity services are designed to protect data, devices and processes against the full spectrum of cyber threats. Using the most advanced tools, methods and techniques, we ensure that you are protected against unauthorized access, [...]<\/p>","protected":false},"author":1,"featured_media":875,"parent":604,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-589","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave\" \/>\n<meta property=\"og:description\" content=\"Varnost na klju\u010d Kibernetska varnost Z nenehnim razvojem informacijskih sistemov in digitalizacijo poslovnih procesov, se razvijajo tudi gro\u017enje v kibernetskem prostoru. Na\u0161e storitve na podro\u010dju kibernetske varnosti so oblikovane tako, da podatke, naprave in procese varujejo pred celotnim spektrom kibernetskih gro\u017eenj. Z uporabo najnaprednej\u0161ih orodij, metod in tehnik zagotavljamo, da ste za\u0161\u010diteni pred nepoobla\u0161\u010denimi dostopi, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IVSR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-03T06:52:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/\",\"url\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/\",\"name\":\"Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave\",\"isPartOf\":{\"@id\":\"https:\/\/ivsr.si\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"datePublished\":\"2024-05-14T13:48:00+00:00\",\"dateModified\":\"2024-07-03T06:52:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage\",\"url\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"contentUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"width\":1200,\"height\":628,\"caption\":\"Screenshot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ivsr.si\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Varnost na klju\u010d\",\"item\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kibernetska varnost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ivsr.si\/#website\",\"url\":\"https:\/\/ivsr.si\/\",\"name\":\"IVSR\",\"description\":\"In\u0161titut za Varnost in Strate\u0161ke Raziskave\",\"publisher\":{\"@id\":\"https:\/\/ivsr.si\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ivsr.si\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ivsr.si\/#organization\",\"name\":\"IVSR\",\"url\":\"https:\/\/ivsr.si\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ivsr.si\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png\",\"contentUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png\",\"width\":3372,\"height\":1361,\"caption\":\"IVSR\"},\"image\":{\"@id\":\"https:\/\/ivsr.si\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/","og_locale":"en_GB","og_type":"article","og_title":"Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave","og_description":"Varnost na klju\u010d Kibernetska varnost Z nenehnim razvojem informacijskih sistemov in digitalizacijo poslovnih procesov, se razvijajo tudi gro\u017enje v kibernetskem prostoru. Na\u0161e storitve na podro\u010dju kibernetske varnosti so oblikovane tako, da podatke, naprave in procese varujejo pred celotnim spektrom kibernetskih gro\u017eenj. Z uporabo najnaprednej\u0161ih orodij, metod in tehnik zagotavljamo, da ste za\u0161\u010diteni pred nepoobla\u0161\u010denimi dostopi, [&hellip;]","og_url":"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/","og_site_name":"IVSR","article_modified_time":"2024-07-03T06:52:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/","url":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/","name":"Kibernetska varnost - In\u0161titut za Varnost in Strate\u0161ke Raziskave","isPartOf":{"@id":"https:\/\/ivsr.si\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage"},"image":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage"},"thumbnailUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","datePublished":"2024-05-14T13:48:00+00:00","dateModified":"2024-07-03T06:52:18+00:00","breadcrumb":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#primaryimage","url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","contentUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","width":1200,"height":628,"caption":"Screenshot"},{"@type":"BreadcrumbList","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/kibernetska-varnost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivsr.si\/"},{"@type":"ListItem","position":2,"name":"Varnost na klju\u010d","item":"https:\/\/ivsr.si\/varnost-na-kljuc\/"},{"@type":"ListItem","position":3,"name":"Kibernetska varnost"}]},{"@type":"WebSite","@id":"https:\/\/ivsr.si\/#website","url":"https:\/\/ivsr.si\/","name":"IVSR","description":"In\u0161titut za Varnost in Strate\u0161ke Raziskave","publisher":{"@id":"https:\/\/ivsr.si\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivsr.si\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ivsr.si\/#organization","name":"IVSR","url":"https:\/\/ivsr.si\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ivsr.si\/#\/schema\/logo\/image\/","url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png","contentUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png","width":3372,"height":1361,"caption":"IVSR"},"image":{"@id":"https:\/\/ivsr.si\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/comments?post=589"}],"version-history":[{"count":22,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/589\/revisions"}],"predecessor-version":[{"id":985,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/589\/revisions\/985"}],"up":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/media\/875"}],"wp:attachment":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/media?parent=589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}