{"id":4896,"date":"2021-02-13T10:15:11","date_gmt":"2021-02-13T08:15:11","guid":{"rendered":"https:\/\/itrusta.lt\/dev1\/?page_id=4896"},"modified":"2022-12-13T00:38:50","modified_gmt":"2022-12-12T22:38:50","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/itrusta.lt\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4896\" class=\"elementor elementor-4896 elementor-258\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b67661 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b67661\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2e6cac\" data-id=\"d2e6cac\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e421200 elementor-widget elementor-widget-spacer\" data-id=\"e421200\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4aa3007 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4aa3007\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80efac0\" data-id=\"80efac0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7b9507a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b9507a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9699fd7\" data-id=\"9699fd7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c42602 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7c42602\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-quote-left\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3189152\" data-id=\"3189152\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdce75e elementor-widget elementor-widget-text-editor\" data-id=\"bdce75e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><em>We live in a digitalized age and a society where both private companies and public authorities offer a lot of digital solutions for customers and citizens. The digital possibilities provide great value, many tasks can be solved quickly and easily online. But digitization also brings challenges, as cybercriminals are constantly looking for new opportunities to cheat and deceive.<\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3895f86 elementor-widget elementor-widget-text-editor\" data-id=\"3895f86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><em style=\"font-weight: inherit; color: var( --e-global-color-text ); background-color: var( --e-global-color-astglobalcolor4 );\">Rikke Hougaard Zeberg, Head of the Agency for Digital Government (Denmark)<\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-781ba78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"781ba78\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b0cf92\" data-id=\"9b0cf92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2024178 elementor-widget elementor-widget-heading\" data-id=\"2024178\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">I-Trust's cyber security program is based on CIS 18 controls<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8f9aea elementor-widget elementor-widget-text-editor\" data-id=\"b8f9aea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CIS 18 is the latest version of measures for improving companies&#8217; cyber security. The framework consists of 18 focus areas covering a whole array of precautionary measures organizations should have in place to be protected from cyber threats. The use of the controls can be divided into three groups according to the type and size of the organization.<\/p>\n<p>The controls are mapped to the current cyber threats and thus give the company a picture of its exposure.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d3a7af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d3a7af\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8ce1246\" data-id=\"8ce1246\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f931400 elementor-widget elementor-widget-image\" data-id=\"f931400\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"541\" src=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-700x541.png\" class=\"attachment-large size-large wp-image-4151\" alt=\"\" srcset=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-700x541.png 700w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-300x232.png 300w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-768x594.png 768w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-1536x1188.png 1536w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/Controls-V8-Grid-With-Safeguards-1-1-2048x1584.png 2048w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-86c03f3\" data-id=\"86c03f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d13bca elementor-widget elementor-widget-text-editor\" data-id=\"6d13bca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong style=\"font-size: 16px;\">CIS 18 is structured pragmatically, and forms the basis of efforts in practice:<\/strong><\/p><div class=\"wp-block-column\"><p>&#8211; Cyber security is made measurable<\/p><p>&#8211; Facilitates prioritized initiatives<\/p><p>&#8211; Method that forms the basis for fulfilling best practice.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7ee0a4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ee0a4c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ffc59cc\" data-id=\"ffc59cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75db59e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"75db59e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-quote-left\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65bd1fd\" data-id=\"65bd1fd\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d42d47 elementor-widget elementor-widget-text-editor\" data-id=\"2d42d47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe cyberthreat remains a serious threat to society, and the threat from both cybercrime and cyber espionage is very high. Cyber \u200b\u200bsecurity is absolutely essential for our society, which is completely dependent on digital solutions for the benefit of welfare and prosperity.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-113e84b elementor-widget elementor-widget-text-editor\" data-id=\"113e84b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><em>Thomas Lund-S\u00f8rensen, Head of the Center for Cyber Security (Denmark)<\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-91b0840 elementor-widget elementor-widget-text-editor\" data-id=\"91b0840\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Benefits:<\/strong><\/p><ul><li>Detailed clarification of the company&#8217;s vulnerabilities and cyber security<\/li><\/ul><ul><li>Measuring the company&#8217;s possibilities of working with cyber security<\/li><\/ul><ul><li>Threat assessment of whether the cyber security controls uncover the relevant threats<\/li><\/ul><ul><li>Specific recommendations to reduce vulnerability<\/li><\/ul><p><strong>Excel sheet or SaaS Platform?<\/strong><\/p><p>In the platform enablor, I-Trust has a standardized method for companies&#8217; work with the CIS controls. The platform provides the organization with a central cyber security hub, replacing excel sheets with automated reporting, benchmarking and history capabilities, as well as a wide range of options that provide a clear picture of the organization&#8217;s status and gaps.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96db601 elementor-widget elementor-widget-image\" data-id=\"96db601\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"642\" height=\"299\" src=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/08\/enablor-audit-1.png\" class=\"attachment-medium_large size-medium_large wp-image-4159\" alt=\"\" srcset=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/08\/enablor-audit-1.png 642w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/08\/enablor-audit-1-300x140.png 300w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89a4c97 elementor-widget elementor-widget-text-editor\" data-id=\"89a4c97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The CIS controls are carried out on the I-Trust platform, enablor, with the following functionality available:<\/p>\n<ul>\n<li><strong>Status \u2013 <\/strong>on all cyber security initiatives in the organization<\/li>\n<li><strong>Recommendations<\/strong> \u2013 based on the extensive documentation and guidance in CIS 18<\/li>\n<li><strong>Overview<\/strong> \u2013 of activities, evaluations and follow-ups<\/li>\n<li><strong>Administration \u2013 <\/strong>of controls and units<\/li>\n<li><strong>Activity Center \u2013<\/strong> one place for gathering tasks, follow-ups, and repetitions<\/li>\n<li><strong>History<\/strong> \u2013 status development and historical frame of reference<\/li>\n<li><strong>Benchmark <\/strong>\u2013 comparison with results from other organizations<\/li>\n<li><strong>Reports<\/strong> \u2013 reports to management and functional managers<\/li>\n<li><strong>Analysis module<\/strong> \u2013 BI analyses of status<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6ce8a7 elementor-widget elementor-widget-text-editor\" data-id=\"f6ce8a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Example: One-Pager status report<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6b058 elementor-widget elementor-widget-image\" data-id=\"5f6b058\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"1086\" src=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-768x1086.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4157\" alt=\"\" srcset=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-768x1086.jpg 768w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-212x300.jpg 212w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-495x700.jpg 495w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-1086x1536.jpg 1086w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-1448x2048.jpg 1448w, https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/20949ea9ec6b4ac3999dc17fecb06b0b-0001-scaled.jpg 1811w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a379e72 elementor-widget elementor-widget-text-editor\" data-id=\"a379e72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAutomatic generation of one-pager status report\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2d1daf elementor-widget elementor-widget-text-editor\" data-id=\"d2d1daf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Since 2004, I-Trust has worked with assessments of companies&#8217; compliance and digitalization. The enablor platform is a result of the collected experiences and is developed for efficiently collecting and processing data. I-Trust is an official CIS Controls Supporter, giving our partners access to the controls, as well as a wide range of best practice recommendations. \u00a0<\/p><p><a href=\"https:\/\/itrusta.lt\/en\/contact\/\">Book a no-obligation meeting with one of our consultants,\u00a0<\/a>and get a security overview of your organization&#8217;s overall digital activities with an I-Trust Security Assessment.<\/p><p>Are you already using CIS controls in your organization or on behalf of clients?\u00a0<a href=\"https:\/\/itrusta.lt\/en\/contact\/\" data-type=\"page\" data-id=\"80\">Contact us<\/a> and let&#8217;s find out if we should replace your excel sheets with one unified platform.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We live in a digitalized age and a society where both private companies and public authorities offer a lot of digital solutions for customers and citizens. The digital possibilities provide great value, many tasks can be solved quickly and easily online. But digitization also brings challenges, as cybercriminals are constantly looking for new opportunities to [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":4149,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-4896","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - Itrusta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itrusta.lt\/en\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Itrusta\" \/>\n<meta property=\"og:description\" content=\"We live in a digitalized age and a society where both private companies and public authorities offer a lot of digital solutions for customers and citizens. The digital possibilities provide great value, many tasks can be solved quickly and easily online. But digitization also brings challenges, as cybercriminals are constantly looking for new opportunities to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itrusta.lt\/en\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Itrusta\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-12T22:38:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/\",\"url\":\"https:\/\/itrusta.lt\/en\/cyber-security\/\",\"name\":\"Cyber Security - Itrusta\",\"isPartOf\":{\"@id\":\"https:\/\/itrusta.lt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg\",\"datePublished\":\"2021-02-13T08:15:11+00:00\",\"dateModified\":\"2022-12-12T22:38:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itrusta.lt\/en\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg\",\"contentUrl\":\"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itrusta.lt\/en\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itrusta.lt\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itrusta.lt\/#website\",\"url\":\"https:\/\/itrusta.lt\/\",\"name\":\"Itrusta\",\"description\":\"Compliance within reach\",\"publisher\":{\"@id\":\"https:\/\/itrusta.lt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itrusta.lt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itrusta.lt\/#organization\",\"name\":\"Itrusta\",\"url\":\"https:\/\/itrusta.lt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itrusta.lt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itrusta.lt\/wp-content\/uploads\/2021\/02\/logo.png\",\"contentUrl\":\"https:\/\/itrusta.lt\/wp-content\/uploads\/2021\/02\/logo.png\",\"width\":264,\"height\":88,\"caption\":\"Itrusta\"},\"image\":{\"@id\":\"https:\/\/itrusta.lt\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Itrusta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itrusta.lt\/en\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Itrusta","og_description":"We live in a digitalized age and a society where both private companies and public authorities offer a lot of digital solutions for customers and citizens. The digital possibilities provide great value, many tasks can be solved quickly and easily online. But digitization also brings challenges, as cybercriminals are constantly looking for new opportunities to [&hellip;]","og_url":"https:\/\/itrusta.lt\/en\/cyber-security\/","og_site_name":"Itrusta","article_modified_time":"2022-12-12T22:38:50+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/itrusta.lt\/en\/cyber-security\/","url":"https:\/\/itrusta.lt\/en\/cyber-security\/","name":"Cyber Security - Itrusta","isPartOf":{"@id":"https:\/\/itrusta.lt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg","datePublished":"2021-02-13T08:15:11+00:00","dateModified":"2022-12-12T22:38:50+00:00","breadcrumb":{"@id":"https:\/\/itrusta.lt\/en\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itrusta.lt\/en\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itrusta.lt\/en\/cyber-security\/#primaryimage","url":"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg","contentUrl":"https:\/\/itrusta.lt\/wp-content\/uploads\/2022\/01\/cis.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/itrusta.lt\/en\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itrusta.lt\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/itrusta.lt\/#website","url":"https:\/\/itrusta.lt\/","name":"Itrusta","description":"Compliance within reach","publisher":{"@id":"https:\/\/itrusta.lt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itrusta.lt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itrusta.lt\/#organization","name":"Itrusta","url":"https:\/\/itrusta.lt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itrusta.lt\/#\/schema\/logo\/image\/","url":"https:\/\/itrusta.lt\/wp-content\/uploads\/2021\/02\/logo.png","contentUrl":"https:\/\/itrusta.lt\/wp-content\/uploads\/2021\/02\/logo.png","width":264,"height":88,"caption":"Itrusta"},"image":{"@id":"https:\/\/itrusta.lt\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/pages\/4896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/comments?post=4896"}],"version-history":[{"count":12,"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/pages\/4896\/revisions"}],"predecessor-version":[{"id":6269,"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/pages\/4896\/revisions\/6269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/media\/4149"}],"wp:attachment":[{"href":"https:\/\/itrusta.lt\/en\/wp-json\/wp\/v2\/media?parent=4896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}