The search found 3835 results.
INFOSISTEM is the leading regional system-integrator and a company with extensive experience in information technology, whose origins date back to 1959. Thanks to knowledge and experience of its professionals, INFOSISTEM became a natural choice and a stable backbone of many large business systems. We use cutting-edge technology like Imprivata in all the areas we work in so that we can design and implement the very best and secure systems for our clients.
Our reference list shows our presence not only in the Republic of Croatia, but also in the entire region.
Blog Post
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Blog Post
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Blog Post
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
Blog Post
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Blog Post
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Blog Post
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Blog Post
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Blog Post
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.
Blog Post
In May 2019, the American Medical Collection Agency (AMCA), a "business associate" of a number of healthcare providers, reported an eight-month data breach had exposed sensitive information for more than 20 million patients.