{"id":5957,"date":"2026-04-29T13:42:57","date_gmt":"2026-04-29T11:42:57","guid":{"rendered":"https:\/\/tenesys.io\/?p=5957"},"modified":"2026-05-05T13:47:41","modified_gmt":"2026-05-05T11:47:41","slug":"security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks","status":"publish","type":"post","link":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/","title":{"rendered":"Security of cloud environments in the context of NIS2\/KSC and DORA regulations \u2013 how to avoid risks?"},"content":{"rendered":"<style>.kb-row-layout-id5957_034cd7-12 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_034cd7-12 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_034cd7-12 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-xl, 4rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_034cd7-12{border-top:0px solid var(--global-palette6, #718096);}.kb-row-layout-id5957_034cd7-12 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_034cd7-12 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 1024px){.kb-row-layout-id5957_034cd7-12{border-top:0px solid var(--global-palette6, #718096);}}@media all and (max-width: 767px){.kb-row-layout-id5957_034cd7-12 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_034cd7-12{border-top:0px solid var(--global-palette6, #718096);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_034cd7-12 alignnone tenesys-menu-and-content-wrapper wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{box-shadow:0px 0px 10px 0px rgba(30, 30, 30, 0.05);border-top:0px solid #e6e6e6;border-right:0px solid #e6e6e6;border-bottom:0px solid #e6e6e6;border-left:0px solid #e6e6e6;}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col,.kadence-column5957_02a4d6-2b > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{background-color:var(--global-palette9, #ffffff);}.kadence-column5957_02a4d6-2b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_02a4d6-2b{position:relative;}.kadence-column5957_02a4d6-2b, .kt-inside-inner-col > .kadence-column5957_02a4d6-2b:not(.specificity){margin-top:0px;}@media all and (max-width: 1024px){.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{border-top:0px solid #e6e6e6;border-right:0px solid #e6e6e6;border-bottom:0px solid #e6e6e6;border-left:0px solid #e6e6e6;flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_02a4d6-2b > .kt-inside-inner-col{border-top:0px solid #e6e6e6;border-right:0px solid #e6e6e6;border-bottom:0px solid #e6e6e6;border-left:0px solid #e6e6e6;flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_02a4d6-2b kvs-md-false kvs-sm-false tenesys-desktop-internal-menu\"><div class=\"kt-inside-inner-col\"><style>.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-contents-title-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-contents-title{font-weight:regular;font-style:normal;}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-wrap .kb-table-of-content-list{color:var(--global-palette5, #4A5568);font-size:12px;font-weight:500;font-style:normal;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-wrap .kb-table-of-content-list .kb-table-of-contents__entry:hover{color:var(--global-palette4, #2D3748);}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-wrap .kb-table-of-content-list .active > .kb-table-of-contents__entry{color:var(--global-palette3, #1A202C);}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-list li{margin-bottom:12px;}.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-list li .kb-table-of-contents-list-sub{margin-top:12px;}@media all and (max-width: 1024px){.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-wrap .kb-table-of-content-list{font-size:14px;}}@media all and (max-width: 1024px){.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-list li{margin-bottom:16px;}}@media all and (max-width: 1024px){.kb-table-of-content-nav.kb-table-of-content-id5957_c94495-5e .kb-table-of-content-list li .kb-table-of-contents-list-sub{margin-top:16px;}}<\/style><\/div><\/div>\n\n\n<style>.kadence-column5957_4a4712-ad > .kt-inside-inner-col,.kadence-column5957_4a4712-ad > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_4a4712-ad > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_4a4712-ad > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_4a4712-ad > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_4a4712-ad > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_4a4712-ad{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_4a4712-ad > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_4a4712-ad > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_4a4712-ad\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_14cd58-00{margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);}.kb-row-layout-id5957_14cd58-00 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_14cd58-00 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_14cd58-00 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:50%;margin-left:auto;margin-right:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_14cd58-00 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_14cd58-00 > .kt-row-column-wrap{max-width:70%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_14cd58-00{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id5957_14cd58-00 > .kt-row-column-wrap{max-width:98%;margin-left:auto;margin-right:auto;padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_14cd58-00 alignnone tenesys-section-small-width-on-desktop wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{padding-top:0px;}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col,.kadence-column5957_adcaf4-6b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_adcaf4-6b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_adcaf4-6b{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_adcaf4-6b > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_adcaf4-6b\"><div class=\"kt-inside-inner-col\">\n<p><strong>Migration to cloud computing has become a key element of digital transformation for companies in Europe. Organizations are increasingly moving their applications, data, and operational processes to cloud environments, taking advantage of their flexibility and scalability. However, the growing dependence on cloud services also involves new threats \u2013 cyberattacks, data breaches, and non-compliance with IT regulations. <\/strong><\/p>\n\n\n\n<p><strong>To regulate these issues, the European Union has introduced the NIS2 directive (implemented in Poland as the Act on the National Cybersecurity System \u2013 KSC) and the DORA regulation, which impose new obligations on companies regarding digital security, risk monitoring, and incident reporting. Is cloud computing truly fully secure? How to avoid risks resulting from cyberattacks and how to adapt IT strategy to NIS2, KSC, and DORA to ensure regulatory compliance?<br><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>NIS2\/KSC and DORA regulations \u2013 key requirements for organizations using the cloud<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. NIS2 Directive and KSC \u2013 security of critical infrastructure and cloud providers<\/strong><\/h3>\n\n\n\n<p>The NIS2 directive introduces new obligations for cloud service providers, IT companies, and essential and important entities. Its goal is to increase cyber resilience across the EU and minimize the impact of cyberattacks.<\/p>\n\n\n\n<p><strong>According to NIS2:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud service providers are subject to new security regulations and incident reporting obligations.<\/li>\n\n\n\n<li>Companies using the cloud must implement cybersecurity strategies, including threat monitoring and incident management.<\/li>\n\n\n\n<li>The National Cybersecurity System (KSC) in Poland will enforce the regulations and supervise the entities subject to the directive.<\/li>\n<\/ul>\n\n\n\n<p><strong>Market example:<\/strong> In December 2023, cybercriminals attacked <a href=\"https:\/\/itwiz.pl\/polska-pnie-sie-w-gore-wsrod-glownych-celow-atakow-ransomware-na-swiecie\/\">Scania Polska and Scania Finance Polska<\/a>, encrypting personal data and restricting access to it. This attack had serious operational and financial consequences for the company, forcing it to implement advanced remediation procedures and data recovery.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. DORA \u2013 digital resilience of the financial sector<\/strong><\/h3>\n\n\n\n<p>The DORA regulation (Digital Operational Resilience Act) entered into force on January 17, 2025, and covers financial institutions such as banks, fintechs, insurers, entities related to crypto-assets, and electronic money institutions.<\/p>\n\n\n\n<p><strong>New requirements include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An obligation to manage IT risk in financial institutions.<\/li>\n\n\n\n<li>Monitoring of cloud providers to prevent threats resulting from IT infrastructure outsourcing.<\/li>\n\n\n\n<li>Regular testing of IT system resilience, which means the necessity of conducting cyberattack simulations and security audits.<\/li>\n<\/ul>\n\n\n\n<p><strong>Market example:<\/strong> In January 2024, the<a href=\"https:\/\/www.google.com\/search?q=https:\/\/businessinsider.com.pl\/technologie\/nowe-technologie\/tysiace-ofiar-stracily-pieniadze-rok-2023-rekordowy-pod-wzgledem-cyberatakow\/xhs8rgw%3F&amp;authuser=1\"> British company Royal Mail fell victim to a ransomware attack<\/a> carried out by the LockBit group. The attack affected a distribution center in Northern Ireland, preventing international deliveries and forcing the company to seek alternative logistics solutions..<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column5957_2691f7-61 > .kt-inside-inner-col,.kadence-column5957_2691f7-61 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_2691f7-61 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_2691f7-61 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_2691f7-61 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_2691f7-61 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_2691f7-61{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_2691f7-61 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_2691f7-61 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_2691f7-61\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_1a95a3-8c{margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);}.kb-row-layout-id5957_1a95a3-8c > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_1a95a3-8c > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_1a95a3-8c > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:50%;margin-left:auto;margin-right:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_1a95a3-8c > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_1a95a3-8c > .kt-row-column-wrap{max-width:70%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_1a95a3-8c{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id5957_1a95a3-8c > .kt-row-column-wrap{max-width:98%;margin-left:auto;margin-right:auto;padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_1a95a3-8c alignnone tenesys-section-small-width-on-desktop wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_db66c0-fb > .kt-inside-inner-col{padding-top:0px;}.kadence-column5957_db66c0-fb > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);}.kadence-column5957_db66c0-fb > .kt-inside-inner-col,.kadence-column5957_db66c0-fb > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_db66c0-fb > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_db66c0-fb > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_db66c0-fb > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_db66c0-fb > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_db66c0-fb{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_db66c0-fb > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_db66c0-fb > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_db66c0-fb\"><div class=\"kt-inside-inner-col\">\n<h2 class=\"wp-block-heading\"><strong>Main threats related to cloud security<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Unauthorized access and data breaches<\/strong><\/h3>\n\n\n\n<p>Lack of Identity and Access Management (IAM) and permission control can lead to customer data theft, GDPR violations, and financial losses.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To prevent such situations, organizations should implement multi-factor authentication (MFA), segregation of access and permissions, and user activity monitoring.<\/li>\n\n\n\n<li>Furthermore, it is crucial to use Identity and Access Management (IAM) systems and SIEM (Security Information and Event Management) tools to detect anomalies and respond quickly to security incidents.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Ransomware attacks and internal threats<\/strong><\/h3>\n\n\n\n<p>Hackers are increasingly using ransomware attacks on cloud systems, encrypting data and demanding a ransom. Organizations should implement advanced security systems, such as XDR (eXtended Detection and Response) or EDR (Endpoint Detection and Response), as well as regular offline and offsite backups, to minimize the risk of data loss and ensure quick system restoration after an attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Downtime and lack of a contingency plan<\/strong><\/h3>\n\n\n\n<p>Although a complete shutdown of cloud services is rare, incidents limiting the availability of certain functions do occur. An example is the Microsoft system failure in January 2024, which caused difficulties with logging in and accessing applications based on <a href=\"https:\/\/www.google.com\/search?q=https:\/\/www.gospodarkamorska.pl\/awaria-systemow-microsoft-nie-wplynela-na-infrastrukture-krytyczna-w-polsce-79351%3F&amp;authuser=1\">Microsoft Azure and Microsoft 365<\/a>. Organizations should implement multi-cloud strategies, data redundancy, and hybrid backups to ensure operational continuity and minimize the effects of temporary provider issues.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column5957_0221e5-f7 > .kt-inside-inner-col,.kadence-column5957_0221e5-f7 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_0221e5-f7 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_0221e5-f7 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_0221e5-f7 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_0221e5-f7 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_0221e5-f7{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_0221e5-f7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_0221e5-f7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_0221e5-f7\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_74e8c6-6f{margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);}.kb-row-layout-id5957_74e8c6-6f > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_74e8c6-6f > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_74e8c6-6f > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:50%;margin-left:auto;margin-right:auto;padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_74e8c6-6f > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_74e8c6-6f > .kt-row-column-wrap{max-width:70%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_74e8c6-6f{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id5957_74e8c6-6f > .kt-row-column-wrap{max-width:100%;margin-left:auto;margin-right:auto;padding-right:0px;padding-left:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_74e8c6-6f{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_74e8c6-6f alignnone tenesys-section-small-width-on-desktop wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col,.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col:before{border-top-left-radius:4px;border-top-right-radius:4px;border-bottom-right-radius:4px;border-bottom-left-radius:4px;}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{background-image:linear-gradient(180deg,var(--global-palette1) 0%,var(--global-palette1) 86%,var(--global-palette2) 86%);}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_eeaea1-c7{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-md, 2rem);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);flex-direction:column;justify-content:center;}.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col,.kadence-column5957_eeaea1-c7 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_eeaea1-c7 kb-section-dir-vertical tenesys-block-bg-blue-navy bg-not-equal\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77, .wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77[data-kb-block=\"kb-adv-heading5957_13099a-77\"]{display:block;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77[data-kb-block=\"kb-adv-heading5957_13099a-77\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_13099a-77[data-kb-block=\"kb-adv-heading5957_13099a-77\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<span class=\"kt-adv-heading5957_13099a-77 eyebrow wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading5957_13099a-77\">our service<\/span>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92, .wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92[data-kb-block=\"kb-adv-heading5957_1227fe-92\"]{margin-top:0px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92[data-kb-block=\"kb-adv-heading5957_1227fe-92\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_1227fe-92[data-kb-block=\"kb-adv-heading5957_1227fe-92\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading5957_1227fe-92 toc-ignore wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading5957_1227fe-92\">Build a cloud secure from the ground up<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32, .wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32[data-kb-block=\"kb-adv-heading5957_3382d2-32\"]{display:block;margin-bottom:var(--global-kb-spacing-xl, 4rem);font-size:20px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32[data-kb-block=\"kb-adv-heading5957_3382d2-32\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_3382d2-32[data-kb-block=\"kb-adv-heading5957_3382d2-32\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<span class=\"kt-adv-heading5957_3382d2-32 wp-block-kadence-advancedheading has-kb-palette-6-color has-text-color\" data-kb-block=\"kb-adv-heading5957_3382d2-32\">Default settings and broad IAM roles cause most breaches. Our security by design architecture with CSPM and zero trust stops risks before they even exist.<\/span>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns5957_c28c8d-dc{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns5957_c28c8d-dc .kt-button{font-weight:normal;font-style:normal;}.kt-btns5957_c28c8d-dc .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns5957_c28c8d-dc .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns5957_c28c8d-dc\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn5957_81182b-98.kb-button{width:initial;}<\/style><a class=\"kb-button kt-button button kb-btn5957_81182b-98 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit button-style-secondary kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/tenesys.io\/en\/services\/cloud-and-infrastructure-security\/%20\"><span class=\"kt-btn-inner-text\">Cloud and infrastructure security<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column5957_b6f094-fd > .kt-inside-inner-col,.kadence-column5957_b6f094-fd > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_b6f094-fd > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_b6f094-fd > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_b6f094-fd > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_b6f094-fd > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_b6f094-fd{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_b6f094-fd > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_b6f094-fd > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_b6f094-fd\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_304c1e-4a{margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);}.kb-row-layout-id5957_304c1e-4a > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_304c1e-4a > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_304c1e-4a > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:50%;margin-left:auto;margin-right:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_304c1e-4a > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_304c1e-4a > .kt-row-column-wrap{max-width:70%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_304c1e-4a{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id5957_304c1e-4a > .kt-row-column-wrap{max-width:98%;margin-left:auto;margin-right:auto;padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_304c1e-4a alignnone tenesys-section-small-width-on-desktop wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_250a6e-78 > .kt-inside-inner-col{padding-top:0px;}.kadence-column5957_250a6e-78 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);}.kadence-column5957_250a6e-78 > .kt-inside-inner-col,.kadence-column5957_250a6e-78 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_250a6e-78 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_250a6e-78 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_250a6e-78 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_250a6e-78 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_250a6e-78{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_250a6e-78 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_250a6e-78 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_250a6e-78\"><div class=\"kt-inside-inner-col\">\n<h2 class=\"wp-block-heading\"><strong>How to avoid risks and secure cloud, hybrid, and on-premise systems?<\/strong><\/h2>\n\n\n\n<p>To ensure regulatory compliance and avoid threats, companies should implement integrated security strategies covering the cloud, hybrid environments, and on-premise infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Incident management automation<\/strong><\/h3>\n\n\n\n<p>Automation of security processes allows for faster detection and response to threats in cloud environments. SIEM systems collect and analyze logs from various sources, enabling the identification of suspicious activities, while XDR integrates data from multiple systems for more effective detection and neutralization of attacks. Implementing these tools allows organizations to reduce incident response time, minimize losses, and improve the overall resilience of IT systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Cloud provider management and compliance audits<\/strong><\/h3>\n\n\n\n<p>Regular auditing of IT providers allows ensuring compliance with NIS2 and DORA regulations, minimizing risks related to IT service outsourcing and cloud usage. Organizations should periodically verify security measures applied by providers, analyze their risk management procedures, and mechanisms for detecting and responding to incidents. It is also key to check whether providers follow cybersecurity best practices and if their infrastructure meets requirements regarding business continuity and data protection. Implementing regular audits and SLAs (Service Level Agreements) allows for better control over IT system security and a reduction in operational risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Hybrid approach to backups and redundancy<\/strong><\/h3>\n\n\n\n<p>Companies should implement multi-cloud strategies as well as offline and offsite backups to protect against failures, cyberattacks, and data loss. Data redundancy in various environments (public cloud, private cloud, on-premise infrastructure) increases system resilience to downtime and enables fast service restoration in the event of an incident. Additionally, regular offline backups protect against the effects of ransomware attacks and ensure data availability even in the event of a cloud service provider failure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Zero Trust model \u2013 no default trust<\/strong><\/h3>\n\n\n\n<p>The Zero Trust model assumes that no user or system is trusted by default, and access to IT resources must be verified at every stage. To effectively implement this approach, organizations should use multi-factor authentication (MFA), network segmentation, and the principle of Least Privilege Access. It is also crucial to continuously monitor user activity and analyze risk using SIEM, XDR, and IAM tools to quickly detect and block potential threats.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column5957_3454b7-52 > .kt-inside-inner-col,.kadence-column5957_3454b7-52 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_3454b7-52 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_3454b7-52 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_3454b7-52 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_3454b7-52 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_3454b7-52{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_3454b7-52 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_3454b7-52 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_3454b7-52\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_852b0a-5e{margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);}.kb-row-layout-id5957_852b0a-5e > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_852b0a-5e > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_852b0a-5e > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:50%;margin-left:auto;margin-right:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_852b0a-5e > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_852b0a-5e > .kt-row-column-wrap{max-width:70%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_852b0a-5e{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}.kb-row-layout-id5957_852b0a-5e > .kt-row-column-wrap{max-width:98%;margin-left:auto;margin-right:auto;padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_852b0a-5e alignnone tenesys-section-small-width-on-desktop wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{padding-top:0px;}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col,.kadence-column5957_f65ecf-16 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_f65ecf-16 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_f65ecf-16{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_f65ecf-16 > .kt-inside-inner-col{border-top:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_f65ecf-16\"><div class=\"kt-inside-inner-col\">\n<h2 class=\"wp-block-heading\"><strong>Summary: Is your company ready for the new regulations?<\/strong><\/h2>\n\n\n\n<p>Cyberattacks have become a daily occurrence, and their number is growing every year. Particularly dangerous are the actions of hacker groups supported by hostile states, which increasingly conduct coordinated cyberattacks on key sectors of the economy, financial institutions, and critical infrastructure. In the face of growing threats, companies must not only meet regulatory requirements but also actively strengthen their digital resilience. <\/p>\n\n\n\n<p>New regulations, such as NIS2 and DORA, force regular IT provider audits and incident management automation, which allows for better protection of systems against cyberattacks and data breaches. Furthermore, multi-cloud strategies, offline backups, and redundancy mechanisms increase company resilience to failures and ransomware attacks.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column5957_6797dc-09 > .kt-inside-inner-col,.kadence-column5957_6797dc-09 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_6797dc-09 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_6797dc-09 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_6797dc-09 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_6797dc-09 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_6797dc-09{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_6797dc-09 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_6797dc-09 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_6797dc-09\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n\n<style>.kadence-column5957_de165d-6c > .kt-inside-inner-col,.kadence-column5957_de165d-6c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_de165d-6c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_de165d-6c > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_de165d-6c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_de165d-6c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_de165d-6c{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_de165d-6c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_de165d-6c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_de165d-6c\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:78%;margin-left:auto;margin-right:auto;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-column-wrap{max-width:90%;margin-left:auto;margin-right:auto;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id5957_7b2bd8-a6 > .kt-row-column-wrap{max-width:98%;margin-left:auto;margin-right:auto;padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_7b2bd8-a6 alignnone has-theme-palette1-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column5957_0a60da-ee > .kt-inside-inner-col{padding-top:40px;padding-bottom:190px;}.kadence-column5957_0a60da-ee > .kt-inside-inner-col,.kadence-column5957_0a60da-ee > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_0a60da-ee > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_0a60da-ee > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_0a60da-ee > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_0a60da-ee > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_0a60da-ee{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_0a60da-ee > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_0a60da-ee > .kt-inside-inner-col{padding-top:20px;padding-bottom:180px;flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_0a60da-ee\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36, .wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36[data-kb-block=\"kb-adv-heading5957_f8c32a-36\"]{margin-top:var(--global-kb-spacing-xxs, 0.5rem);font-size:30px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36[data-kb-block=\"kb-adv-heading5957_f8c32a-36\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36[data-kb-block=\"kb-adv-heading5957_f8c32a-36\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36, .wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36[data-kb-block=\"kb-adv-heading5957_f8c32a-36\"]{font-size:36px;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36, .wp-block-kadence-advancedheading.kt-adv-heading5957_f8c32a-36[data-kb-block=\"kb-adv-heading5957_f8c32a-36\"]{font-size:32px;}}<\/style>\n<p class=\"kt-adv-heading5957_f8c32a-36 toc-ignore wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading5957_f8c32a-36\"><em>Does your organization possess the appropriate data protection, threat monitoring, and IT risk management mechanisms? If not, it is high time to implement effective security strategies to avoid sanctions, financial losses, and operational threats that will only grow due to the dynamic geopolitical situation.<\/em><\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_606078-24{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id5957_606078-24 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_606078-24 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_606078-24 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-none, 0rem );max-width:670px;margin-left:auto;margin-right:auto;padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id5957_606078-24 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_606078-24 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id5957_606078-24 > .kt-row-column-wrap{padding-right:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_606078-24 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full\">\n<style>.kadence-column5957_be25ca-18 > .kt-inside-inner-col,.kadence-column5957_be25ca-18 > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:8px;}.kadence-column5957_be25ca-18 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_be25ca-18 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_be25ca-18 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_be25ca-18 > .kt-inside-inner-col{background-image:url('https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/Bartosz-1-2600px-scaled.jpg');background-size:cover;background-position:center center;background-attachment:scroll;background-repeat:no-repeat;}.kadence-column5957_be25ca-18 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_be25ca-18{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_be25ca-18 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_be25ca-18 > .kt-inside-inner-col,.kadence-column5957_be25ca-18 > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_be25ca-18 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_be25ca-18\"><div class=\"kt-inside-inner-col\"><style>.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col,.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_46c5c1-b3{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_46c5c1-b3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_46c5c1-b3 kvs-lg-false kvs-md-false\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column5957_4ade88-5e > .kt-inside-inner-col{display:flex;}.kadence-column5957_4ade88-5e > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kadence-column5957_4ade88-5e > .kt-inside-inner-col,.kadence-column5957_4ade88-5e > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:0px;}.kadence-column5957_4ade88-5e > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}.kadence-column5957_4ade88-5e > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column5957_4ade88-5e{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}.kadence-column5957_4ade88-5e > .kt-inside-inner-col{background-color:var(--global-palette3, #1A202C);}.kadence-column5957_4ade88-5e > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_4ade88-5e{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column5957_4ade88-5e{align-self:center;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}}@media all and (max-width: 1024px){.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}}@media all and (max-width: 767px){.kadence-column5957_4ade88-5e > .kt-inside-inner-col,.kadence-column5957_4ade88-5e > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kt-row-column-wrap > .kadence-column5957_4ade88-5e{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}.kadence-column5957_4ade88-5e > .kt-inside-inner-col{flex-direction:column;justify-content:space-between;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_4ade88-5e\"><div class=\"kt-inside-inner-col\"><style>.kadence-column5957_7025ec-db > .kt-inside-inner-col,.kadence-column5957_7025ec-db > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_7025ec-db > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_7025ec-db > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_7025ec-db > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_7025ec-db > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_7025ec-db{position:relative;}.kadence-column5957_7025ec-db, .kt-inside-inner-col > .kadence-column5957_7025ec-db:not(.specificity){margin-bottom:var(--global-kb-spacing-sm, 1.5rem);}@media all and (max-width: 1024px){.kadence-column5957_7025ec-db > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_7025ec-db > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_7025ec-db\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32, .wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32[data-kb-block=\"kb-adv-heading5957_62004e-32\"]{margin-bottom:var(--global-kb-spacing-md, 2rem);font-size:12px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32[data-kb-block=\"kb-adv-heading5957_62004e-32\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_62004e-32[data-kb-block=\"kb-adv-heading5957_62004e-32\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading5957_62004e-32 eyebrow toc-ignore wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading5957_62004e-32\">Author<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c, .wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c[data-kb-block=\"kb-adv-heading5957_5f7217-4c\"]{margin-top:0px;margin-bottom:var(--global-kb-spacing-xxs, 0.5rem);font-size:24px;font-weight:300;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c[data-kb-block=\"kb-adv-heading5957_5f7217-4c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c[data-kb-block=\"kb-adv-heading5957_5f7217-4c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c, .wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c[data-kb-block=\"kb-adv-heading5957_5f7217-4c\"]{font-size:23px;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c, .wp-block-kadence-advancedheading.kt-adv-heading5957_5f7217-4c[data-kb-block=\"kb-adv-heading5957_5f7217-4c\"]{font-size:22px;}}<\/style>\n<h3 class=\"kt-adv-heading5957_5f7217-4c toc-ignore wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading5957_5f7217-4c\">Bartosz Pyrczak<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c, .wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c[data-kb-block=\"kb-adv-heading5957_6a6408-5c\"]{margin-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:24px;font-weight:300;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c[data-kb-block=\"kb-adv-heading5957_6a6408-5c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c[data-kb-block=\"kb-adv-heading5957_6a6408-5c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c, .wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c[data-kb-block=\"kb-adv-heading5957_6a6408-5c\"]{font-size:23px;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c, .wp-block-kadence-advancedheading.kt-adv-heading5957_6a6408-5c[data-kb-block=\"kb-adv-heading5957_6a6408-5c\"]{font-size:22px;}}<\/style>\n<h3 class=\"kt-adv-heading5957_6a6408-5c toc-ignore wp-block-kadence-advancedheading has-theme-palette-5-color has-text-color\" data-kb-block=\"kb-adv-heading5957_6a6408-5c\">Head of Growth<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b, .wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b[data-kb-block=\"kb-adv-heading5957_3676a9-4b\"]{font-size:14px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b[data-kb-block=\"kb-adv-heading5957_3676a9-4b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_3676a9-4b[data-kb-block=\"kb-adv-heading5957_3676a9-4b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5957_3676a9-4b wp-block-kadence-advancedheading has-kb-palette-10-color has-text-color\" data-kb-block=\"kb-adv-heading5957_3676a9-4b\">Head of Growth at Tenesys. Connects people, builds relationships, and ensures the company grows in the right direction. Convinced that in IT sales, the one who listens better than they speak wins. Privately a traveler and cyclist.   <\/p>\n<\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6, .wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"]{font-size:12px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] img.kb-inline-image{width:150px;vertical-align:baseline;}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] a, .kt-adv-heading-link5957_2ccf3c-d6, .kt-adv-heading-link5957_2ccf3c-d6 .kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"]{color:var(--global-palette7, #EDF2F7);}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] a:hover, .kt-adv-heading-link5957_2ccf3c-d6:hover, .kt-adv-heading-link5957_2ccf3c-d6:hover .kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"]{color:var(--global-palette7, #EDF2F7);}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] a, a.kb-advanced-heading-link.kt-adv-heading-link5957_2ccf3c-d6{text-decoration:underline;}.wp-block-kadence-advancedheading.kt-adv-heading5957_2ccf3c-d6[data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\"] a:hover, a.kb-advanced-heading-link.kt-adv-heading-link5957_2ccf3c-d6:hover{text-decoration:underline;}<\/style>\n<a href=\"https:\/\/www.linkedin.com\/in\/bartosz-pyrczak\/\" class=\"kb-advanced-heading-link kt-adv-heading-link5957_2ccf3c-d6 hls-underline\" target=\"_blank\" rel=\"noopener noreferrer\"><p class=\"kt-adv-heading5957_2ccf3c-d6 wp-block-kadence-advancedheading has-theme-palette-7-color has-text-color\" data-kb-block=\"kb-adv-heading5957_2ccf3c-d6\">Linkedin<\/p><\/a>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id5957_81deec-d1{margin-bottom:var(--global-kb-spacing-lg, 3rem);}.kb-row-layout-id5957_81deec-d1 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id5957_81deec-d1 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id5957_81deec-d1 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1600px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id5957_81deec-d1 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id5957_81deec-d1 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id5957_81deec-d1 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id5957_81deec-d1 alignnone tenesys-block-recommended-articles wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{border-top:1px solid var(--global-palette6, #718096);border-right:0px solid var(--global-palette6, #718096);border-bottom:0px solid var(--global-palette6, #718096);border-left:0px solid var(--global-palette6, #718096);}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col,.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_1d4bd5-75{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{border-top:1px solid var(--global-palette6, #718096);border-right:0px solid var(--global-palette6, #718096);border-bottom:0px solid var(--global-palette6, #718096);border-left:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_1d4bd5-75 > .kt-inside-inner-col{border-top:1px solid var(--global-palette6, #718096);border-right:0px solid var(--global-palette6, #718096);border-bottom:0px solid var(--global-palette6, #718096);border-left:0px solid var(--global-palette6, #718096);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_1d4bd5-75\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81, .wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81[data-kb-block=\"kb-adv-heading5957_c98e32-81\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81[data-kb-block=\"kb-adv-heading5957_c98e32-81\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5957_c98e32-81[data-kb-block=\"kb-adv-heading5957_c98e32-81\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading5957_c98e32-81 toc-ignore wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading5957_c98e32-81\">Przeczytaj r\u00f3wnie\u017c<\/h2>\n<\/div><\/div>\n\n\n<style>.kadence-column5957_fcd710-85 > .kt-inside-inner-col,.kadence-column5957_fcd710-85 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column5957_fcd710-85 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column5957_fcd710-85 > .kt-inside-inner-col{flex-direction:column;}.kadence-column5957_fcd710-85 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column5957_fcd710-85 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column5957_fcd710-85{position:relative;}@media all and (max-width: 1024px){.kadence-column5957_fcd710-85 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column5957_fcd710-85 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column5957_fcd710-85\"><div class=\"kt-inside-inner-col\"><style>.kt-post-loop5957_1bbee7-d5 .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kadence-post-image img{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kt-post-loop5957_1bbee7-d5 .kt-post-grid-wrap{gap:30px 80px;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;overflow:hidden;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:1rem;padding-right:1.5rem;padding-bottom:1rem;padding-left:0rem;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item .entry-title{color:var(--global-palette3, #1A202C);padding-top:10px;padding-right:0px;padding-bottom:5px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:20px;line-height:30px;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item .kt-blocks-post-top-meta{color:#777777;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item .kt-blocks-post-top-meta a{color:#777777;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-grid-item .kt-blocks-post-top-meta a:hover{color:#444444;}.kt-post-loop5957_1bbee7-d5 .entry-content{color:var(--global-palette5, #4A5568);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:14px;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-footer{color:var(--global-palette5, #4A5568);border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:20px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:12px;}.kt-post-loop5957_1bbee7-d5 .entry-content:after{height:20px;}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-footer a{color:var(--global-palette5, #4A5568);}.kt-post-loop5957_1bbee7-d5 .kt-blocks-post-footer a:hover{color:var(--global-palette5, #4A5568);}.kt-post-loop5957_1bbee7-d5 .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}.kt-post-loop5957_1bbee7-d5.kt-post-grid-layout-carousel .kb-post-grid-pause-button{color:#fff;background-color:rgba(0, 0, 0, 0.5);border:1px solid transparent;}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop5957_1bbee7-d5 kt-post-grid-layout-carousel kadence-splide-wrap \"><div class=\"kt-post-grid-layout-carousel-wrap splide kt-carousel-arrowstyle-none kt-carousel-dotstyle-none kb-slider-group-arrow kb-slider-arrow-position-center\" data-columns-xxl=\"3\" data-columns-xl=\"3\" data-columns-md=\"3\" data-columns-sm=\"2\" data-columns-xs=\"1\" data-columns-ss=\"1\" data-slider-anim-speed=\"400\" data-slider-scroll=\"1\" data-slider-dots=\"false\" data-slider-arrows=\"false\" data-slider-hover-pause=\"false\" data-slider-auto=\"false\"  data-slider-auto-scroll=\"false\" data-slider-speed=\"7000\" data-slider-gap=\"80\" data-slider-gap-tablet=\"80\" data-slider-gap-mobile=\"80\" data-slider-gap-unit=\"px\" data-show-pause-button=\"false\" data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><div class=\"kadence-splide-slider-init splide__track\"><ul class=\"kadence-splide-slider-wrap kt-post-grid-wrap\" data-columns-xxl=\"3\" data-columns-xl=\"3\" data-columns-md=\"3\" data-columns-sm=\"2\" data-columns-xs=\"1\" data-columns-ss=\"1\"><li class=\"kt-post-slider-item post-6796 post type-post status-publish format-standard has-post-thumbnail hentry category-manufacturing-industrial kategoria-uslugi-artykul-devops-automation kategoria-uslugi-artykul-infrastructure-cloudservices\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top kb-post-footer-bottom-align\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-100\" style=\"padding-bottom:100%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/tenesys.io\/en\/blog\/cloud-strategy-for-manufacturing-how-to-store-iot-data-without-burning-the-margin\/\" aria-label=\"Cloud Strategy for Manufacturing: how to Store IoT Data Without Burning the Margin?\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production-1024x1024.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production-1024x1024.png 1024w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production-300x300.png 300w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production-150x150.png 150w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production-768x768.png 768w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/cloud_strategy_production.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h3 class=\"entry-title\"><a href=\"https:\/\/tenesys.io\/en\/blog\/cloud-strategy-for-manufacturing-how-to-store-iot-data-without-burning-the-margin\/\">Cloud Strategy for Manufacturing: how to Store IoT Data Without Burning the Margin?<\/a><\/h3><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">The factory floor generates a tidal wave of information that promised to revolutionize OEE (Overall Equipment Effectiveness). Yet, for many manufacturers, the reality of Industry 4.0 has arrived as a ballooning line item on the monthly budget. When every vibration sensor and temperature probe sends raw data directly to the cloud, storage costs can quickly&#8230;<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><div class=\"kt-blocks-date kt-blocks-post-footer-section\"><time dateTime=\"11 May 2026\" class=\"kt-blocks-post-date\">11 May 2026<\/time><\/div><div class=\"kt-blocks-categories kt-blocks-post-footer-section\"><span class=\"kt-blocks-tags-icon\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"kt-blocks-cat-svg\" fill=\"currentColor\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\"><title>Categories<\/title>\n\t\t\t<path d=\"M0 10h32l-2 20h-28l-2-20zM29 6l1 2h-28l2-4h11l1 2h13z\"><\/path><\/svg><\/span><a href=\"https:\/\/tenesys.io\/en\/blog\/category\/manufacturing-industrial\/\" rel=\"category tag\">Manufacturing &amp; Industrial<\/a><\/div><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/li><li class=\"kt-post-slider-item post-6686 post type-post status-publish format-standard has-post-thumbnail hentry category-manufacturing-industrial kategoria-uslugi-artykul-devops-automation kategoria-uslugi-artykul-security-compliance\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top kb-post-footer-bottom-align\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-100\" style=\"padding-bottom:100%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/tenesys.io\/en\/blog\/industrial-cybersecurity-guide-how-to-secure-it-ot-convergence-without-stopping-production\/\" aria-label=\"Industrial Cybersecurity Guide \u2013 how to Secure IT\/OT Convergence Without Stopping Production?\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security-1024x1024.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security-1024x1024.png 1024w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security-300x300.png 300w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security-150x150.png 150w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security-768x768.png 768w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/industrial_security.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h3 class=\"entry-title\"><a href=\"https:\/\/tenesys.io\/en\/blog\/industrial-cybersecurity-guide-how-to-secure-it-ot-convergence-without-stopping-production\/\">Industrial Cybersecurity Guide \u2013 how to Secure IT\/OT Convergence Without Stopping Production?<\/a><\/h3><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Modern manufacturing operates under a contradictory pressure: the board demands data transparency, while the shop floor requires physical isolation to keep machines running In the era of Industry 4.0, the &#8220;Air Gap&#8221; is a myth. Cyber-Physical Systems (CPS) now link software directly to hardware, meaning a single digital bug can lead to broken gears or&#8230;<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><div class=\"kt-blocks-date kt-blocks-post-footer-section\"><time dateTime=\"11 May 2026\" class=\"kt-blocks-post-date\">11 May 2026<\/time><\/div><div class=\"kt-blocks-categories kt-blocks-post-footer-section\"><span class=\"kt-blocks-tags-icon\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"kt-blocks-cat-svg\" fill=\"currentColor\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\"><title>Categories<\/title>\n\t\t\t<path d=\"M0 10h32l-2 20h-28l-2-20zM29 6l1 2h-28l2-4h11l1 2h13z\"><\/path><\/svg><\/span><a href=\"https:\/\/tenesys.io\/en\/blog\/category\/manufacturing-industrial\/\" rel=\"category tag\">Manufacturing &amp; Industrial<\/a><\/div><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/li><li class=\"kt-post-slider-item post-6474 post type-post status-publish format-standard has-post-thumbnail hentry category-financial-sector kategoria-uslugi-artykul-security-compliance\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top kb-post-footer-bottom-align\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-100\" style=\"padding-bottom:100%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/tenesys.io\/en\/blog\/the-unified-fintech-cloud-compliance-framework-aligning-dora-ai-act-pci-dss-mica\/\" aria-label=\"The Unified FinTech Cloud Compliance Framework: Aligning DORA, AI Act, PCI DSS &amp; MiCA\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance-1024x1024.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance-1024x1024.png 1024w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance-300x300.png 300w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance-150x150.png 150w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance-768x768.png 768w, https:\/\/tenesys.io\/wp-content\/uploads\/2026\/05\/fintech_cloud_compliance.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h3 class=\"entry-title\"><a href=\"https:\/\/tenesys.io\/en\/blog\/the-unified-fintech-cloud-compliance-framework-aligning-dora-ai-act-pci-dss-mica\/\">The Unified FinTech Cloud Compliance Framework: Aligning DORA, AI Act, PCI DSS &amp; MiCA<\/a><\/h3><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">FinTech institutions today operate in a regulatory crossfire. The pressure to innovate and hit &#8220;Time-to-Market&#8221; targets often clashes with the reality of an audit. The challenge is no longer just &#8220;getting into the cloud&#8221; \u2014 it is staying there while satisfying the overlapping demands of DORA, the AI Act, PCI DSS v4.0, and MiCA. Without&#8230;<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><div class=\"kt-blocks-date kt-blocks-post-footer-section\"><time dateTime=\"04 May 2026\" class=\"kt-blocks-post-date\">04 May 2026<\/time><\/div><div class=\"kt-blocks-categories kt-blocks-post-footer-section\"><span class=\"kt-blocks-tags-icon\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"kt-blocks-cat-svg\" fill=\"currentColor\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\"><title>Categories<\/title>\n\t\t\t<path d=\"M0 10h32l-2 20h-28l-2-20zM29 6l1 2h-28l2-4h11l1 2h13z\"><\/path><\/svg><\/span><a href=\"https:\/\/tenesys.io\/en\/blog\/category\/financial-sector\/\" rel=\"category tag\">Financial Sector<\/a><\/div><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/li><\/ul><\/div><\/div><\/div><!-- .wp-block-kadence-postgrid --><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Migration to cloud computing has become a key element of digital transformation for companies in Europe. Organizations are increasingly moving their applications, data, and operational processes to cloud environments, taking advantage of their flexibility and scalability. However, the growing dependence on cloud services also involves new threats \u2013 cyberattacks, data breaches, and non-compliance with IT&#8230;<\/p>\n","protected":false},"author":8,"featured_media":5958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[107,106,95],"tags":[],"kategoria-uslugi-artykul":[],"class_list":["post-5957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-financial-sector","category-manufacturing-industrial","category-transport-logistics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security of cloud environments in the context of NIS2\/KSC and DORA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of cloud environments in the context of NIS2\/KSC and DORA\" \/>\n<meta property=\"og:description\" content=\"Migration to cloud computing has become a key element of digital transformation for companies in Europe. Organizations are increasingly moving their applications, data, and operational processes to cloud environments, taking advantage of their flexibility and scalability. However, the growing dependence on cloud services also involves new threats \u2013 cyberattacks, data breaches, and non-compliance with IT...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Tenesys\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T11:42:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T11:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"2048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mateusz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mateusz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/\"},\"author\":{\"name\":\"Mateusz\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#\\\/schema\\\/person\\\/12cf5a20aa76e6db1a1a7c223e1c5ec9\"},\"headline\":\"Security of cloud environments in the context of NIS2\\\/KSC and DORA regulations \u2013 how to avoid risks?\",\"datePublished\":\"2026-04-29T11:42:57+00:00\",\"dateModified\":\"2026-05-05T11:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/\"},\"wordCount\":1182,\"publisher\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg\",\"articleSection\":[\"Financial Sector\",\"Manufacturing &amp; Industrial\",\"Transport &amp; Logistics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/\",\"url\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/\",\"name\":\"Security of cloud environments in the context of NIS2\\\/KSC and DORA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg\",\"datePublished\":\"2026-04-29T11:42:57+00:00\",\"dateModified\":\"2026-05-05T11:47:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg\",\"contentUrl\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg\",\"width\":2048,\"height\":2048,\"caption\":\"Security of cloud environments in the context of NIS2\\\/KSC and DORA regulations \u2013 how to avoid risks?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/tenesys.io\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/tenesys.io\\\/en\\\/blog\\\/category\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security of cloud environments in the context of NIS2\\\/KSC and DORA regulations \u2013 how to avoid risks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/tenesys.io\\\/en\\\/\",\"name\":\"Tenesys\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/tenesys.io\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#organization\",\"name\":\"Tenesys\",\"url\":\"https:\\\/\\\/tenesys.io\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/tenesys.svg\",\"contentUrl\":\"https:\\\/\\\/tenesys.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/tenesys.svg\",\"caption\":\"Tenesys\"},\"image\":{\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/tenesys-io\",\"https:\\\/\\\/clutch.co\\\/profile\\\/tenesys\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/tenesys.io\\\/en\\\/#\\\/schema\\\/person\\\/12cf5a20aa76e6db1a1a7c223e1c5ec9\",\"name\":\"Mateusz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g\",\"caption\":\"Mateusz\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of cloud environments in the context of NIS2\/KSC and DORA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/","og_locale":"en_US","og_type":"article","og_title":"Security of cloud environments in the context of NIS2\/KSC and DORA","og_description":"Migration to cloud computing has become a key element of digital transformation for companies in Europe. Organizations are increasingly moving their applications, data, and operational processes to cloud environments, taking advantage of their flexibility and scalability. However, the growing dependence on cloud services also involves new threats \u2013 cyberattacks, data breaches, and non-compliance with IT...","og_url":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/","og_site_name":"Tenesys","article_published_time":"2026-04-29T11:42:57+00:00","article_modified_time":"2026-05-05T11:47:41+00:00","og_image":[{"width":2048,"height":2048,"url":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg","type":"image\/jpeg"}],"author":"Mateusz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mateusz","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#article","isPartOf":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/"},"author":{"name":"Mateusz","@id":"https:\/\/tenesys.io\/en\/#\/schema\/person\/12cf5a20aa76e6db1a1a7c223e1c5ec9"},"headline":"Security of cloud environments in the context of NIS2\/KSC and DORA regulations \u2013 how to avoid risks?","datePublished":"2026-04-29T11:42:57+00:00","dateModified":"2026-05-05T11:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/"},"wordCount":1182,"publisher":{"@id":"https:\/\/tenesys.io\/en\/#organization"},"image":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg","articleSection":["Financial Sector","Manufacturing &amp; Industrial","Transport &amp; Logistics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/","url":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/","name":"Security of cloud environments in the context of NIS2\/KSC and DORA","isPartOf":{"@id":"https:\/\/tenesys.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#primaryimage"},"image":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg","datePublished":"2026-04-29T11:42:57+00:00","dateModified":"2026-05-05T11:47:41+00:00","breadcrumb":{"@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#primaryimage","url":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg","contentUrl":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations.jpg","width":2048,"height":2048,"caption":"Security of cloud environments in the context of NIS2\/KSC and DORA regulations \u2013 how to avoid risks?"},{"@type":"BreadcrumbList","@id":"https:\/\/tenesys.io\/en\/blog\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-how-to-avoid-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/tenesys.io\/en\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/tenesys.io\/en\/blog\/category\/knowledge-base\/"},{"@type":"ListItem","position":3,"name":"Security of cloud environments in the context of NIS2\/KSC and DORA regulations \u2013 how to avoid risks?"}]},{"@type":"WebSite","@id":"https:\/\/tenesys.io\/en\/#website","url":"https:\/\/tenesys.io\/en\/","name":"Tenesys","description":"","publisher":{"@id":"https:\/\/tenesys.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tenesys.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tenesys.io\/en\/#organization","name":"Tenesys","url":"https:\/\/tenesys.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tenesys.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/02\/tenesys.svg","contentUrl":"https:\/\/tenesys.io\/wp-content\/uploads\/2026\/02\/tenesys.svg","caption":"Tenesys"},"image":{"@id":"https:\/\/tenesys.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tenesys-io","https:\/\/clutch.co\/profile\/tenesys"]},{"@type":"Person","@id":"https:\/\/tenesys.io\/en\/#\/schema\/person\/12cf5a20aa76e6db1a1a7c223e1c5ec9","name":"Mateusz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15ad034b02040ca7a55dfca186aecce59f3c010cf891585e3f7f5a70bcdae888?s=96&d=mm&r=g","caption":"Mateusz"}}]}},"taxonomy_info":{"category":[{"value":107,"label":"Financial Sector"},{"value":106,"label":"Manufacturing &amp; Industrial"},{"value":95,"label":"Transport &amp; Logistics"}]},"featured_image_src_large":["https:\/\/tenesys.io\/wp-content\/uploads\/2026\/04\/security-of-cloud-environments-in-the-context-of-nis2-ksc-and-dora-regulations-1024x1024.jpg",1024,1024,true],"author_info":{"display_name":"Mateusz","author_link":"https:\/\/tenesys.io\/en\/blog\/author\/mateusz\/"},"comment_info":0,"category_info":[{"term_id":107,"name":"Financial Sector","slug":"financial-sector","term_group":0,"term_taxonomy_id":107,"taxonomy":"category","description":"","parent":0,"count":20,"filter":"raw","cat_ID":107,"category_count":20,"category_description":"","cat_name":"Financial Sector","category_nicename":"financial-sector","category_parent":0},{"term_id":106,"name":"Manufacturing &amp; Industrial","slug":"manufacturing-industrial","term_group":0,"term_taxonomy_id":106,"taxonomy":"category","description":"","parent":0,"count":25,"filter":"raw","cat_ID":106,"category_count":25,"category_description":"","cat_name":"Manufacturing &amp; Industrial","category_nicename":"manufacturing-industrial","category_parent":0},{"term_id":95,"name":"Transport &amp; Logistics","slug":"transport-logistics","term_group":0,"term_taxonomy_id":95,"taxonomy":"category","description":"","parent":0,"count":18,"filter":"raw","cat_ID":95,"category_count":18,"category_description":"","cat_name":"Transport &amp; Logistics","category_nicename":"transport-logistics","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/posts\/5957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/comments?post=5957"}],"version-history":[{"count":2,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/posts\/5957\/revisions"}],"predecessor-version":[{"id":6388,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/posts\/5957\/revisions\/6388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/media\/5958"}],"wp:attachment":[{"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/media?parent=5957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/categories?post=5957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/tags?post=5957"},{"taxonomy":"kategoria-uslugi-artykul","embeddable":true,"href":"https:\/\/tenesys.io\/en\/wp-json\/wp\/v2\/kategoria-uslugi-artykul?post=5957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}