{"id":15512,"date":"2025-11-10T11:06:03","date_gmt":"2025-11-10T11:06:03","guid":{"rendered":"http:\/\/insistnova.in-sist.si\/information-security\/"},"modified":"2026-01-05T07:04:43","modified_gmt":"2026-01-05T07:04:43","slug":"information-security","status":"publish","type":"page","link":"https:\/\/insistnova.in-sist.si\/en\/information-security\/","title":{"rendered":"Information security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15512\" class=\"elementor elementor-15512 elementor-13897\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b11dc1f e-con-full e-flex e-con e-child\" data-id=\"6b11dc1f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-183e3eb1 navigation-breadcrumbs-custom split-breadcrumbs-y elementor-widget elementor-widget-global elementor-global-15262 elementor-global-13719 elementor-widget-the7-breadcrumb\" data-id=\"183e3eb1\" data-element_type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/insistnova.in-sist.si\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17f889df elementor-widget elementor-widget-slider_revolution\" data-id=\"17f889df\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"information-security\" data-id=\"54\" id=\"SR7_54_1\" class=\"rs-ov-hidden\" data-version=\"6.7.37\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_54_1-179\" data-key=\"179\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_54_1-179-2\" class=\"sr7-layer\">Information security<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_54_1-145\" data-key=\"145\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/09\/Slider-3.jpg\" data-libid=\"13566\" data-lib=\"medialibrary\" title=\"Slider 3\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9pbnNpc3Rub3ZhLmluLXNpc3Quc2kvd3AtY29udGVudC91cGxvYWRzLzIwMjUvMDkvU2xpZGVyLTMuanBn\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_54_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_54_1\",el:[400,400,410,960,193],type:'hero',shdw:'0',gh:[400,400,410,313,193],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_54_1\"].state=true;} else if(SR7.PMH[\"SR7_54_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_54_1\"].fn,19);}};SR7.PMH[\"SR7_54_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-151b3b34 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"151b3b34\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7187b758 e-con-full div-bellow-hero e-flex e-con e-child\" data-id=\"7187b758\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-75ce9917 e-con-fit text-bellow-hero e-flex e-con e-child\" data-id=\"75ce9917\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a33ea4 elementor-widget elementor-widget-heading\" data-id=\"4a33ea4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52b0a2f6 elementor-widget elementor-widget-text-editor\" data-id=\"52b0a2f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption. <\/p><p>Information security is therefore no longer an option, but a necessary cornerstone of a stable, reliable and coherent business environment.<\/p><p>By implementing proven security practices, policies and technologies, we help businesses reduce risk, protect sensitive data and ensure the secure operation of business-critical systems &#8211; both on-premises and in cloud and hybrid deployments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73ca7faa e-con-fit e-flex e-con e-child\" data-id=\"73ca7faa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-142e5ba0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"142e5ba0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"509\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg\" class=\"attachment-medium_large size-medium_large wp-image-16352\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg 768w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-300x199.jpg 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-1024x678.jpg 1024w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-1536x1017.jpg 1536w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-2048x1356.jpg 2048w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-900x596.jpg 900w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-1200x795.jpg 1200w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-628b567b e-con-full e-flex e-con e-child\" data-id=\"628b567b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7254c1 elementor-widget elementor-widget-heading\" data-id=\"4b7254c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our services include<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c0eef71 e-con-full main-container e-flex e-con e-child\" data-id=\"5c0eef71\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-42a8394a custom-card e-con-full e-flex e-con e-child\" data-id=\"42a8394a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3df0bd38 card-image elementor-widget elementor-widget-image\" data-id=\"3df0bd38\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/cyber-security.png\" class=\"attachment-large size-large wp-image-15733\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/cyber-security.png 512w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/cyber-security-300x300.png 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/cyber-security-150x150.png 150w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/cyber-security-200x200.png 200w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0b4a09 card-heading elementor-widget elementor-widget-heading\" data-id=\"7c0b4a09\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Protecting networks<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-216da595 elementor-widget__width-initial card-text elementor-widget elementor-widget-text-editor\" data-id=\"216da595\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deployment of next-generation firewalls, IDS\/IPS systems, anti-virus solutions, data encryption and multi-level network protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b42ae53 custom-card e-con-full e-flex e-con e-child\" data-id=\"3b42ae53\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1fad6a card-image elementor-widget elementor-widget-image\" data-id=\"5b1fad6a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/exclamation.png\" class=\"attachment-large size-large wp-image-16359\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/exclamation.png 512w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/exclamation-300x300.png 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/exclamation-150x150.png 150w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/exclamation-200x200.png 200w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a4cfff card-heading elementor-widget elementor-widget-heading\" data-id=\"42a4cfff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Security policies<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bdc3778 elementor-widget__width-initial card-text elementor-widget elementor-widget-text-editor\" data-id=\"4bdc3778\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security policy development, risk assessment, access control, GDPR compliance and ISO 27001 support.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12e2f96 custom-card e-con-full e-flex e-con e-child\" data-id=\"12e2f96\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-237c97bd card-image elementor-widget elementor-widget-image\" data-id=\"237c97bd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/remote-working.png\" class=\"attachment-large size-large wp-image-16360\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/remote-working.png 512w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/remote-working-300x300.png 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/remote-working-150x150.png 150w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/remote-working-200x200.png 200w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de5c5ca card-heading elementor-widget elementor-widget-heading\" data-id=\"2de5c5ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Remote access<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a6f2521 elementor-widget__width-initial card-text elementor-widget elementor-widget-text-editor\" data-id=\"7a6f2521\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Establish secure VPN tunnels, multi-factor authentication (MFA), identity management and protect access to critical systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1b9932 custom-card e-con-full e-flex e-con e-child\" data-id=\"e1b9932\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa45e55 card-image elementor-widget elementor-widget-image\" data-id=\"fa45e55\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/insurance.png\" class=\"attachment-large size-large wp-image-16361\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/insurance.png 512w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/insurance-300x300.png 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/insurance-150x150.png 150w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/insurance-200x200.png 200w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-786335f2 card-heading elementor-widget elementor-widget-heading\" data-id=\"786335f2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Incident management<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37d4979 elementor-widget__width-initial card-text elementor-widget elementor-widget-text-editor\" data-id=\"37d4979\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Network monitoring, intrusion detection, incident response, log analysis, SIEM integrations and ongoing support for security events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd9cef9 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"bd9cef9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2cdc638 elementor-widget elementor-widget-text-editor\" data-id=\"2cdc638\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"1867\" data-end=\"1897\">Advanced security services<\/h2><p data-start=\"1899\" data-end=\"2278\"><strong data-start=\"1903\" data-end=\"1940\">Intrusion Prevention System (IPS)<\/strong><br data-start=\"1940\" data-end=\"1943\">Set up and configure intrusion prevention systems that detect and block malicious attempts to access your network or servers in real time. IPS actively analyses traffic and prevents attacks before they reach target systems.<br data-start=\"2185\" data-end=\"2188\">Suitable for protecting corporate networks, servers, data centres and cloud environments. <\/p><p data-start=\"2285\" data-end=\"2630\"><strong data-start=\"2288\" data-end=\"2341\">Malware Protection<\/strong><br data-start=\"2341\" data-end=\"2344\">Comprehensive protection against viruses, Trojans, ransomware attacks and other forms of malware. Solutions work preventively and detect new, unknown threats.<br data-start=\"2524\" data-end=\"2527\">Protection is tailored to workstations, servers and network devices and provides central control. <\/p><p data-start=\"2637\" data-end=\"3033\"><strong data-start=\"2640\" data-end=\"2696\">Advanced endpoint protection &#8211; Sophos Intercept X<\/strong><br data-start=\"2696\" data-end=\"2699\">Implementing advanced endpoint protection <strong data-start=\"2740\" data-end=\"2781\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Sophos Intercept X<\/span><\/span><\/strong>which uses artificial intelligence and behavioural analysis to detect threats without the need for traditional virus signatures.<br data-start=\"2899\" data-end=\"2902\">The solution effectively protects against ransomware attacks, zero-day threats and vulnerability exploits, and enables rapid incident response.<\/p><p data-start=\"3040\" data-end=\"3314\"><strong data-start=\"3043\" data-end=\"3075\">Deep Packet Inspection (DPI)<\/strong><br data-start=\"3075\" data-end=\"3078\">Detailed analysis of network traffic at application level to detect hidden threats, protocol abuse and suspicious behaviour. DPI provides a complete view of what is happening on the network and serves as the basis for advanced security policies. <\/p><p data-start=\"3321\" data-end=\"3620\"><strong data-start=\"3324\" data-end=\"3368\">Central management of security policies<\/strong><br data-start=\"3368\" data-end=\"3371\">Setting up a central system to manage security policies, updates and reports. It provides unified control over the protection of all devices and users and simplifies incident management and response.<br data-start=\"3573\" data-end=\"3576\">Suitable for small, medium and large enterprises. <\/p><p data-start=\"3627\" data-end=\"3954\"><strong data-start=\"3630\" data-end=\"3677\">Security monitoring and response (SOC-access)<\/strong><br data-start=\"3677\" data-end=\"3680\">Continuous monitoring of security events and anomalies and rapid response to detected threats. The aim is to reduce the time-to-detection (MTTD) and limit the potential damage.<br data-start=\"3843\" data-end=\"3846\">The service also includes a basic analysis of events and recommendations for further improvements of the security situation. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4459df43 e-con-full e-flex e-con e-parent\" data-id=\"4459df43\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-47d36810 e-con-full e-flex e-con e-child\" data-id=\"47d36810\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4670366a e-con-full e-flex e-con e-child\" data-id=\"4670366a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d860a4a elementor-widget elementor-widget-heading\" data-id=\"4d860a4a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why with us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ed2d36 elementor-widget elementor-widget-text-editor\" data-id=\"73ed2d36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a certified partner with extensive experience in ERP implementations and business digitalization. We understand the technological and human challenges of implementing such a system, ensuring a professionally managed project that focuses on the end user and long-term value. <\/p><p>Whether you&#8217;re a micro-business or a manufacturing company with complex processes &#8211; with Pantheon ERP, you get a tool that grows with you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0cb0d0 elementor-widget elementor-widget-button\" data-id=\"c0cb0d0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More about us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46cfeb54 e-con-full e-flex e-con e-child\" data-id=\"46cfeb54\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-69804d9a e-con-full e-flex e-con e-child\" data-id=\"69804d9a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76c74bf3 elementor-widget elementor-widget-heading\" data-id=\"76c74bf3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to know more or schedule a consultation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55606c8f elementor-widget elementor-widget-text-editor\" data-id=\"55606c8f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us and we will be happy to make you a presentation or a concrete offer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-154f61a6 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"154f61a6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3b3067e6 e-con-full e-flex e-con e-child\" data-id=\"3b3067e6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a37f5a7 elementor-widget elementor-widget-heading\" data-id=\"6a37f5a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">They trust us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b3b5e04 e-con-full e-flex e-con e-child\" data-id=\"5b3b5e04\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-65c275c2 e-grid e-con-full trust-us e-con e-child\" data-id=\"65c275c2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f601756 elementor-widget elementor-widget-image\" data-id=\"6f601756\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"119\" height=\"35\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/petpak-black-1_gray.svg\" class=\"attachment-large size-large wp-image-16107\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f5f59d6 elementor-widget elementor-widget-image\" data-id=\"1f5f59d6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"91\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/skisea.png\" class=\"attachment-large size-large wp-image-16106\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c6e6f8d elementor-widget elementor-widget-image\" data-id=\"7c6e6f8d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"100\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/logo-rogaska.png\" class=\"attachment-large size-large wp-image-16103\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d123136 elementor-widget elementor-widget-image\" data-id=\"5d123136\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"65\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/preline-e1756895215330.jpg\" class=\"attachment-full size-full wp-image-16105\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e70008c elementor-widget elementor-widget-image\" data-id=\"6e70008c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1181\" height=\"113\" src=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo.jpg\" class=\"attachment-full size-full wp-image-16104\" alt=\"\" srcset=\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo.jpg 1181w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-300x29.jpg 300w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-1024x98.jpg 1024w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-768x73.jpg 768w, https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-900x86.jpg 900w\" sizes=\"(max-width: 1181px) 100vw, 1181px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption. Information security is therefore no longer an option, but a necessary cornerstone of a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"give_campaign_id":0,"footnotes":""},"class_list":["post-15512","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information security - In.Sist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insistnova.in-sist.si\/en\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security - In.Sist\" \/>\n<meta property=\"og:description\" content=\"Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption. Information security is therefore no longer an option, but a necessary cornerstone of a&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insistnova.in-sist.si\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"In.Sist\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T07:04:43+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/\",\"url\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/\",\"name\":\"Information security - In.Sist\",\"isPartOf\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg\",\"datePublished\":\"2025-11-10T11:06:03+00:00\",\"dateModified\":\"2026-01-05T07:04:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insistnova.in-sist.si\/en\/information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage\",\"url\":\"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg\",\"contentUrl\":\"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/insistnova.in-sist.si\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#website\",\"url\":\"https:\/\/insistnova.in-sist.si\/en\/\",\"name\":\"In.Sist\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insistnova.in-sist.si\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#organization\",\"name\":\"In.Sist\",\"url\":\"https:\/\/insistnova.in-sist.si\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"contentUrl\":\"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"width\":350,\"height\":100,\"caption\":\"In.Sist\"},\"image\":{\"@id\":\"https:\/\/insistnova.in-sist.si\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security - In.Sist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insistnova.in-sist.si\/en\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information security - In.Sist","og_description":"Tukaj ste: Domov Information security In a world where data is one of the most important business assets, protecting information is crucial. Businesses face daily threats such as cyber-attacks, unauthorised access, data loss and misconfigurations that can cause serious business disruption. Information security is therefore no longer an option, but a necessary cornerstone of a&hellip;","og_url":"https:\/\/insistnova.in-sist.si\/en\/information-security\/","og_site_name":"In.Sist","article_modified_time":"2026-01-05T07:04:43+00:00","og_image":[{"url":"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/","url":"https:\/\/insistnova.in-sist.si\/en\/information-security\/","name":"Information security - In.Sist","isPartOf":{"@id":"https:\/\/insistnova.in-sist.si\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage"},"thumbnailUrl":"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg","datePublished":"2025-11-10T11:06:03+00:00","dateModified":"2026-01-05T07:04:43+00:00","breadcrumb":{"@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insistnova.in-sist.si\/en\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/#primaryimage","url":"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg","contentUrl":"http:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-kelvin809-544900-768x509.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/insistnova.in-sist.si\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/insistnova.in-sist.si\/en\/"},{"@type":"ListItem","position":2,"name":"Information security"}]},{"@type":"WebSite","@id":"https:\/\/insistnova.in-sist.si\/en\/#website","url":"https:\/\/insistnova.in-sist.si\/en\/","name":"In.Sist","description":"","publisher":{"@id":"https:\/\/insistnova.in-sist.si\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insistnova.in-sist.si\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/insistnova.in-sist.si\/en\/#organization","name":"In.Sist","url":"https:\/\/insistnova.in-sist.si\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insistnova.in-sist.si\/en\/#\/schema\/logo\/image\/","url":"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","contentUrl":"https:\/\/insistnova.in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","width":350,"height":100,"caption":"In.Sist"},"image":{"@id":"https:\/\/insistnova.in-sist.si\/en\/#\/schema\/logo\/image\/"}}]}},"campaignId":"","_links":{"self":[{"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/comments?post=15512"}],"version-history":[{"count":6,"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15512\/revisions"}],"predecessor-version":[{"id":17060,"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15512\/revisions\/17060"}],"wp:attachment":[{"href":"https:\/\/insistnova.in-sist.si\/en\/wp-json\/wp\/v2\/media?parent=15512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}