Meaningful rules emerge where organisations see the reality of their own risks and have the courage to elevate safety to a strategic priority.
The definitive end of support for Windows 10 represents a major milestone that has a direct impact on the security, continuity and future development of corporate IT infrastructure. Before deciding on a workable solution, it is recommended to inventory existing devices, analyse compatibility with Windows 11 and create a realistic infrastructure upgrade plan.
In September 2025, a decree came into force that fundamentally changes the way organisations in Slovakia approach reporting cyber incidents. Correct reporting can be a challenge. The decree of the National Security Authority follows the amendment to the Cybersecurity Act. For the purposes of practice, it specifies exactly what is considered a serious incident and what the obligations of operators of essential services are when reporting it.
Slovak cybersecurity has received a new version since 1. 9. 2025 new "working environment". From the perspective of the law, but also of existing practice in the field of cybersecurity, this is certainly not a cosmetic change. What is changing is first and foremost the philosophy and the related structure as well as the "micro-setting" of many of the requirements with a common and single right starting point.
Veeam is coming out with Veeam Data Platform v13, which security experts see as the biggest shift in data resiliency to date. In the new version, Veeam Data Platform combines traditional backup reliability with modern artificial intelligence, fast data recovery and security features that have previously worked predominantly in dedicated security tools.
Cybersecurity audits should not just be a formal obligation, but a tool that exposes vulnerabilities, gives organisations a clear picture of their security posture, and helps with strategic decision-making. In practice, however, they are often accompanied by administrative burdens, numerous spreadsheets and lengthy processes. That's why there is a new Slovak system, Cyberman, which guarantees a chaos-free audit.
How long? If you can't answer the question accurately, it's not just a lack of information. It's a risk that has a price, and it can be liquidating. This is an answer the firm cannot fill in retrospectively after the incident. The value of the RTO, Recovery Time Objective, must be determined in times of calm, when there is room for analysis and planning, not in times of chaos. The investment in prevention is always less than the cost of downtime.
SIEM and SOC have brought certainty where before there was only hope. A few years ago, a major Slovakian manufacturing company was living in the feeling that its IT infrastructure was in good shape. Logs existed, administrators were doing their best, and security was not an acute emergency. Until the attack - swift, widespread and crippling - came. Production stopped, deliveries were interrupted, payments were blocked.
Artificial intelligence has become an integral part of the IT work environment. The key is to know its limits and risks. Use it as a powerful assistant, not as a smart new colleague. It's important to validate answers, not work blindly with the results, and use critical thinking.
Digital transformation has long been a necessity, not a choice. Most organizations, regardless of nature and size, face a fundamental question: How to build modern, flexible and, above all, secure IT for the long term? One answer is a hybrid approach.