Meaningful rules emerge where organisations see the reality of their own risks and have the courage to elevate safety to a strategic priority.
The definitive end of support for Windows 10 represents a major milestone that has a direct impact on the security, continuity and future development of corporate IT infrastructure. Before deciding on a workable solution, it is recommended to inventory existing devices, analyse compatibility with Windows 11 and create a realistic infrastructure upgrade plan.
In September 2025, a decree came into force that fundamentally changes the way organisations in Slovakia approach reporting cyber incidents. Correct reporting can be a challenge. The decree of the National Security Authority follows the amendment to the Cybersecurity Act. For the purposes of practice, it specifies exactly what is considered a serious incident and what the obligations of operators of essential services are when reporting it.
Slovak cybersecurity has received a new version since 1. 9. 2025 new "working environment". From the perspective of the law, but also of existing practice in the field of cybersecurity, this is certainly not a cosmetic change. What is changing is first and foremost the philosophy and the related structure as well as the "micro-setting" of many of the requirements with a common and single right starting point.
Veeam is coming out with Veeam Data Platform v13, which security experts see as the biggest shift in data resiliency to date. In the new version, Veeam Data Platform combines traditional backup reliability with modern artificial intelligence, fast data recovery and security features that have previously worked predominantly in dedicated security tools.
Cybersecurity audits should not just be a formal obligation, but a tool that exposes vulnerabilities, gives organisations a clear picture of their security posture, and helps with strategic decision-making. In practice, however, they are often accompanied by administrative burdens, numerous spreadsheets and lengthy processes. That's why there is a new Slovak system, Cyberman, which guarantees a chaos-free audit.
How long? If you can't answer the question accurately, it's not just a lack of information. It's a risk that has a price, and it can be liquidating. This is an answer the firm cannot fill in retrospectively after the incident. The value of the RTO, Recovery Time Objective, must be determined in times of calm, when there is room for analysis and planning, not in times of chaos. The investment in prevention is always less than the cost of downtime.
SIEM and SOC have brought certainty where before there was only hope. A few years ago, a major Slovakian manufacturing company was living in the feeling that its IT infrastructure was in good shape. Logs existed, administrators were doing their best, and security was not an acute emergency. Until the attack - swift, widespread and crippling - came. Production stopped, deliveries were interrupted, payments were blocked.
Cybersecurity today is not just about code and technology. It's a world where curiosity, quick thinking, perseverance and teamwork make the difference. That's exactly what the Slovak Cyber Team is.
The modern IT environment today is dispersed between on-premises data centres, public cloud, private cloud and edge devices. Companies are combining different platforms, providers and technologies, which in practice brings complexity that is increasingly difficult to manage effectively. This is where Azure Arc, Microsoft's technology that enables unified management of hybrid and multicloud infrastructure, comes in.