1352_GAMO_POI9-foto-2 copy

Security does not have a universal code

Cybersecurity is part of my daily work – whether it’s discussing on forums, training customers or consulting in companies. Many of these come on their own, others because they are mandated to do so by legislation through the amended Cybersecurity Act. Whatever the reason, the important thing is that they are taking a proactive interest in security.

Foreign mothers of Slovak companies often do not address the cyber resilience of their daughters, let alone perceive the need in terms of legislation. Either they do not consider it a priority or they rely on a centralized security model. Neither approach holds up today. The modern IT environment is dispersed, dependent on cloud, IoT and remote working. Centralised solutions are losing efficiency and, more importantly, pose a risk. If an attacker gets into one central point, he can gain control of the entire system.

Network segmentation is therefore not just a technical recommendation, but a fundamental principle of resilience. Attacks cannot always be prevented, but we can slow down the attacker, limit his movements and buy time to react.

This is where a simple analogy often helps me. Imagine if a company only had one common passcode for all rooms. That sounds absurd, doesn’t it? In reality, everyone only has access where they need it. If someone steals or breaks the code, they only get into one office or meeting room. Every other room is a new challenge.

And that’s exactly what segmentation is all about – creating layers of protection that slow down the attacker and force them to leave footprints. The more obstacles, the greater the chance of being caught by security operators, an alarm or a guard dog.
Companies have plans in place for fires or floods and rehearse how to respond in a crisis. The same approach should be standard in cybersecurity. Because resilience doesn’t come from paperwork, it comes from being prepared to act.

Published: 24. June 2025

Zuzana Holý Omelková

Kybernetická bezpečnosť

GAMO a.s.

This article is part of magazine no.

Published: 24. June 2025

advertising

Peter Blažečka

ESET, spol. s r.o.

Sometimes it happens that attackers manage to deploy ransomware on a company network despite strong security. But even then, sensitive...

Martina Kormaník

GAMO a.s.

The amendment to the Cybersecurity Act transposing the NIS 2 Directive has also brought new obligations for food processing and...

Zuzana Holý Omelková

GAMO a.s.

If organisations want to avoid mistakes, it is essential to take a systematic and responsible approach to the implementation of...
advertising