{"id":11077,"date":"2026-04-15T11:55:11","date_gmt":"2026-04-15T11:55:11","guid":{"rendered":"https:\/\/www.binaryconfidence.com\/?p=11077"},"modified":"2026-04-15T12:33:12","modified_gmt":"2026-04-15T12:33:12","slug":"how-to-prevent-an-attack-implementation-of-technologies","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/ako-predist-utoku-implementacia-technologii\/","title":{"rendered":"How to prevent an attack that should never happen in the first place?"},"content":{"rendered":"<p><i><span data-contrast=\"auto\">A few years ago, we were called in to handle a serious incident at a company dealing with financial operations. The company needed to resolve an infiltration issue that, under normal circumstances, should never have occurred.<\/span><\/i><i><span data-contrast=\"auto\"> The attack was not targeted, it was not particularly sophisticated, and the attacker likely knew very little about the company. It was a typical opportunistic attack, the kind that floods the internet today\u2026 and yet, in our client\u2019s environment, it caused unprecedented disruption. All it took was a single unsecured entry point exposed to the outside world.<\/span><\/i><\/p>\n<p><span data-contrast=\"auto\">A vulnerability in the JetBrains TeamCity tool quickly became part of automated internet scans shortly after it was published. Our client\u2019s server was among those that responded to this \u201cdigital radar,\u201d and suddenly everything started moving. The attacker exploited the weakness, deployed malware, and established a communication channel to a command-and-control server, from which further instructions were received. Within hours, scheduled tasks, system services, and eventually even a remote management tool were added.<\/span><\/p>\n<p><span data-contrast=\"auto\">From the attacker\u2019s perspective, the result was an incredible success. They gained full access to the server with root privileges, the ability to work with data, keys, and internal systems. From the company\u2019s perspective, however, nothing seemed to be happening. No alerts were triggered, no warnings appeared, and consequently, no response was initiated. The incident only surfaced when it was already necessary to deal with its consequences.<\/span><\/p>\n<h3><span data-contrast=\"none\">The foundation is a secured perimeter and protected endpoints<\/span><\/h3>\n<p>The technology company, which relied on dozens of virtual servers for its operations, was not notable for what it had in place to protect against external attacks, but rather for what it lacked. There was no firewall, no segmentation, and no endpoint monitoring. If a perimeter firewall had been in place, it would have restricted or completely blocked access to the vulnerable service. At the same time, the company lacked any solution capable of monitoring endpoints within the network, which could have detected suspicious behavior as soon as it began. The combination of these two layers would have, with high probability, stopped the attack before it had a chance to develop into anything harmful.<\/p>\n<p><span data-contrast=\"auto\">The incident was not an example of a sophisticated hack, but rather a demonstration of how even a simple attack can cause significant damage when basic security measures are missing. The company we helped clean up the situation<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0suddenly had no issue investing substantial amounts into security tools and measures.<\/span><\/p>\n<p><span data-contrast=\"auto\"><em>\u201cKybernetick\u00e1 bezpe\u010dnos\u0165 je dnes komplexn\u00e1 discipl\u00edna s mno\u017estvom n\u00e1strojov a pr\u00edstupov, no v praxi sa opakovane potvrdzuje, \u017ee v\u0161etko stoj\u00ed na nieko\u013ek\u00fdch k\u013e\u00fa\u010dov\u00fdch vrstv\u00e1ch,\u201d<\/em> vysvet\u013euje Jakub Ko\u0161tial, expert na implement\u00e1ciu technol\u00f3gi\u00ed z firmy Binary Confidence. Notebooky, servery \u010di pracovn\u00e9 stanice predstavuj\u00fa miesto, kde sa re\u00e1lne vykon\u00e1va \u0161kodliv\u00e1 aktivita. Tu sa sp\u00fa\u0161\u0165aj\u00fa procesy, manipuluj\u00fa sa d\u00e1ta a doch\u00e1dza k eskal\u00e1cii opr\u00e1vnen\u00ed. \u201cAk firma nem\u00e1 preh\u013ead o tom, \u010do sa deje na \u00farovni <\/span><span data-contrast=\"auto\">level, in practice, it has no idea it has been compromised until it is too late,\u201d he adds.<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-large wp-image-11079\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy.png\" alt=\"\" width=\"800\" height=\"800\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy-300x300.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy-150x150.png 150w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy-768x768.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2353_Image-Generation_remix_01kp6zpaebfsnbad8ka1spz1dy-12x12.png 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/span><\/p>\n<p><span data-contrast=\"auto\">Modern solutions such as ESET, SentinelOne or Palo Alto Cortex XDR therefore do not only serve to detect known malware, but analyze system behavior in real time. They can identify anomalies, attempts at persistence, or communication with suspicious servers and respond to them immediately. Without this layer, an organization is effectively blind. Modern endpoint solutions go beyond legacy antivirus and provide an active level of protection.<\/span><\/p>\n<p><span data-contrast=\"auto\">A firewall, on the other hand, represents the first line of defense between internal infrastructure and the internet. Its role is not just to \u201callow or deny\u201d traffic, but to actively control what enters the network and under what conditions. In an environment where services are often exposed online, a properly configured perimeter is essential.<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\"><img decoding=\"async\" class=\"alignnone wp-image-11084 size-large\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/20260414_2352_Image-Generation_remix_01kp6zm7r9ft5av523j486jcn6.png\" alt=\"\" width=\"800\" height=\"493\" srcset=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" data-srcset=\"\" \/><\/span><\/p>\n<p><span data-contrast=\"auto\">Technologies from vendors such as Palo Alto Networks or Fortinet today enable deep traffic inspection, threat identification, and application control. A firewall is an active security component capable of blocking attacks before they ever reach their target systems.<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Not everything needs to be replaced. Make the most of what you already have!<\/span><\/h3>\n<p aria-level=\"2\"><span data-contrast=\"auto\">Many companies already own the necessary technologies. However, the mere presence of a tool does not mean it is being used effectively.\u00a0<\/span><span data-contrast=\"auto\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">Proces <a href=\"https:\/\/www.binaryconfidence.com\/en\/implementacia-technologii\/#technologie\" target=\"_blank\" rel=\"noopener\">implement\u00e1cie technol\u00f3gi\u00ed<\/a> by nemal by\u0165 o ich n\u00e1kupe, ale mal by sa <strong>za\u010da\u0165 pochopen\u00edm prostredia, pokra\u010dova\u0165 n\u00e1vrhom vhodn\u00e9ho rie\u0161enia a vrcholi\u0165 konfigur\u00e1ciou<\/strong>.<\/span> How the system is set up largely determines whether it produces meaningful insights or just noise. A poorly configured system may ignore critical threats, while it should be stopping attacks at their earliest stage.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The assumption that higher security automatically requires new purchases is, according to Jakub Ko\u0161tial, one of the most common misconceptions.\u00a0<\/span><i><span data-contrast=\"auto\">\u201cIn practice, we repeatedly see organizations that have high-quality technologies, but lack proper configuration, integration, or understanding of their capabilities. At Binary Confidence, we approach security pragmatically and in a vendor-agnostic way.\u201d<\/span><\/i><\/p>\n<figure id=\"attachment_11085\" aria-describedby=\"caption-attachment-11085\" style=\"width: 800px\" class=\"wp-caption alignleft\"><img decoding=\"async\" class=\"wp-image-11085 size-large\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-1024x684.jpg\" alt=\"\" width=\"800\" height=\"534\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-1024x684.jpg 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-300x200.jpg 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-768x513.jpg 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-1536x1025.jpg 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-2048x1367.jpg 2048w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/2023_Binary-Confidence-13210-18x12.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-11085\" class=\"wp-caption-text\"><span style=\"color: #ffffff;\">Jakub Ko\u0161tial, expert at Binary Confidence for implementation services<\/span><\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">We respect the client\u2019s existing technology stack and aim to optimize it so that it makes sense within their specific environment. New solutions are recommended only when they truly bring added value. This approach allows organizations to achieve a higher level of security faster, more efficiently, and without unnecessary costs. Importantly, it does so without significantly disrupting business operations.<\/span><\/p>\n<h3><span data-contrast=\"none\">What can we deliver?<\/span><\/h3>\n<p><span data-contrast=\"auto\">The incident described at the beginning was not exceptional<\/span><span data-contrast=\"auto\">\u00a0and highlights something we encounter quite often, as also confirmed by statistics. A global survey from last year indicates that up to\u00a0<\/span><a href=\"https:\/\/www.vikingcloud.com\/resources\/vikingclouds-2025-smb-threat-landscape-report-small--and-medium-sized-businesses-big-cybersecurity-risks\"><span data-contrast=\"none\">20% of companies<\/span><\/a><span data-contrast=\"auto\">\u00a0operate without any form of security. More than half of organizations are aware they are potential targets, yet only a quarter entrust their security management to professionals. There are, however, relatively simple solutions that can significantly improve your security through financially and operationally efficient enhancements.<\/span><\/p>\n<p><i><span data-contrast=\"auto\">\u201cKe\u010f u n\u00e1\u0161ho klienta postav\u00edme z\u00e1klady, implement\u00e1cia m\u00f4\u017ee zvy\u010dajne prirodzene pokra\u010dova\u0165 smerom k plnohodnotn\u00e9mu bezpe\u010dnostn\u00e9mu ekosyst\u00e9mu. Cie\u013eom pritom nie je ma\u0165 \u201e\u010do najviac n\u00e1strojov\u201c, ale vytvori\u0165 funk\u010dn\u00fd, prepojen\u00fd organizmus, ktor\u00fd dok\u00e1\u017ee reagova\u0165 na re\u00e1lne hrozby,\u201c <\/span><\/i>vysvet\u013euje Jakub Ko\u0161tial.<span data-contrast=\"auto\"> Implement\u00e1ciu technol\u00f3gi\u00ed preto netreba vn\u00edma\u0165 ako jednorazov\u00fd projekt, ale pokojne aj ako dlhodob\u00fd proces, ktor\u00fd d\u00e1va va\u0161\u00edm draho nak\u00fapen\u00fdm technol\u00f3gi\u00e1m zmysel. <\/span><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">At the same time, it is important to remember that implementation alone is not enough\u2014if you want the highest level of security assurance, continuous\u00a0<a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\" target=\"_blank\" rel=\"noopener\">monitoring and ongoing management are essential.<\/a>.<\/span><\/p>\n<h3><span data-contrast=\"none\">List of technologies we can deploy as part of our implementation services:<\/span><\/h3>\n<h5>Endpoint protection<\/h5>\n<ul>\n<li>ESET<\/li>\n<li>SentinelOne<\/li>\n<li>Palo Alto Cortex XDR<\/li>\n<\/ul>\n<h5>Network security<\/h5>\n<ul>\n<li>Palo Alto Networks<\/li>\n<li>Fortinet<\/li>\n<\/ul>\n<h5>SIEM and log management<\/h5>\n<ul>\n<li>Elastic<\/li>\n<li>IBM\u00a0QRadar<\/li>\n<li>Palo\u00a0Alto\u00a0XSIAM<\/li>\n<\/ul>\n<h5>Threat\u00a0Intelligence<\/h5>\n<ul>\n<li>Recorded\u00a0Future<\/li>\n<li>Hudson\u00a0Rock<\/li>\n<\/ul>\n<h5>SOAR and automation<\/h5>\n<ul>\n<li>Palo\u00a0Alto\u00a0XSOAR<\/li>\n<li>Vulnerability\u00a0management<\/li>\n<li>Rapid7<\/li>\n<li>vScan<\/li>\n<\/ul>\n<h5>Data\u00a0Leak\u00a0Prevention<\/h5>\n<ul>\n<li>Trellix<\/li>\n<\/ul>\n<h5>Infrastructure monitoring<\/h5>\n<ul>\n<li>Zabbix<\/li>\n<\/ul>\n<h5>Honeypots<\/h5>\n<ul>\n<li>Cowrie<\/li>\n<li>Dionea<\/li>\n<li>Suricata<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10526\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-300x21.png\" alt=\"European Union and Digital Europe Programme funding logos displayed in partnership section.\" width=\"872\" height=\"61\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-300x21.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1024x71.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-768x53.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1536x107.png 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-2048x142.png 2048w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-18x1.png 18w\" sizes=\"(max-width: 872px) 100vw, 872px\" \/><\/p>\n<p>The project funded through grant agreement number 101145856 is supported by the European Cybersecurity Competence Centre.<\/p>","protected":false},"excerpt":{"rendered":"<p>P\u00e1r rokov dozadu sme boli prizvan\u00ed k v\u00e1\u017enemu incidentu firmy, ktor\u00e1 rie\u0161ila finan\u010dn\u00e9 oper\u00e1cie. Spolo\u010dnos\u0165 potrebovala vyrie\u0161i\u0165 probl\u00e9m s infiltr\u00e1ciou, ktor\u00fd by za norm\u00e1lnych okolnost\u00ed nikdy nevznikol. \u00datok toti\u017e nebol cielen\u00fd, nebol\u00a0ani pr\u00edli\u0161\u00a0sofistikovan\u00fd a \u00fato\u010dn\u00edk o firme pravdepodobne\u00a0vedel len ve\u013emi m\u00e1lo. Bol to typick\u00fd oportunistick\u00fd \u00fatok, ak\u00fdch je dnes pln\u00fd internet\u2026 a predsa vo firme [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":11081,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19,48],"tags":[],"class_list":["post-11077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc","category-vseobecne"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd nem\u00e1 v\u00f4bec vznikn\u00fa\u0165?<\/title>\n<meta name=\"description\" content=\"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/how-to-prevent-an-attack-implementation-of-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd nem\u00e1 v\u00f4bec vznikn\u00fa\u0165?\" \/>\n<meta property=\"og:description\" content=\"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/how-to-prevent-an-attack-implementation-of-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T11:55:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T12:33:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"662\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matus Jaco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matus Jaco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/\"},\"author\":{\"name\":\"Matus Jaco\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/d2e656f4eb0252b445cde4cd84f3daba\"},\"headline\":\"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd by nemal v\u00f4bec vznikn\u00fa\u0165\",\"datePublished\":\"2026-04-15T11:55:11+00:00\",\"dateModified\":\"2026-04-15T12:33:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/\"},\"wordCount\":1326,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Implementation-Services_2-2048x662-1.png\",\"articleSection\":[\"SOC\",\"V\u0161eobecn\u00e9\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/\",\"name\":\"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd nem\u00e1 v\u00f4bec vznikn\u00fa\u0165?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Implementation-Services_2-2048x662-1.png\",\"datePublished\":\"2026-04-15T11:55:11+00:00\",\"dateModified\":\"2026-04-15T12:33:12+00:00\",\"description\":\"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Implementation-Services_2-2048x662-1.png\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Implementation-Services_2-2048x662-1.png\",\"width\":2048,\"height\":662},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/ako-predist-utoku-implementacia-technologii\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd by nemal v\u00f4bec vznikn\u00fa\u0165\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/d2e656f4eb0252b445cde4cd84f3daba\",\"name\":\"Matus Jaco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g\",\"caption\":\"Matus Jaco\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent an attack that should never happen in the first place?","description":"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/how-to-prevent-an-attack-implementation-of-technologies\/","og_locale":"en_GB","og_type":"article","og_title":"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd nem\u00e1 v\u00f4bec vznikn\u00fa\u0165?","og_description":"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.","og_url":"https:\/\/www.binaryconfidence.com\/en\/how-to-prevent-an-attack-implementation-of-technologies\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2026-04-15T11:55:11+00:00","article_modified_time":"2026-04-15T12:33:12+00:00","og_image":[{"width":2048,"height":662,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png","type":"image\/png"}],"author":"Matus Jaco","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"Matus Jaco","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/"},"author":{"name":"Matus Jaco","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/d2e656f4eb0252b445cde4cd84f3daba"},"headline":"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd by nemal v\u00f4bec vznikn\u00fa\u0165","datePublished":"2026-04-15T11:55:11+00:00","dateModified":"2026-04-15T12:33:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/"},"wordCount":1326,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png","articleSection":["SOC","V\u0161eobecn\u00e9"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/","url":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/","name":"How to prevent an attack that should never happen in the first place?","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png","datePublished":"2026-04-15T11:55:11+00:00","dateModified":"2026-04-15T12:33:12+00:00","description":"Sta\u010d\u00ed\u00a0jeden\u00a0nezabezpe\u010den\u00fd vstupn\u00fd bod vo va\u0161ej infra\u0161trukt\u00fare vystaven\u00fd do sveta a m\u00f4\u017eete ma\u0165 probl\u00e9m za st\u00e1tis\u00edcie eur.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2026\/04\/Implementation-Services_2-2048x662-1.png","width":2048,"height":662},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/ako-predist-utoku-implementacia-technologii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"Ako pred\u00eds\u0165 \u00fatoku, ktor\u00fd by nemal v\u00f4bec vznikn\u00fa\u0165"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/d2e656f4eb0252b445cde4cd84f3daba","name":"Matus Jaco","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f02e9788f4ec77b7b97785047021a401f39c133d754da452a5838d5798aa1b2?s=96&d=mm&r=g","caption":"Matus Jaco"}}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/11077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=11077"}],"version-history":[{"count":5,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/11077\/revisions"}],"predecessor-version":[{"id":11107,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/11077\/revisions\/11107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/11081"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=11077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=11077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=11077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}