{"id":11264,"date":"2021-10-13T14:08:32","date_gmt":"2021-10-13T12:08:32","guid":{"rendered":"https:\/\/www.proid.cz\/brozura-10-kroku-pro-zabezpeceni-kyberprostoru-organizace\/"},"modified":"2023-04-26T14:48:30","modified_gmt":"2023-04-26T12:48:30","slug":"brochure-10-steps-to-securing-your-organizations-cyberspace","status":"publish","type":"post","link":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/","title":{"rendered":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c"},"content":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^11310|url^https:\/\/www.proid.cz\/wp-content\/uploads\/2021\/10\/y-5_linkedin_1200\u00d7627_10-steps.jpg|caption^null|alt^null|title^y-5_linkedin_1200\u00d7627_10-steps|description^null&#8221; bg_image_repeat=&#8221;no-repeat&#8221; bg_override=&#8221;full&#8221; css=&#8221;.vc_custom_1636465314852{margin-top: -70px !important;}&#8221;][vc_column][vc_empty_space height=&#8221;100&#8243;][vc_row_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]<\/p>\n<h1><span style=\"color: #ffffff;\">Brochure<br \/>\n\u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c<\/span><\/h1>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h4><span style=\"color: #ffffff;\">Technology | Tools | Best Practicies<br \/>\nA&nbsp;practical guide for IT managers in organisations<br \/>\n<\/span><\/h4>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-785b98973d240ede8a6b4585b258f88d.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-785b98973d240ede8a6b4585b258f88d > i {\n  margin-right: 8px;\n}\n<\/style><a href=\"#!\/form\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off anchor-link btn-inline-left \" id=\"default-btn-785b98973d240ede8a6b4585b258f88d\"><span>Free download<\/span><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">We live in a&nbsp;time of constant cyber threats. Authorities, hospitals and private companies are under constant pressure to manage their security. Download a&nbsp;free brochure outlining the ten essential steps to be covered if your organisation is to be cyber secure. We have created this booklet as a&nbsp;simple guide for all organisation administrators.<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;11298&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; onclick=&#8221;link_image&#8221; css=&#8221;.vc_custom_1636465394020{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #ebf6f6 !important;border-left-style: solid !important;border-right-color: #ebf6f6 !important;border-right-style: solid !important;border-top-color: #ebf6f6 !important;border-top-style: solid !important;border-bottom-color: #ebf6f6 !important;border-bottom-style: solid !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;11295&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; onclick=&#8221;link_image&#8221; css=&#8221;.vc_custom_1636465411974{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #ebf6f6 !important;border-left-style: solid !important;border-right-color: #ebf6f6 !important;border-right-style: solid !important;border-top-color: #ebf6f6 !important;border-top-style: solid !important;border-bottom-color: #ebf6f6 !important;border-bottom-style: solid !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;11304&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; onclick=&#8221;link_image&#8221; css=&#8221;.vc_custom_1636465432633{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #ebf6f6 !important;border-left-style: solid !important;border-right-color: #ebf6f6 !important;border-right-style: solid !important;border-top-color: #ebf6f6 !important;border-top-style: solid !important;border-bottom-color: #ebf6f6 !important;border-bottom-style: solid !important;}&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;11301&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; onclick=&#8221;link_image&#8221; css=&#8221;.vc_custom_1636465451105{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #ebf6f6 !important;border-left-style: solid !important;border-right-color: #ebf6f6 !important;border-right-style: solid !important;border-top-color: #ebf6f6 !important;border-top-style: solid !important;border-bottom-color: #ebf6f6 !important;border-bottom-style: solid !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>A brochure to help you protect your cyberspace<\/h3>\n<p>We&#8217;ve outlined ten basic steps that need to be covered if your organisation is to be at least fundamentally secure. These steps are based on our daily practice. They are accompanied by the results of the Security Index, an online test available on our website. This test has been completed by dozens of IT managers from a&nbsp;wide variety of organizations and gives us insight into how companies operate from a&nbsp;security perspective.<\/p>\n<p>We primarily work with PKI (Public Key Infrastructure) technology, so the technical information is focused towards this direction.<br \/>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; el_id=&#8221;form&#8221; css=&#8221;.vc_custom_1634127599196{background-color: #f5f6f7 !important;border-radius: 35px !important;}&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;11266&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3>To download the brochure, fill in the form<\/h3>\n<p>[\/vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11276-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/11264#wpcf7-f11276-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"11276\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.7.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11276-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<p><label> E-mail (vy\u017eadov\u00e1no)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label><br \/>\n<label> Jm\u00e9no<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label><br \/>\n<label> N\u00e1zev organizace<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label><br \/>\n<!--<label> Telefon\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel-946\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-946\" \/><\/span><\/label>-->\n<\/p>\n<p>Vypln\u011bn\u00edm formul\u00e1\u0159e souhlas\u00edte se <a href=\"https:\/\/www.monetplus.cz\/zasady-zpracovani-osobnich-udaju\" target=\"_blank\">zpracov\u00e1n\u00ed osobn\u00edch \u00fadaj\u016f<\/a>.\n<\/p>\n<p><input class=\"wpcf7-form-control has-spinner wpcf7-submit\" type=\"submit\" value=\"Odeslat\" \/>\n<\/p><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download a&nbsp;free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.<\/p>\n","protected":false},"author":1,"featured_media":11313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"episode_type":"","audio_file":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","filesize_raw":""},"categories":[120,121,47],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID<\/title>\n<meta name=\"description\" content=\"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID\" \/>\n<meta property=\"og:description\" content=\"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\" \/>\n<meta property=\"og:site_name\" content=\"ProID\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-13T12:08:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T12:48:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/10\/5_linkedin_1200\u00d7627_10-steps-kopie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ivo Vr\u00e1na\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/10\/5_linkedin_1200\u00d7627_10-steps-kopie.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivo Vr\u00e1na\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\"},\"author\":{\"name\":\"Ivo Vr\u00e1na\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b\"},\"headline\":\"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c\",\"datePublished\":\"2021-10-13T12:08:32+00:00\",\"dateModified\":\"2023-04-26T12:48:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\"},\"wordCount\":733,\"publisher\":{\"@id\":\"https:\/\/proid.cz\/en\/#organization\"},\"articleSection\":[\"Brochures\",\"Case studies\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\",\"url\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\",\"name\":\"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID\",\"isPartOf\":{\"@id\":\"https:\/\/proid.cz\/en\/#website\"},\"datePublished\":\"2021-10-13T12:08:32+00:00\",\"dateModified\":\"2023-04-26T12:48:30+00:00\",\"description\":\"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.\",\"breadcrumb\":{\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/proid.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proid.cz\/en\/#website\",\"url\":\"https:\/\/proid.cz\/en\/\",\"name\":\"ProID\",\"description\":\"Ultimate Digital Identity for Employees and Organisations\",\"publisher\":{\"@id\":\"https:\/\/proid.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proid.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proid.cz\/en\/#organization\",\"name\":\"ProID by MONET+\",\"url\":\"https:\/\/proid.cz\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"contentUrl\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"width\":680,\"height\":680,\"caption\":\"ProID by MONET+\"},\"image\":{\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b\",\"name\":\"Ivo Vr\u00e1na\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g\",\"caption\":\"Ivo Vr\u00e1na\"},\"description\":\"Product Marketing Manager\",\"sameAs\":[\"https:\/\/cz.linkedin.com\/in\/ivovrana\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID","description":"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/","og_locale":"en_US","og_type":"article","og_title":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID","og_description":"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.","og_url":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/","og_site_name":"ProID","article_published_time":"2021-10-13T12:08:32+00:00","article_modified_time":"2023-04-26T12:48:30+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/10\/5_linkedin_1200\u00d7627_10-steps-kopie.jpg","type":"image\/jpeg"}],"author":"Ivo Vr\u00e1na","twitter_card":"summary_large_image","twitter_image":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/10\/5_linkedin_1200\u00d7627_10-steps-kopie.jpg","twitter_misc":{"Written by":"Ivo Vr\u00e1na","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#article","isPartOf":{"@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/"},"author":{"name":"Ivo Vr\u00e1na","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b"},"headline":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c","datePublished":"2021-10-13T12:08:32+00:00","dateModified":"2023-04-26T12:48:30+00:00","mainEntityOfPage":{"@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/"},"wordCount":733,"publisher":{"@id":"https:\/\/proid.cz\/en\/#organization"},"articleSection":["Brochures","Case studies","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/","url":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/","name":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c &ndash; ProID","isPartOf":{"@id":"https:\/\/proid.cz\/en\/#website"},"datePublished":"2021-10-13T12:08:32+00:00","dateModified":"2023-04-26T12:48:30+00:00","description":"Download a free brochure outlining the 10 basic steps you need to address if your organisation is to be cybersecure.","breadcrumb":{"@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/proid.cz\/en\/brochure-10-steps-to-securing-your-organizations-cyberspace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/proid.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Brochure \u201e10 Steps to Securing Your Organization\u2018s Cyberspace\u201c"}]},{"@type":"WebSite","@id":"https:\/\/proid.cz\/en\/#website","url":"https:\/\/proid.cz\/en\/","name":"ProID","description":"Ultimate Digital Identity for Employees and Organisations","publisher":{"@id":"https:\/\/proid.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proid.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/proid.cz\/en\/#organization","name":"ProID by MONET+","url":"https:\/\/proid.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","contentUrl":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","width":680,"height":680,"caption":"ProID by MONET+"},"image":{"@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/c96348fffe68529d0af6287b6cf3683b","name":"Ivo Vr\u00e1na","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/proid.cz\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ef1e58a98bd86cfa05ba068e0234473?s=96&d=mm&r=g","caption":"Ivo Vr\u00e1na"},"description":"Product Marketing Manager","sameAs":["https:\/\/cz.linkedin.com\/in\/ivovrana"]}]}},"_links":{"self":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/11264"}],"collection":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/comments?post=11264"}],"version-history":[{"count":1,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/11264\/revisions"}],"predecessor-version":[{"id":18375,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/posts\/11264\/revisions\/18375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media\/11313"}],"wp:attachment":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media?parent=11264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/categories?post=11264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/tags?post=11264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}