{"id":1463,"date":"2022-12-09T08:30:00","date_gmt":"2022-12-09T08:30:00","guid":{"rendered":"https:\/\/proget.pl\/en\/?p=1463"},"modified":"2025-06-09T08:59:05","modified_gmt":"2025-06-09T08:59:05","slug":"cyber-reality-cybersecurity","status":"publish","type":"post","link":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/","title":{"rendered":"Is cyber reality the reality already or is it still a faraway possibility?"},"content":{"rendered":"<div class=\"!my-16 md:!my-24\">\n  <div \n    class=\"is-layout-constrained\" style=\"--wp--style--global--content-size: 70.75rem;\"\n>\n    <main class=\"xl:grid xl:gap-10 xl:grid-cols-[741px_1fr]\">\n      <article>\n                  <div class=\"inline-grid grid-cols-2 gap-5 sm:flex sm:flex-wrap mb-3\">\n                          <a class=\"uppercase text-[10px] leading-3 text-text-tertiary font-medium w-fit hover:no-underline\"\n                 href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\"\n              >\n                Cyber smart\n              <\/a>\n                      <\/div>\n                          <h1 class=\"font-[600] text-3xl text-text-primary mb-7 md:mb-12\">Is cyber reality the reality already or is it still a faraway possibility?<\/h1>\n                <div class=\"flex items-center gap-x-8\">\n                      <div class=\"flex items-center gap-x-1.5\">\n                              <div class=\"shrink-0\">\n                  <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Magda-M-100.webp\" class=\"w-8 h-8 object-cover rounded-full\" alt=\"\" \/>                <\/div>\n                                            <p class=\"text-xs\">Magdalena Martens<\/p>\n                          <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M19.5 3.75h-15a.75.75 0 0 0-.75.75v15c0 .414.336.75.75.75h15a.75.75 0 0 0 .75-.75v-15a.75.75 0 0 0-.75-.75Zm-3-1.5v3m-9-3v3m-3.75 3h16.5\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">09.12.2022<\/p>\n            <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-miterlimit=\"10\" d=\"M12 21a9 9 0 1 0 0-18 9 9 0 0 0 0 18Z\"\/><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M12 6.75V12h5.25\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">\n                2 min\n              <\/p>\n            <\/div>\n                  <\/div>\n        <div class=\"mt-7 md:mt-12 single-post-content\">\n          \n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/proget.pl\/en\/\">Proget<\/a><\/span> &gt; <span><a href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\">Cyber smart<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\"><strong>Is cyber reality the reality already or is it still a faraway possibility?<\/strong><\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group has-primary-50-background-color has-background has-xs-font-size is-layout-constrained wp-container-core-group-is-layout-6bf6b0c8 wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">\n<p class=\"has-base-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--2-xs)\"><strong>Jump to:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-what-is-cybersecurity\" data-level=\"2\">What is cybersecurity?<\/a><\/li><li><a href=\"#h-why-is-cybersecurity-so-important\" data-level=\"2\">Why is cybersecurity so important?<\/a><\/li><li><a href=\"#h-new-times-a-new-approach\" data-level=\"2\">New times \u2013 a new approach?<\/a><\/li><li><a href=\"#h-what-are-the-implications-of-mobility\" data-level=\"2\">What are the implications of mobility?<\/a><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-what-is-cybersecurity\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What is cybersecurity?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Cybersecurity is a very broad discipline that describes recommendations, technologies and procedures to secure devices, data and entire IT networks from unauthorized access, attack or damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-why-is-cybersecurity-so-important\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Why is cybersecurity so important?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Cybersecurity is very much linked to the increasing digitization and the gradual transfer of life \u2013 not only private but also corporate \u2013 to cyberspace, where we find it increasingly easy to function. Unfortunately, unlike in real life, where we protect our privacy and resources \u2013 locking our front doors, hiding valuables in safes, not letting strangers into our homes \u2013 online, we often forget basic precautions, adapted to the current level of threats and the scale of cyber attacks. While in the private space, we mainly refer to phishing and fraud, in the business space, even the most minor data leak or systems failure can have severe consequences due to its scale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-new-times-a-new-approach\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">New times \u2013 a new approach?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">According to <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5bUvv?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"text-decoration: underline\">Microsoft Digital Defense 2022<\/span><\/a> report, cyber hygiene can provide 98% security. It is worth highlighting the increasingly emphasized need for security systems \u2013 not only for the entire company from the outside but also for individual areas inside it. More than creating a figurative defense wall is required since threats can come not only from the outside when there is usually a spectacular attack described in the media. More than half of security threats are rooted in the unintentional or accidental actions of an internal factor &#8211; an employee. Therefore, it is equally important to take responsibility for securing all areas where the human factor significantly impacts the actions taken. Even the most knowledgeable employee can have a worse day or reasons that change their intentions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-what-are-the-implications-of-mobility\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What are the implications of mobility?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">In recent years, business operations have been moving online, with mobile devices becoming a vital tool in business management. The <span style=\"text-decoration: underline\"><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/mobile-security-index\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">data<\/a><\/span> shows that the average number of unsecured devices in larger organizations reaches 3,500. Therefore, one can easily imagine the scale of the threat. Ignoring this problem can make these devices an easy target for hackers, which can have unpredictable consequences. Each business device represents several liabilities and potential risks for which its owners or users are responsible.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">So is it worth entrusting responsibilities to chance? More and more, the solution seems to lie in technology and tools that match the size and scope of the risks.<\/p>\n\n\n<div class=\"alignfull !px-0 bg-background-black text-text-inverted\">\n  <div \n    class=\"is-layout-constrained is-layout-constrained-root px-6 md:px-16\"\n>\n    \n\n<div class=\"wp-block-group has-lg-font-size is-layout-constrained wp-block-group-is-layout-constrained\"><div\n  id=\"block_e82cdc37e072a4e5506119b88bb1459a\"\n  class=\"grid grid-cols-1 lg:grid-cols-12 gap-y-16 gap-x-10 py-[--wp--preset--spacing--2-xl] items-center\"\n  style=\"padding-top:var(--wp--preset--spacing--lg);padding-bottom:var(--wp--preset--spacing--lg)\"\n>\n  <div \n    class=\"is-layout-constrained lg:col-span-6 lg:order-1 order-3\"\n>\n    \n<h2\n  class=\"text-3xl !leading-[1.2] font-bold wp-block-heading align-text-left\" style=\";\" id=\"block_32f73c23dde78214e9939f23e26f706e\"\n>\n  Check out what Proget system can do.\n<\/h2>\n\n<div \n  id=\"block_a4e86a87a466f8d24f262cf11b8f3e3c\"\n  class=\"flex flex-wrap gap-4 wp-block-buttons justify-start\"\n  style=\"padding-top:var(--wp--preset--spacing--sm)\"\n>\n  \n<a\n    href=\"https:\/\/proget.pl\/en\/trial\/\" target=\"\" rel=\"noopener\" style=\"min-width: 200px\" class=\"!inline-flex items-center justify-center outline outline-1 -outline-offset-1 rounded-full font-prebold no-underline hover:no-underline focus:no-underline transition-colors duration-300 linear whitespace-nowrap font-sans-alt !leading-[1.362] [&amp;_svg]:flex-none bg-button-primary-main-fill !text-button-primary-main-text outline-button-primary-main-outline hover:bg-button-primary-hover-fill hover:!text-button-primary-hover-text hover:outline-button-primary-hover-outline disabled:bg-button-primary-disabled-fill disabled:!text-button-primary-disabled-text disabled:outline-button-primary-disabled-outline focus:bg-button-primary-selected-fill focus:!text-button-primary-selected-text focus:outline-button-primary-selected-outline button-small text-[0.8125rem] px-4 py-2 gap-2 [&amp;_svg]:w-4 [&amp;_svg]:h-4 wp-block-button !inline-flex\"\n>\n    \n    <span\n        class=\"\"\n    >\n        Test the system\n    <\/span>\n\n            <svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M2.5 8H13.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<path d=\"M9 3.5L13.5 8L9 12.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<\/svg>\n    <\/a>\n\n<\/div>\n\n<\/div>\n  <div class=\"hidden lg:block order-2\"><\/div>\n\n  <div class=\"text-center lg:col-span-5 hidden md:block lg:order-3 order-1\">\n          <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>      <\/div>\n\n      <div class=\"text-center lg:col-span-5 block md:hidden lg:order-3 order-1\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>    <\/div>\n  <\/div><\/div>\n\n\n<\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-brand-fog-color has-alpha-channel-opacity has-brand-fog-background-color has-background is-style-default\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:0\" \/>\n\n\n\n<div class=\"wp-block-group has-base-white-background-color has-background is-nowrap is-layout-flex wp-container-core-group-is-layout-837611ba wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--sm);padding-bottom:0;padding-left:var(--wp--preset--spacing--sm)\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-700cb50f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-f078265f wp-block-column-is-layout-constrained\" style=\"padding-right:0;flex-basis:48px\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Magda-M-100.webp\" alt=\"\" class=\"wp-image-2977\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-e1564d08 wp-block-column-is-layout-constrained\" style=\"padding-left:0\">\n<p>Author: Magdalena Martens<\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0.7em;font-size:0.7em\">Marketing manager with many years of experience, specializing in B2B communications in IT. Involved in the cyber security and Mobile Device Management (MDM) solutions topics for several years. Privately a fan of automotive and Kaizen philosophy.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n        <\/div>\n      <\/article>\n      <aside class=\"mt-10 xl:mt-0\">\n        <div class=\"hidden xl:block xl:mb-10\">\n          <form role=\"search\" action=\"https:\/\/proget.pl\/en\/blog\/\" autocomplete=\"off\">\n  <div class=\"w-full inline-block relative \">\n    <input\n      class=\"peer w-full bg-transparent text-text-primary font-medium text-sm shadow-01 pr-3 pl-10 pt-xs border border-border-secondary rounded-lg transition-all hover:border-border-active hover:bg-surface-hover-01 focus:border-border-active focus:outline-0 focus:ring-0 disabled:bg-border-disabled disabled:text-text-disabled disabled:cursor-not-allowed disabled:border-border-disabled h-[50px]\"\n      placeholder=\" \"\n      type=\"text\"\n      name=\"s\"\n      value=\"\"\n      id=\"search\"\n    \/>\n    <label\n      class=\"flex w-full h-full select-none pointer-events-none absolute left-0 pr-3 pl-10 transition-all !overflow-visible truncate leading-tigh text-text-tertiary peer-placeholder-shown:text-text-tertiary peer-disabled:text-text-disabled peer-disabled:peer-placeholder-shown:text-text-disabled peer-placeholder-shown:text-sm text-xs peer-focus:text-xs top-[7px] peer-placeholder-shown:top-[15px] peer-focus:top-[7px]\"\n      for=\"search\"\n    >\n      Search\n    <\/label>\n    <button type=\"submit\" class=\"absolute left-0 top-[calc(50%-20px)] w-10 h-[40px] pl-1 flex items-center justify-center\">\n      <svg class=\"w-5 h-5 shrink-0 stroke-primary-500 pointer-events-none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 20 20\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M9.063 15.625a6.562 6.562 0 1 0 0-13.125 6.562 6.562 0 0 0 0 13.125Zm4.64-1.922L17.5 17.5\"\/><\/svg>    <\/button>\n  <\/div>\n<\/form>\n        <\/div>\n                  <h2 class=\"text-text-secondary text-lg font-semibold mb-6\">More articles:<\/h2>\n          <div class=\"grid gap-6\">\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and padlocked shield icon, cogs, tile with password stars\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Cyber hygiene in business \u2013 learn the simple rules and how you can support it\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and shield icon with keyhole, next to phone\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Is cyber reality the reality already or is it still a faraway possibility?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/does-your-company-need-mdm\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/7-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with a laptop and a shield icon with MDM written on it\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Check if your company also needs a professional MDM solution\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/choosing-mdm-solution\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/37-mdm_03-EN-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and graphics, Proget MDM signpost, price, features, support, All-in-One\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    What to consider when choosing an MDM solution? \u2013 explore practical tips\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/are-all-mobile-apps-safe\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/02\/9-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and shield icon with keyhole, Play Store icon, Apple App Store icon\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Are all mobile apps safe and why you should avoid those out of the official stores?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                      <\/div>\n              <\/aside>\n    <\/main>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a very broad discipline that describes recommendations, technologies and procedures to secure devices, data and entire IT networks from unauthorized access, attack or damage. Cybersecurity is very much linked to the increasing digitization and the gradual transfer of life \u2013 not only private but also corporate \u2013 to cyberspace, where we find it increasingly easy to function. Unfortunately, unlike in real life, where we protect our privacy and resources \u2013 locking our front doors, hiding valuables in safes, not letting strangers into our homes \u2013 online, we often forget basic precautions, adapted to the current level of threats and the scale of cyber attacks. While in the private space, we mainly refer to phishing and fraud, in the business space, even the most minor data leak or systems failure can have severe consequences due to its scale.<\/p>\n","protected":false},"author":3,"featured_media":2764,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-1463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersmart"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber reality: why is cybersecurity important?<\/title>\n<meta name=\"description\" content=\"Security is essential in today&#039;s digital world. Learn the benefits of cybersecurity for companies and private users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is cyber reality the reality already or is it still a faraway possibility?\" \/>\n<meta property=\"og:description\" content=\"Security is essential in today&#039;s digital world. Learn the benefits of cybersecurity for companies and private users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Proget\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-09T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T08:59:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1351\" \/>\n\t<meta property=\"og:image:height\" content=\"296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Agnieszka Pierlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pierlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/\"},\"author\":{\"name\":\"Agnieszka Pierlak\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\"},\"headline\":\"Is cyber reality the reality already or is it still a faraway possibility?\",\"datePublished\":\"2022-12-09T08:30:00+00:00\",\"dateModified\":\"2025-06-09T08:59:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/\"},\"wordCount\":419,\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2022\\\/12\\\/2.webp\",\"articleSection\":[\"Cyber smart\"],\"inLanguage\":\"en-GB\",\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/\",\"name\":\"Cyber reality: why is cybersecurity important?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2022\\\/12\\\/2.webp\",\"datePublished\":\"2022-12-09T08:30:00+00:00\",\"dateModified\":\"2025-06-09T08:59:05+00:00\",\"description\":\"Security is essential in today's digital world. Learn the benefits of cybersecurity for companies and private users.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2022\\\/12\\\/2.webp\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2022\\\/12\\\/2.webp\",\"width\":1351,\"height\":296,\"caption\":\"banner with laptop and shield icon with keyhole, next to phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-reality-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Proget\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber smart\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/category\\\/cybersmart\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is cyber reality the reality already or is it still a faraway possibility?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"name\":\"Proget\",\"description\":\"Enterprise Mobility Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/proget.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\",\"name\":\"Proget Sp. z o.o.\",\"alternateName\":\"Proget\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"width\":1,\"height\":1,\"caption\":\"Proget Sp. z o.o.\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/proget-software\\\/\"],\"description\":\"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\\\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.\",\"legalName\":\"Proget Sp. z o.o.\",\"foundingDate\":\"2012-03-27\",\"taxID\":\"5472142508\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\",\"name\":\"Agnieszka Pierlak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"caption\":\"Agnieszka Pierlak\"},\"description\":\"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/author\\\/apierlak\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber reality: why is cybersecurity important?","description":"Security is essential in today's digital world. Learn the benefits of cybersecurity for companies and private users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Is cyber reality the reality already or is it still a faraway possibility?","og_description":"Security is essential in today's digital world. Learn the benefits of cybersecurity for companies and private users.","og_url":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/","og_site_name":"Proget","article_published_time":"2022-12-09T08:30:00+00:00","article_modified_time":"2025-06-09T08:59:05+00:00","og_image":[{"width":1351,"height":296,"url":"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp","type":"image\/webp"}],"author":"Agnieszka Pierlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pierlak","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/"},"author":{"name":"Agnieszka Pierlak","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539"},"headline":"Is cyber reality the reality already or is it still a faraway possibility?","datePublished":"2022-12-09T08:30:00+00:00","dateModified":"2025-06-09T08:59:05+00:00","mainEntityOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/"},"wordCount":419,"publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp","articleSection":["Cyber smart"],"inLanguage":"en-GB","accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/","url":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/","name":"Cyber reality: why is cybersecurity important?","isPartOf":{"@id":"https:\/\/proget.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp","datePublished":"2022-12-09T08:30:00+00:00","dateModified":"2025-06-09T08:59:05+00:00","description":"Security is essential in today's digital world. Learn the benefits of cybersecurity for companies and private users.","breadcrumb":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#primaryimage","url":"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2.webp","width":1351,"height":296,"caption":"banner with laptop and shield icon with keyhole, next to phone"},{"@type":"BreadcrumbList","@id":"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Proget","item":"https:\/\/proget.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber smart","item":"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/"},{"@type":"ListItem","position":3,"name":"Is cyber reality the reality already or is it still a faraway possibility?"}]},{"@type":"WebSite","@id":"https:\/\/proget.pl\/en\/#website","url":"https:\/\/proget.pl\/en\/","name":"Proget","description":"Enterprise Mobility Management","publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proget.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proget.pl\/en\/#organization","name":"Proget Sp. z o.o.","alternateName":"Proget","url":"https:\/\/proget.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","width":1,"height":1,"caption":"Proget Sp. z o.o."},"image":{"@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/proget-software\/"],"description":"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.","legalName":"Proget Sp. z o.o.","foundingDate":"2012-03-27","taxID":"5472142508"},{"@type":"Person","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539","name":"Agnieszka Pierlak","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","caption":"Agnieszka Pierlak"},"description":"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.","url":"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/"}]}},"_links":{"self":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/comments?post=1463"}],"version-history":[{"count":10,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1463\/revisions"}],"predecessor-version":[{"id":3002,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1463\/revisions\/3002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media\/2764"}],"wp:attachment":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media?parent=1463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/categories?post=1463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/tags?post=1463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}